{"id":"https://openalex.org/W2048910752","doi":"https://doi.org/10.1109/tc.2012.135","title":"An Efficient Homomorphic MAC with Small Key Size for Authentication in Network Coding","display_name":"An Efficient Homomorphic MAC with Small Key Size for Authentication in Network Coding","publication_year":2013,"publication_date":"2013-10-01","ids":{"openalex":"https://openalex.org/W2048910752","doi":"https://doi.org/10.1109/tc.2012.135","mag":"2048910752"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/tc.2012.135","pdf_url":null,"source":{"id":"https://openalex.org/S157670870","display_name":"IEEE Transactions on Computers","issn_l":"0018-9340","issn":["1557-9956","2326-3814","0018-9340"],"is_oa":false,"is_in_doaj":false,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5074509628","display_name":"Chunfu Cheng","orcid":"https://orcid.org/0000-0002-6560-7917"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chi Cheng","raw_affiliation_string":"Dept. of Electron. & Inf. Eng., Huazhong Univ. of Sci. & Tech., Wuhan, China","raw_affiliation_strings":["Dept. of Electron. & Inf. Eng., Huazhong Univ. of Sci. & Tech., Wuhan, China"]},{"author_position":"last","author":{"id":"https://openalex.org/A5038488166","display_name":"Tao Jiang","orcid":"https://orcid.org/0000-0002-8482-1046"},"institutions":[{"id":"https://openalex.org/I4210138186","display_name":"Wuhan National Laboratory for Optoelectronics","ror":"https://ror.org/03c9ncn37","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210138186"]},{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Tao Jiang","raw_affiliation_string":"Wuhan National Laboratory for Optoelectronics, Department of Electronics and Information Engineering, Huazhong University of Science and Technology, Wuhan, China","raw_affiliation_strings":["Wuhan National Laboratory for Optoelectronics, Department of Electronics and Information Engineering, Huazhong University of Science and Technology, Wuhan, China"]}],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":31,"cited_by_percentile_year":{"min":94,"max":95},"biblio":{"volume":"62","issue":"10","first_page":"2096","last_page":"2100"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10796","display_name":"Cooperative Diversity in Wireless Networks","score":0.9997,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10796","display_name":"Cooperative Diversity in Wireless Networks","score":0.9997,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Cryptography and Error-Correcting Codes","score":0.9596,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Machine Learning for Internet Traffic Classification","score":0.9586,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"keyword":"homomorphic mac","score":0.6673},{"keyword":"authentication","score":0.3661},{"keyword":"coding","score":0.3638},{"keyword":"small key size","score":0.3586}],"concepts":[{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.9165712},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.70394355},{"id":"https://openalex.org/C141492731","wikidata":"https://www.wikidata.org/wiki/Q1052621","display_name":"Message authentication code","level":3,"score":0.593866},{"id":"https://openalex.org/C179518139","wikidata":"https://www.wikidata.org/wiki/Q5140297","display_name":"Coding (social sciences)","level":2,"score":0.5897602},{"id":"https://openalex.org/C138293262","wikidata":"https://www.wikidata.org/wiki/Q1089578","display_name":"Linear network coding","level":3,"score":0.5265375},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.49427986},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.49382862},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.4694616},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.34971774},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.34909338},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3175819},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.2980808},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.19431046},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.088512},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/tc.2012.135","pdf_url":null,"source":{"id":"https://openalex.org/S157670870","display_name":"IEEE Transactions on Computers","issn_l":"0018-9340","issn":["1557-9956","2326-3814","0018-9340"],"is_oa":false,"is_in_doaj":false,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[],"grants":[],"referenced_works_count":20,"referenced_works":["https://openalex.org/W1521680667","https://openalex.org/W1666539389","https://openalex.org/W1983596191","https://openalex.org/W2032976609","https://openalex.org/W2037515303","https://openalex.org/W2078865458","https://openalex.org/W2100278608","https://openalex.org/W2101056008","https://openalex.org/W2103896940","https://openalex.org/W2105831729","https://openalex.org/W2107520978","https://openalex.org/W2119087823","https://openalex.org/W2130093830","https://openalex.org/W2146985636","https://openalex.org/W2149863032","https://openalex.org/W2153098283","https://openalex.org/W2158027144","https://openalex.org/W2158690831","https://openalex.org/W2160341974","https://openalex.org/W4300349690"],"related_works":["https://openalex.org/W2887779253","https://openalex.org/W2166668397","https://openalex.org/W2048910752","https://openalex.org/W2116285675","https://openalex.org/W2101056008","https://openalex.org/W1533309011","https://openalex.org/W3048245612","https://openalex.org/W1980599209","https://openalex.org/W4220718301","https://openalex.org/W1555715488"],"ngrams_url":"https://api.openalex.org/works/W2048910752/ngrams","abstract_inverted_index":{"Recently,":[0],"homomorphic":[1,92,135],"message":[2],"authentication":[3,95],"code":[4],"(MAC)":[5],"schemes":[6],"have":[7],"been":[8],"proposed":[9,100,134],"to":[10,30,121],"resist":[11],"against":[12],"pollution":[13],"attacks":[14],"in":[15,83,96],"network":[16,97],"coding.":[17,98],"However,":[18],"existing":[19],"methods":[20],"face":[21],"a":[22,31,62,103],"common":[23],"challenge:":[24],"the":[25,50,76,133],"generated":[26],"MAC":[27,93,136],"t":[28],"belongs":[29],"small":[32],"finite":[33],"field":[34],"F":[35],"q":[38],",":[39,75],"which":[40,66],"means":[41],"that":[42,129],"an":[43,90],"adversary":[44],"could":[45,80,117],"attack":[46],"by":[47],"randomly":[48],"guessing":[49],"value":[51],"of":[52],"t,":[53],"and":[54,141],"succeed":[55],"with":[56,126],"probability":[57],"1/q.":[58],"Since":[59],"q":[60],"is":[61,67],"predetermined":[63],"system":[64],"parameter":[65,106],"typically":[68],"set":[69],"as":[70],"2":[71],"8":[74],"resulted":[77],"security":[78,105,123],"1/256":[79],"be":[81,118],"unsatisfactory":[82],"practice.":[84],"In":[85],"this":[86],"paper,":[87],"we":[88],"propose":[89],"efficient":[91],"for":[94],"The":[99],"method":[101],"achieves":[102],"reliable":[104],"1/q":[107],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">l":[110],"using":[111,130],"only":[112],"one":[113],"key,":[114],"where":[115],"l":[116],"chosen":[119],"according":[120],"different":[122],"requirements.":[124],"Compared":[125],"previous":[127],"approaches":[128],"multiple":[131],"tags,":[132],"has":[137],"both":[138],"low":[139],"computation":[140],"communication":[142],"overheads.":[143]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2048910752","counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2020,"cited_by_count":4},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":5},{"year":2017,"cited_by_count":3},{"year":2016,"cited_by_count":4},{"year":2015,"cited_by_count":7},{"year":2014,"cited_by_count":2},{"year":2013,"cited_by_count":1}],"updated_date":"2024-03-26T12:43:31.251769","created_date":"2016-06-24"}