Network coding signature (NCS) scheme is a cryptographic tool for network coding against pollution attacks. In [5], Chang et al. first introduced the related-key attack (RKA) to the NCS schemes and tried to give an instantiation of it. However, their instantiation is based on the random oracle (RO) model. In this letter, we present a standard-model instantiation. In particular, we prove that standard-model-based NCS scheme introduced by Boneh et al. in [4] (BFKW scheme, for short) can achieve Φ-RKA security if the underlying signature scheme is also Φ-RKA secure, where Φ is any family of functions defined on signing keys of NCS schemes.
Yanyan JI
North University of China
Jinyong CHANG
Peking University
Honglong DAI
Peking University
Maozhi XU
Peking University
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Copy
Yanyan JI, Jinyong CHANG, Honglong DAI, Maozhi XU, "On the RKA Security of the Standard-Model-Based BFKW Network Coding Signature Scheme" in IEICE TRANSACTIONS on Fundamentals,
vol. E101-A, no. 12, pp. 2477-2480, December 2018, doi: 10.1587/transfun.E101.A.2477.
Abstract: Network coding signature (NCS) scheme is a cryptographic tool for network coding against pollution attacks. In [5], Chang et al. first introduced the related-key attack (RKA) to the NCS schemes and tried to give an instantiation of it. However, their instantiation is based on the random oracle (RO) model. In this letter, we present a standard-model instantiation. In particular, we prove that standard-model-based NCS scheme introduced by Boneh et al. in [4] (BFKW scheme, for short) can achieve Φ-RKA security if the underlying signature scheme is also Φ-RKA secure, where Φ is any family of functions defined on signing keys of NCS schemes.
URL: https://global.ieice.org/en_transactions/fundamentals/10.1587/transfun.E101.A.2477/_p
Copy
@ARTICLE{e101-a_12_2477,
author={Yanyan JI, Jinyong CHANG, Honglong DAI, Maozhi XU, },
journal={IEICE TRANSACTIONS on Fundamentals},
title={On the RKA Security of the Standard-Model-Based BFKW Network Coding Signature Scheme},
year={2018},
volume={E101-A},
number={12},
pages={2477-2480},
abstract={Network coding signature (NCS) scheme is a cryptographic tool for network coding against pollution attacks. In [5], Chang et al. first introduced the related-key attack (RKA) to the NCS schemes and tried to give an instantiation of it. However, their instantiation is based on the random oracle (RO) model. In this letter, we present a standard-model instantiation. In particular, we prove that standard-model-based NCS scheme introduced by Boneh et al. in [4] (BFKW scheme, for short) can achieve Φ-RKA security if the underlying signature scheme is also Φ-RKA secure, where Φ is any family of functions defined on signing keys of NCS schemes.},
keywords={},
doi={10.1587/transfun.E101.A.2477},
ISSN={1745-1337},
month={December},}
Copy
TY - JOUR
TI - On the RKA Security of the Standard-Model-Based BFKW Network Coding Signature Scheme
T2 - IEICE TRANSACTIONS on Fundamentals
SP - 2477
EP - 2480
AU - Yanyan JI
AU - Jinyong CHANG
AU - Honglong DAI
AU - Maozhi XU
PY - 2018
DO - 10.1587/transfun.E101.A.2477
JO - IEICE TRANSACTIONS on Fundamentals
SN - 1745-1337
VL - E101-A
IS - 12
JA - IEICE TRANSACTIONS on Fundamentals
Y1 - December 2018
AB - Network coding signature (NCS) scheme is a cryptographic tool for network coding against pollution attacks. In [5], Chang et al. first introduced the related-key attack (RKA) to the NCS schemes and tried to give an instantiation of it. However, their instantiation is based on the random oracle (RO) model. In this letter, we present a standard-model instantiation. In particular, we prove that standard-model-based NCS scheme introduced by Boneh et al. in [4] (BFKW scheme, for short) can achieve Φ-RKA security if the underlying signature scheme is also Φ-RKA secure, where Φ is any family of functions defined on signing keys of NCS schemes.
ER -