Comment on "A Tag Encoding Scheme Against Pollution Attack to Linear Network Coding"
In 2014, Wu et al. proposed a tag encoding scheme, named KEPTE, to protect network coding against pollution attack. They also carefully analyzed the security of KEPTE based on the transmission of a data file through their key-pre-distributed network. In this article, we point out that their security...
Gespeichert in:
| Veröffentlicht in: | IEEE transactions on parallel and distributed systems Jg. 31; H. 11; S. 2618 - 2619 |
|---|---|
| Hauptverfasser: | , , , |
| Format: | Journal Article |
| Sprache: | Englisch |
| Veröffentlicht: |
New York
IEEE
01.11.2020
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| Schlagworte: | |
| ISSN: | 1045-9219, 1558-2183 |
| Online-Zugang: | Volltext |
| Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
| Abstract | In 2014, Wu et al. proposed a tag encoding scheme, named KEPTE, to protect network coding against pollution attack. They also carefully analyzed the security of KEPTE based on the transmission of a data file through their key-pre-distributed network. In this article, we point out that their security analysis only holds for single data file transmitted in this network. If multiple files are multicasted though it, then any adversary may completely recover source node's signing key. A concrete example says that, after pre-distributing 90 keys to all the nodes in the network, it only allows to securely transmit (at most) 3 data files. More importantly, this scheme is completely insecure in standard security model for network model since the adversary is allowed to make polynomial times queries on any data files of its choice before outputting its final forgery. Finally, we also propose a twisted KEPTE scheme that is secure against any eavesdropping adversary no matter how many data files it has queried. |
|---|---|
| AbstractList | In 2014, Wu et al. proposed a tag encoding scheme, named KEPTE, to protect network coding against pollution attack. They also carefully analyzed the security of KEPTE based on the transmission of a data file through their key-pre-distributed network. In this article, we point out that their security analysis only holds for single data file transmitted in this network. If multiple files are multicasted though it, then any adversary may completely recover source node's signing key. A concrete example says that, after pre-distributing 90 keys to all the nodes in the network, it only allows to securely transmit (at most) 3 data files. More importantly, this scheme is completely insecure in standard security model for network model since the adversary is allowed to make polynomial times queries on any data files of its choice before outputting its final forgery. Finally, we also propose a twisted KEPTE scheme that is secure against any eavesdropping adversary no matter how many data files it has queried. |
| Author | Ji, Yanyan Bian, Genqing Chang, Jinyong Shao, Bilin |
| Author_xml | – sequence: 1 givenname: Jinyong orcidid: 0000-0002-6569-5152 surname: Chang fullname: Chang, Jinyong email: changjinyong@pku.edu.cn organization: School of Information and Control Engineering, Xi'An University of Architecture and Technology, Xi'An, Shaanxi, P.R. China – sequence: 2 givenname: Bilin surname: Shao fullname: Shao, Bilin email: sblin0462@sina.com organization: School of Management, Xi'An University of Architecture and Technology, Xi'An, Shaanxi, P.R. China – sequence: 3 givenname: Yanyan orcidid: 0000-0003-0559-0700 surname: Ji fullname: Ji, Yanyan email: yany_ji@163.com organization: School of Management, Xi'An University of Architecture and Technology, Xi'An, Shaanxi, P.R. China – sequence: 4 givenname: Genqing surname: Bian fullname: Bian, Genqing email: bgq_00@163.com organization: School of Information and Control Engineering, Xi'An University of Architecture and Technology, Xi'An, Shaanxi, P.R. China |
| BookMark | eNp9kMtOwzAQRS1UJNrCByA2VlmneOw87GUVykOqoFLDOnKTSUkfdnFcIf6ehFYsWLCau7hnRnMGpGesQUKugY0BmLrL5veLMWecjblSKuLijPQhimTAQYpem1kYBYqDuiCDplkzBmHEwj7JUrvbofHUGjqa0Eyv6NQUtqzNii6Kd9whnax0bRpP53a7Pfi6LU6818WGektntUHt6Av6T-s2NP0BR5fkvNLbBq9Oc0jeHqZZ-hTMXh-f08ksKLgSPpBMhTKphJQqLniCEKEqi6XgMgbUjIXLqI0q5Jgk8bLSUEKpylLKCiKhSxRDcnvcu3f244CNz9f24Ex7MuchCA4xCNa24NgqnG0ah1W-d_VOu68cWN7Jyzt5eScvP8lrmeQPU9Red897p-vtv-TNkawR8feSAhZLHotvKah8jA |
| CODEN | ITDSEO |
| CitedBy_id | crossref_primary_10_1109_TNET_2020_3013902 crossref_primary_10_1093_comjnl_bxae040 crossref_primary_10_1109_ACCESS_2022_3181992 crossref_primary_10_1109_JSYST_2021_3055021 crossref_primary_10_1109_LCOMM_2020_3013280 crossref_primary_10_1186_s13677_022_00279_5 crossref_primary_10_3390_electronics13071316 crossref_primary_10_1007_s11432_020_2997_0 |
| Cites_doi | 10.1109/TPDS.2013.24 10.1007/978-3-642-01957-9_18 10.1016/j.jfa.2009.04.016 10.1016/j.future.2018.08.039 10.1007/978-3-642-00468-1_5 |
| ContentType | Journal Article |
| Copyright | Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2020 |
| Copyright_xml | – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2020 |
| DBID | 97E RIA RIE AAYXX CITATION 7SC 7SP 8FD JQ2 L7M L~C L~D |
| DOI | 10.1109/TPDS.2020.2999523 |
| DatabaseName | IEEE Xplore (IEEE) IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Electronic Library (IEL) CrossRef Computer and Information Systems Abstracts Electronics & Communications Abstracts Technology Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
| DatabaseTitle | CrossRef Technology Research Database Computer and Information Systems Abstracts – Academic Electronics & Communications Abstracts ProQuest Computer Science Collection Computer and Information Systems Abstracts Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Professional |
| DatabaseTitleList | Technology Research Database |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering Computer Science |
| EISSN | 1558-2183 |
| EndPage | 2619 |
| ExternalDocumentID | 10_1109_TPDS_2020_2999523 9106826 |
| Genre | orig-research |
| GrantInformation_xml | – fundername: National Natural Science Foundation of China grantid: 61672416; 61672059; 61872284 funderid: 10.13039/501100001809 – fundername: Natural Science Research in Shaanxi grantid: 2018JM6105; 2019JM118 |
| GroupedDBID | --Z -~X .DC 0R~ 29I 4.4 5GY 6IK 97E AAJGR AARMG AASAJ AAWTH ABAZT ABQJQ ABVLG ACGFO ACIWK AENEX AGQYO AHBIQ AKJIK AKQYR ALMA_UNASSIGNED_HOLDINGS ASUFR ATWAV BEFXN BFFAM BGNUA BKEBE BPEOZ CS3 DU5 EBS EJD HZ~ IEDLZ IFIPE IPLJI JAVBF LAI M43 MS~ O9- OCL P2P PQQKQ RIA RIE RNS TN5 TWZ UHB AAYXX CITATION 7SC 7SP 8FD JQ2 L7M L~C L~D |
| ID | FETCH-LOGICAL-c293t-809487f38896c27e15e9dcb32861ea004b5286942e776bfa1d1d9dd88f153ade3 |
| IEDL.DBID | RIE |
| ISICitedReferencesCount | 8 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000543010700002&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 1045-9219 |
| IngestDate | Sun Jun 29 16:41:20 EDT 2025 Sat Nov 29 06:06:47 EST 2025 Tue Nov 18 22:24:37 EST 2025 Wed Aug 27 02:38:52 EDT 2025 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 11 |
| Language | English |
| License | https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html https://doi.org/10.15223/policy-029 https://doi.org/10.15223/policy-037 |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c293t-809487f38896c27e15e9dcb32861ea004b5286942e776bfa1d1d9dd88f153ade3 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| ORCID | 0000-0002-6569-5152 0000-0003-0559-0700 |
| PQID | 2413216130 |
| PQPubID | 85437 |
| PageCount | 2 |
| ParticipantIDs | crossref_citationtrail_10_1109_TPDS_2020_2999523 crossref_primary_10_1109_TPDS_2020_2999523 proquest_journals_2413216130 ieee_primary_9106826 |
| PublicationCentury | 2000 |
| PublicationDate | 2020-11-01 |
| PublicationDateYYYYMMDD | 2020-11-01 |
| PublicationDate_xml | – month: 11 year: 2020 text: 2020-11-01 day: 01 |
| PublicationDecade | 2020 |
| PublicationPlace | New York |
| PublicationPlace_xml | – name: New York |
| PublicationTitle | IEEE transactions on parallel and distributed systems |
| PublicationTitleAbbrev | TPDS |
| PublicationYear | 2020 |
| Publisher | IEEE The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| Publisher_xml | – name: IEEE – name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| References | ref2 ref1 ref4 ref3 ref5 |
| References_xml | – ident: ref5 doi: 10.1109/TPDS.2013.24 – ident: ref1 doi: 10.1007/978-3-642-01957-9_18 – ident: ref3 doi: 10.1016/j.jfa.2009.04.016 – ident: ref4 doi: 10.1016/j.future.2018.08.039 – ident: ref2 doi: 10.1007/978-3-642-00468-1_5 |
| SSID | ssj0014504 |
| Score | 2.354233 |
| Snippet | In 2014, Wu et al. proposed a tag encoding scheme, named KEPTE, to protect network coding against pollution attack. They also carefully analyzed the security... |
| SourceID | proquest crossref ieee |
| SourceType | Aggregation Database Enrichment Source Index Database Publisher |
| StartPage | 2618 |
| SubjectTerms | Coding Computer networks Data models Eavesdropping Encoding KEPTE-scheme Mathematical model Network coding Pollution pollution attack Polynomials Security Service introduction tag encoding |
| Title | Comment on "A Tag Encoding Scheme Against Pollution Attack to Linear Network Coding" |
| URI | https://ieeexplore.ieee.org/document/9106826 https://www.proquest.com/docview/2413216130 |
| Volume | 31 |
| WOSCitedRecordID | wos000543010700002&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVIEE databaseName: IEEE Electronic Library (IEL) customDbUrl: eissn: 1558-2183 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0014504 issn: 1045-9219 databaseCode: RIE dateStart: 19900101 isFulltext: true titleUrlDefault: https://ieeexplore.ieee.org/ providerName: IEEE |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3NS8MwFH_o8KAH5ydOpwTxJNY16WeOQx0eZAyc4q20yescaiuz-vf7knZDUQRPzSEvlPz6vvry8gM4yYJUoSe542Wh7_g885w0jLkjMsljpbSKLCXL_U00HMYPD3K0BGeLXhhEtIfP8NwMbS1fl-rd_CrrkWsLKRxehuUoCuterUXFwA8sVSBlF4EjSQ2bCiZ3ZW88urylTFC452R7ZSC8bz7Ikqr8sMTWvQza_3uxDVhvwkjWr3HfhCUstqA9p2hgjcZuwdqX-wa3YWzaQWglVhbsuM_G6YRdFao07otEHvEFWX-STiliZCNDgWxAY_2qStUTq0pGeSvpBRvWJ8fZhRU83oG7wdX44tppaBUcRb69Ip8kKUvJvTiWoRIR8gClVpkn4pBjSkqTBTSUvkDa5SxPueZaah3HOVnHVKO3C62iLHAPWC6DnOwjaqSwSvmB9F0tckEPmXsq4x1w5xudqObOcUN98ZzY3MOVicEmMdgkDTYdOF2IvNYXbvw1eduAsZjY4NCB7hzNpFHJt8QUEAU36dL-71IHsGrWrhsNu9CqZu94CCvqo5q-zY7s1_YJ-1fQCw |
| linkProvider | IEEE |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1bS-QwFD54A92H9bo4XoP4JHZs0mseB1dRHIcBq_hW2uRUZbVdtPr7Pclkhl0UwafmIact_XpuOTn5APbLqFAYSO4FZRx6IS8Dr4hT7olS8lQprRJLyXLTTwaD9PZWDqfgcNILg4h28xl2zdDW8nWjXs1S2RG5tpjC4WmYNcxZrltrUjMII0sWSPlF5ElSRFfD5L48yoa_rygXFH6XrK-MRPCfF7K0Kh9ssXUwp4vfe7Ul-OkCSdYbIb8MU1ivwOKYpIE5nV2BH_-cOLgKmWkIoTuxpmZ7PZYVd-ykVo1xYCRyj0_IenfFA8WMbGhIkA1srNe2hfrD2oZR5kqawQajvePs2ArurcH16Ul2fOY5YgVPkXdvyStJylOqIE1lrESCPEKpVRmINOZYkNqUEQ1lKDBJ4rIquOZaap2mFdnHQmPwC2bqpsZ1YJWMKrKQqJECKxVGMvS1qARdZBWoknfAH3_oXLlTxw35xWNusw9f5gab3GCTO2w6cDAR-Ts6cuOryasGjMlEh0MHtsZo5k4pX3JTQhTcJEwbn0vtwvxZdtnP--eDi01YMM8ZtR1uwUz7_IrbMKfe2oeX5x37570D_fXTVA |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Comment+on+%E2%80%9CA+Tag+Encoding+Scheme+Against+Pollution+Attack+to+Linear+Network+Coding%E2%80%9D&rft.jtitle=IEEE+transactions+on+parallel+and+distributed+systems&rft.au=Chang%2C+Jinyong&rft.au=Shao%2C+Bilin&rft.au=Ji%2C+Yanyan&rft.au=Bian%2C+Genqing&rft.date=2020-11-01&rft.issn=1045-9219&rft.eissn=1558-2183&rft.volume=31&rft.issue=11&rft.spage=2618&rft.epage=2619&rft_id=info:doi/10.1109%2FTPDS.2020.2999523&rft.externalDBID=n%2Fa&rft.externalDocID=10_1109_TPDS_2020_2999523 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1045-9219&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1045-9219&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1045-9219&client=summon |