Fast Signature Scheme for Network Coding

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Suitable Coding Scheme for Broadband Power-line Communication

This paper introduces three coding strategies for using the Luby Transform (LT) code in a relay aided power-line communication scheme. In the first method, the relay decodes the received packets and re-encodes them for transmission towards the destination. In the second method, the relay only forwardes a random linear combination of its received packets towards the destination, while in the thi...

متن کامل

An efficient dynamic-identity based signature scheme for secure network coding

The network coding based applications are vulnerable to possible malicious pollution attacks. Signature schemes have been well-recognized as the most effective approach to address this security issue. However, existing homomorphic signature schemes for network coding either incur high transmission/computation overhead, or are vulnerable to random forgery attacks. In this paper, we propose a nov...

متن کامل

SFLASHv3, a fast asymmetric signature scheme

Note: SFLASH is one of the three asymmetric signature schemes recommended by the Nessie European consortium for low-cost smart cards [19, 14]. The latest implementation report shows that SFLASH is the fastest signature scheme known, see [1]. Recent results on solving random systems of quadratic equations over fields of the form GF (2) (see [2]) suggest that the parameters of SFLASH should be in...

متن کامل

SFLASH, a fast asymmetric signature scheme

Note: SFLASH is one of the three asymmetric signature schemes recommended by the Nessie European consortium for low-cost smart cards [21, 16]. The latest implementation report shows that SFLASH is the fastest signature scheme known, see [1] for details. This document is a specification of SFLASH-v3 produced for fear of SFLASH-v2 being broken (see [3]). HOWEVER after detailed analysis by Chen, C...

متن کامل

Group signature revocable anonymity scheme for network monitoring

Subscriber’s Privacy is in a constant conflict with security and accountability providing controls employed for network monitoring activities of service providers and enterprises. This paper presents the results of the author’s research in the field of distributed network security monitoring architectures and the proposal of such a system that incorporates cryptographic protocols and a group si...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Algorithms & Computational Technology

سال: 2012

ISSN: 1748-3026,1748-3026

DOI: 10.1260/1748-3018.6.1.17