Homomorphic Network Coding Signatures in the Standard Model

  • Nuttapong Attrapadung
  • Benoît Libert
Conference paper

DOI: 10.1007/978-3-642-19379-8_2

Part of the Lecture Notes in Computer Science book series (LNCS, volume 6571)
Cite this paper as:
Attrapadung N., Libert B. (2011) Homomorphic Network Coding Signatures in the Standard Model. In: Catalano D., Fazio N., Gennaro R., Nicolosi A. (eds) Public Key Cryptography – PKC 2011. PKC 2011. Lecture Notes in Computer Science, vol 6571. Springer, Berlin, Heidelberg


Network coding is known to provide improved resilience to packet loss and increased throughput. Unlike traditional routing techniques, it allows network nodes to perform transformations on packets they receive before transmitting them. For this reason, packets cannot be authenticated using ordinary digital signatures, which makes it difficult to hedge against pollution attacks, where malicious nodes inject bogus packets in the network. To address this problem, recent works introduced signature schemes allowing to sign linear subspaces (namely, verification can be made w.r.t. any vector of that subspace) and which are well-suited to the network coding scenario. Currently known network coding signatures in the standard model are not homomorphic in that the signer is forced to sign all vectors of a given subspace at once. This paper describes the first homomorphic network coding signatures in the standard model: the security proof does not use random oracles and, at the same time, the scheme allows signing individual vectors on-the-fly and has constant per-packet overhead in terms of signature size. The construction is based on the dual encryption technique introduced by Waters (Crypto’09) to prove the security of hierarchical identity-based encryption schemes.


Network coding homomorphic signatures provable security standard model 

Copyright information

© International Association for Cryptologic Research 2011

Authors and Affiliations

  • Nuttapong Attrapadung
    • 1
  • Benoît Libert
    • 2
  1. 1.Research Center for Information SecurityAISTJapan
  2. 2.Crypto GroupUniversité catholique de LouvainBelgium

Personalised recommendations