Advertisement

Encryption scheme with mixed homomorphic signature based on message authentication for digital image

  • Jing Yang
  • Mingyu Fan
  • Guangwei Wang
Article
  • 49 Downloads

Abstract

To improve the digital image’s antipollution attack performance, an antipollution attack scheme with mixed homomorphic signature based on message authentication is proposed. Firstly, a model is created for the coding process of the digital image by dint of source node set, non-source code set, and link set of the directed multigraph, and with two types of attack in mind, the network antipollution model is established, i.e., data pollution attack and label pollution attack. Secondly, the MACs and D-MACs as well as homomorphic signature scheme of Sign are used to establish mixed homomorphic signature scheme, improve the message verification process of antipollution attack model, guarantee the integrity of the content in each MAC coding data package, and raise the execution efficiency of the algorithm; lastly, the three indices of percentage of polluted nodes, flow cumulative distribution, and computational efficiency for the proposed algorithm were compared in the experiment in the experimental simulative environment of ASNC mechanism, to verify the performance advantages of the proposed algorithm.

Keywords

Message authentication Homomorphic signature Digital image Encryption scheme 

Notes

Acknowledgements

We are grateful for the fund from Key laboratory Open Fund with No. 20120316.

References

  1. 1.
    Catalano D (2014) Homomorphic signatures and message authentication codes. In: International Conference on Security and Cryptography for Networks. Springer, Berlin, pp 514–519Google Scholar
  2. 2.
    Lin Q, Yan H, Huang Z et al (2018) An ID-based linearly homomorphic signature scheme and its application in blockchain. IEEE Access 6:20632–20640CrossRefGoogle Scholar
  3. 3.
    Zhang P, Yu J, Wang T (2012) A homomorphic aggregate signature scheme based on lattice. Chin J Electron 21(4):701–704Google Scholar
  4. 4.
    Wang Z (2012) Improvement on Ahn et al.’s RSA P-homomorphic signature scheme. In: Security and privacy in communication networks. Springer, Berlin, pp 19–28Google Scholar
  5. 5.
    Wang Z (2012) Improvement on Ahn et al.’s RSA P-homomorphic signature scheme. In: International Conference on Security and Privacy in Communication Systems. Springer, Berlin, pp 19–28Google Scholar
  6. 6.
    Gahi Y, Guennoun M, Elkhatib K (2015) A secure database system using homomorphic encryption schemes. Comput Sci. arXiv:1512.03498v1 [cs.CR]
  7. 7.
    Han JL, Ming Y, Wang ZL (2011) Fully homomorphic encryption scheme extended to large message space. In: International Conference on Instrumentation. IEEE, pp 533–536Google Scholar
  8. 8.
    Yang P, Gui X, An J et al (2015) An encrypted image editing scheme based on homomorphic encryption. In: IEEE Conference on Computer Communications Workshops. IEEE, pp 109–110Google Scholar
  9. 9.
    Bos JW, Lauter K, Loftus J et al (2013) Improved security for a ring-based fully homomorphic encryption scheme. In: IMA International Conference on Cryptography and Coding. Springer, Berlin, pp 45–64Google Scholar
  10. 10.
    Castagnos G (2007) Towards a DL-based additively homomorphic encryption scheme. In: International Conference on Information Security. Springer, Berlin, pp 362–375Google Scholar
  11. 11.
    Chen ZG, Wang J, Chen L et al (2014) Review of how to construct a fully homomorphic encryption scheme. Int J Secur Appl 8(2):221–230MathSciNetGoogle Scholar
  12. 12.
    Tharwat A, Elhoseny M, Hassanien AE, Gabel T, Arunkumar N (2018) Intelligent Bézier curve-based path planning model using chaotic particle swarm optimization algorithm. Cluster Comput.  https://doi.org/10.1007/s10586-018-2360-3 Google Scholar
  13. 13.
    Abdulhay E, Elamaran V, Arunkumar N, Venkatraman V (2018) Fault–tolerant medical imaging system with quintuple modular redundancy (QMR) configurations. J Ambient Intell Human Comput.  https://doi.org/10.1007/s12652-018-0748-9 Google Scholar
  14. 14.
    Abdulhay E, Arunkumar N, Narasimhan K, Vellaiappan E, Venkatraman V (2018) Gait and tremor investigation using machine learning techniques for the diagnosis of Parkinson disease. Fut Gener Comput Syst 83:366–373.  https://doi.org/10.1016/j.future.2018.02.009 CrossRefGoogle Scholar
  15. 15.
    Vardhana M, Arunkumar N, Abdulhay E (2018) Iot based real time traffic control using cloud computing. Cluster Comput.  https://doi.org/10.1007/s10586-018-2152-9 Google Scholar
  16. 16.
    Abdulhay E, Mohammed MA, Ibrahim DA, Arunkumar N, Venkatraman V (2018) Computer aided solution for automatic segmenting and measurements of blood leucocytes using static microscope images. J Med Syst.  https://doi.org/10.1007/s10916-018-0912-y Google Scholar
  17. 17.
    Arunkumar N, Ramkumar K, Venkatraman V (2018) Entropy features for focal EEG and non focal EEG. J Comput Sci.  https://doi.org/10.1016/j.jocs.2018.02.002 MathSciNetGoogle Scholar
  18. 18.
    Liu C, Arunkumar N (2018) Risk prediction and evaluation of transnational transmission of financial crisis based on complex network. Cluster Comput.  https://doi.org/10.1007/s10586-018-1870-3 Google Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  1. 1.School of Computer Science and TechnologyUniversity of Electronic Science and Technology of ChinaChengduChina

Personalised recommendations