References
Chang J Y, Shao B L, Ji Y Y, et al. Comment on “a tag encoding scheme against pollution attack to linear network coding”. IEEE Trans Parallel Distrib Syst, 2020, 31: 2618–2619
Boneh D, Freeman D, Katz J, et al. Signing a linear subspace: signature schemes for network coding. In: Proceedings of International Workshop on Public Key Cryptography, 2009. 68–87
Chang J Y, Wang H Q, Wang F, et al. RKA security for identity-based signature scheme. IEEE Access, 2020, 8: 17833–17841
Agrawal S, Boneh D. Homomorphic MACs: MAC-based integrity for network coding. In: Proceedings of International Conference on Applied Cryptography and Network Security, 2009. 292–305
Ji Y Y, Shao B L, Chang J Y, et al. Privacy-preserving certificateless provable data possession scheme for big data storage on cloud, revisited. Appl Math Comput, 2020, 386: 125478
Chen F, Xiang T, Yang Y Y, et al. Secure cloud storage meets with secure network coding. IEEE Trans Comput, 2016, 65: 1936–1948
Zhang R, Ma H, Lu Y, et al. Provably secure cloud storage for mobile networks with less computation and smaller overhead. Sci China Inf Sci, 2017, 60: 122104
Shacham H, Waters B. Compact proofs of retrievability. J Cryptol, 2013, 26: 442–483
Acknowledgements
This work was supported in part by National Natural Science Foundation of China (Grant Nos. 61672416, 61872284, 61772514, 61672059), in part by National Key R&D Program of China (Grant No. 2017YFB1400700), and in part by Beijing Municipal Science & Technology Commission (Grant No. Z191100007119006).
Author information
Authors and Affiliations
Corresponding author
Supporting information
Rights and permissions
About this article
Cite this article
Chang, J., Shao, B., Ji, Y. et al. Secure network coding from secure proof of retrievability. Sci. China Inf. Sci. 64, 229301 (2021). https://doi.org/10.1007/s11432-020-2997-0
Received:
Revised:
Accepted:
Published:
DOI: https://doi.org/10.1007/s11432-020-2997-0