{"id":"https://openalex.org/W2290013323","doi":"https://doi.org/10.1109/tifs.2016.2515517","title":"Security Analysis and Improvements on Two Homomorphic Authentication Schemes for Network Coding","display_name":"Security Analysis and Improvements on Two Homomorphic Authentication Schemes for Network Coding","publication_year":2016,"publication_date":"2016-01-06","ids":{"openalex":"https://openalex.org/W2290013323","doi":"https://doi.org/10.1109/tifs.2016.2515517","mag":"2290013323"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2016.2515517","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2016.2515517","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5074509628","display_name":"Cheng Chi","orcid":"https://orcid.org/0000-0001-5603-0610"},"institutions":[{"id":"https://openalex.org/I3124059619","display_name":"China University of Geosciences","ror":"https://ror.org/04gcegc37","country_code":"CN","type":"education","lineage":["https://openalex.org/I3124059619"]},{"id":"https://openalex.org/I135598925","display_name":"Kyushu University","ror":"https://ror.org/00p4k0j84","country_code":"JP","type":"education","lineage":["https://openalex.org/I135598925"]},{"id":"https://openalex.org/I5343935","display_name":"Guilin University of Electronic Technology","ror":"https://ror.org/05arjae42","country_code":"CN","type":"education","lineage":["https://openalex.org/I5343935"]}],"countries":["CN","JP"],"is_corresponding":true,"raw_author_name":"Chi Cheng","raw_affiliation_strings":["Guangxi Key Laboratory of Trusted Software, Guilin University of Electronic Technology, Guilin, China","Hubei Key Laboratory of Intelligent Geo-Information Processing, School of Computer Science, China University of Geosciences, Wuhan, China","Institute of Mathematics for Industry, Kyushu University, Fukuoka, Japan"],"affiliations":[{"raw_affiliation_string":"Guangxi Key Laboratory of Trusted Software, Guilin University of Electronic Technology, Guilin, China","institution_ids":["https://openalex.org/I5343935"]},{"raw_affiliation_string":"Hubei Key Laboratory of Intelligent Geo-Information Processing, School of Computer Science, China University of Geosciences, Wuhan, China","institution_ids":["https://openalex.org/I3124059619"]},{"raw_affiliation_string":"Institute of Mathematics for Industry, Kyushu University, Fukuoka, Japan","institution_ids":["https://openalex.org/I135598925"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5023489409","display_name":"Jemin Lee","orcid":null},"institutions":[{"id":"https://openalex.org/I152815399","display_name":"Singapore University of Technology and Design","ror":"https://ror.org/05j6fvn87","country_code":"SG","type":"education","lineage":["https://openalex.org/I152815399"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Jemin Lee","raw_affiliation_strings":["iTrust, the Centre for Research in Cyber Security, Singapore University of Technology and Design, Singapore"],"affiliations":[{"raw_affiliation_string":"iTrust, the Centre for Research in Cyber Security, Singapore University of Technology and Design, Singapore","institution_ids":["https://openalex.org/I152815399"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100678341","display_name":"Tao Jiang","orcid":"https://orcid.org/0000-0002-8482-1046"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Tao Jiang","raw_affiliation_strings":["School of Electronics Information and Communications, Huazhong University of Science and Technology, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"School of Electronics Information and Communications, Huazhong University of Science and Technology, Wuhan, China","institution_ids":["https://openalex.org/I47720641"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5000004915","display_name":"Tsuyoshi Takagi","orcid":null},"institutions":[{"id":"https://openalex.org/I135598925","display_name":"Kyushu University","ror":"https://ror.org/00p4k0j84","country_code":"JP","type":"education","lineage":["https://openalex.org/I135598925"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Tsuyoshi Takagi","raw_affiliation_strings":["Institute of Mathematics for Industry, Kyushu University, Fukuoka, Japan"],"affiliations":[{"raw_affiliation_string":"Institute of Mathematics for Industry, Kyushu University, Fukuoka, Japan","institution_ids":["https://openalex.org/I135598925"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5074509628"],"corresponding_institution_ids":["https://openalex.org/I135598925","https://openalex.org/I3124059619","https://openalex.org/I5343935"],"apc_list":null,"apc_paid":null,"fwci":4.9221,"has_fulltext":false,"cited_by_count":48,"citation_normalized_percentile":{"value":0.95274679,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"11","issue":"5","first_page":"993","last_page":"1002"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10796","display_name":"Cooperative Communication and Network Coding","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9894000291824341,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9441999793052673,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.873089075088501},{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.7365173697471619},{"id":"https://openalex.org/keywords/linear-network-coding","display_name":"Linear network coding","score":0.7198052406311035},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5591572523117065},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.5473974347114563},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5385995507240295},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4878945052623749},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.48411262035369873},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.48113885521888733},{"id":"https://openalex.org/keywords/key-generation","display_name":"Key generation","score":0.4364233613014221},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4227589964866638},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.13920709490776062}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.873089075088501},{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.7365173697471619},{"id":"https://openalex.org/C138293262","wikidata":"https://www.wikidata.org/wiki/Q1089578","display_name":"Linear network coding","level":3,"score":0.7198052406311035},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5591572523117065},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.5473974347114563},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5385995507240295},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4878945052623749},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.48411262035369873},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.48113885521888733},{"id":"https://openalex.org/C163173736","wikidata":"https://www.wikidata.org/wiki/Q3308558","display_name":"Key generation","level":3,"score":0.4364233613014221},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4227589964866638},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.13920709490776062}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2016.2515517","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2016.2515517","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2437341818","display_name":null,"funder_award_id":"61363069","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4183358380","display_name":null,"funder_award_id":"61301166","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":40,"referenced_works":["https://openalex.org/W1521680667","https://openalex.org/W1635348707","https://openalex.org/W1666539389","https://openalex.org/W1743877615","https://openalex.org/W1878978546","https://openalex.org/W1892798954","https://openalex.org/W1909910312","https://openalex.org/W1972103862","https://openalex.org/W1996360405","https://openalex.org/W2032976609","https://openalex.org/W2043056692","https://openalex.org/W2048910752","https://openalex.org/W2078865458","https://openalex.org/W2099817583","https://openalex.org/W2100278608","https://openalex.org/W2105831729","https://openalex.org/W2106403318","https://openalex.org/W2112966684","https://openalex.org/W2138928022","https://openalex.org/W2139067481","https://openalex.org/W2143929423","https://openalex.org/W2153098283","https://openalex.org/W2158690831","https://openalex.org/W2160313770","https://openalex.org/W2160341974","https://openalex.org/W2162219773","https://openalex.org/W2171970784","https://openalex.org/W2177105478","https://openalex.org/W2478362353","https://openalex.org/W2534491645","https://openalex.org/W3100125338","https://openalex.org/W3103396173","https://openalex.org/W3140093529","https://openalex.org/W4210419940","https://openalex.org/W4232836212","https://openalex.org/W4234000857","https://openalex.org/W4300349690","https://openalex.org/W6637644075","https://openalex.org/W6674945332","https://openalex.org/W6728374566"],"related_works":["https://openalex.org/W2539930818","https://openalex.org/W4390664647","https://openalex.org/W3012147850","https://openalex.org/W4313300189","https://openalex.org/W4388150944","https://openalex.org/W2949835517","https://openalex.org/W2601739120","https://openalex.org/W4256358502","https://openalex.org/W2625655658","https://openalex.org/W2771047361"],"abstract_inverted_index":{"Recently,":[0],"based":[1],"on":[2,45,166],"the":[3,6,62,74,82,88,99,102,108,122,130,138,144,160,167],"homomorphic":[4,11],"signatures,":[5],"authentication":[7],"schemes,":[8],"such":[9],"as":[10,84,86],"subspace":[12],"signature":[13],"(HSS)":[14],"and":[15,47,56,68,78,115,140,151,153],"key":[16,110,124,146],"predistribution-based":[17],"tag":[18],"encoding":[19],"(KEPTE),":[20],"have":[21],"been":[22],"proposed":[23,103,123,131,145,161],"to":[24],"resist":[25],"against":[26,129],"pollution":[27,43,133],"attacks":[28],"in":[29],"network":[30],"coding.":[31],"In":[32,49],"this":[33],"paper,":[34],"we":[35,51,97,119,136,157],"show":[36,52,120],"that":[37,53,72,121,159],"there":[38],"exists":[39],"an":[40],"efficient":[41],"multi-generation":[42,132],"attack":[44],"HSS":[46,77,114,150],"KEPTE.":[48],"particular,":[50],"using":[54],"packets":[55,67],"their":[57,69],"signatures":[58,71],"of":[59,76,101,143],"different":[60],"generations,":[61],"adversary":[63],"can":[64,127],"create":[65],"invalid":[66],"corresponding":[70],"pass":[73],"verification":[75],"KEPTE":[79],"at":[80,87],"intermediate":[81],"nodes":[83],"well":[85],"destination":[89],"nodes.":[90],"After":[91],"giving":[92],"a":[93],"more":[94],"generic":[95],"attack,":[96],"analyze":[98,137],"cause":[100],"attack.":[104],"We":[105],"then":[106],"propose":[107],"improved":[109],"distribution":[111,125,147],"schemes":[112,126,148,162],"for":[113,149],"KEPTE,":[116,152],"respectively.":[117],"Next,":[118],"combat":[128],"attacks.":[134],"Finally,":[135],"computation":[139],"communication":[141],"costs":[142],"by":[154],"implementing":[155],"experiments,":[156],"demonstrate":[158],"add":[163],"acceptable":[164],"burden":[165],"system.":[168]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":10},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":11},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":6},{"year":2017,"cited_by_count":7},{"year":2016,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
