Encryption scheme with mixed homomorphic signature based on message authentication for digital image
To improve the digital image’s antipollution attack performance, an antipollution attack scheme with mixed homomorphic signature based on message authentication is proposed. Firstly, a model is created for the coding process of the digital image by dint of source node set, non-source code set, and link set of the directed multigraph, and with two types of attack in mind, the network antipollution model is established, i.e., data pollution attack and label pollution attack. Secondly, the MACs and D-MACs as well as homomorphic signature scheme of Sign are used to establish mixed homomorphic signature scheme, improve the message verification process of antipollution attack model, guarantee the integrity of the content in each MAC coding data package, and raise the execution efficiency of the algorithm; lastly, the three indices of percentage of polluted nodes, flow cumulative distribution, and computational efficiency for the proposed algorithm were compared in the experiment in the experimental simulative environment of ASNC mechanism, to verify the performance advantages of the proposed algorithm.
KeywordsMessage authentication Homomorphic signature Digital image Encryption scheme
We are grateful for the fund from Key laboratory Open Fund with No. 20120316.
- 1.Catalano D (2014) Homomorphic signatures and message authentication codes. In: International Conference on Security and Cryptography for Networks. Springer, Berlin, pp 514–519Google Scholar
- 3.Zhang P, Yu J, Wang T (2012) A homomorphic aggregate signature scheme based on lattice. Chin J Electron 21(4):701–704Google Scholar
- 4.Wang Z (2012) Improvement on Ahn et al.’s RSA P-homomorphic signature scheme. In: Security and privacy in communication networks. Springer, Berlin, pp 19–28Google Scholar
- 5.Wang Z (2012) Improvement on Ahn et al.’s RSA P-homomorphic signature scheme. In: International Conference on Security and Privacy in Communication Systems. Springer, Berlin, pp 19–28Google Scholar
- 6.Gahi Y, Guennoun M, Elkhatib K (2015) A secure database system using homomorphic encryption schemes. Comput Sci. arXiv:1512.03498v1 [cs.CR]
- 7.Han JL, Ming Y, Wang ZL (2011) Fully homomorphic encryption scheme extended to large message space. In: International Conference on Instrumentation. IEEE, pp 533–536Google Scholar
- 8.Yang P, Gui X, An J et al (2015) An encrypted image editing scheme based on homomorphic encryption. In: IEEE Conference on Computer Communications Workshops. IEEE, pp 109–110Google Scholar
- 9.Bos JW, Lauter K, Loftus J et al (2013) Improved security for a ring-based fully homomorphic encryption scheme. In: IMA International Conference on Cryptography and Coding. Springer, Berlin, pp 45–64Google Scholar
- 10.Castagnos G (2007) Towards a DL-based additively homomorphic encryption scheme. In: International Conference on Information Security. Springer, Berlin, pp 362–375Google Scholar