参考文献 [ 1 ] Ahlswede R, Cai N, Li S Y R, et al. Network Information Flow[J]. IEEE Transactions on Information Theory,2000,46(4):1204-1216. [ 2 ] Gkantsidis C, Rodriguez P. Cooperative Security for Network Coding File Distribution [C] / / Proceedings of the 25th IEEE International Conference on Computer Communications. Washington D. C. ,USA:IEEE Press, 2006:1-13. [ 3 ] Boneh D,Freeman D, Katz J, et al. Signing a Linear Subspace:Signature Schemes for Network Coding[C] / / Proceedings of 2009 Conference on Public Key Cryptography. Berlin,Germany:Springer,2009:68-87. [ 4 ] Adeli M,Liu H. On the Inherent Security of Linear Network Coding [ J ]. Communications Letters, 2013, 17(8):1668-1671. [ 5 ] 罗 蛟. 安全多源网络编码环签名方案[EB / OL]. (2012-04-12). http:/ / www. paper. edu. cn. [ 6 ] 彭 勇,陈愈强,严文杰. 一种安全的多源网络编码签名算法[ J ]. 计算机工程与应用, 2012, 48 (30): 135-139. [ 7 ] Vajda I. Signatures for Multi-source Network Coding[EB / OL]. ( 2010-06-04 ). http:/ / eprint. iacr. org / 2010/ 328. [ 8 ] Agrawal S,Boneh D,Boyen X,et al. Preventing Pollution Attacks in Multi-source Network Coding [ C ] / / Proceedings of 2010 Conference on Public Key Cryptography. Berlin,Germany:Springer,2010:161-176. [ 9 ] Yang H,Yang M. An Unconditionally Secure Authentication Code For Multi-source Network Coding [ J ]. International Journal of Wireless and Microwave Technologies,2012,2(1):45-49. [10] Shao Jun,Zhang Jinlin,Ling Yun,et al. Multiple Sources Network Coding Signature in the Standard Model[M] / / Pathan M,Wei Guiyi,Fortino G. Internet and Distributed Computing Systems. Berlin, Germany: Springer,2013: 195-208. [11] Krohn M N, Freedman M J, Mazieres D. On-the-fly Verification of Rateless Erasure Codes for Efficient Content Distribution [ C ] / / Proceedings of IEEE Symposium on Security and Privacy. Oakland, USA: IEEE Press,2004:226-240. [12] Boneh D, Gentry C, Lynn B, et al. Aggregate and Verifiably Encrypted Signatures from Bilinear Maps[C] / / Proceedings of EUROCRYPT’ 03. Berlin, Germany:Springer-Verlag,2003:416-432. [13] 牛淑芬,王彩芬. 多源线性网络编码的同态签名算法[J]. 计算机工程,2012,38(2):126-128. [14] 牛淑芬,王彩芬,刘雪艳. 抵御污染攻击的双源网络编码签名算法[J]. 计算机应用,2011,31(6):1512-1514. [15] 严文杰. 网络编码签名算法[D]. 武汉:武汉理工大学,2010. [16] The Pairing-based Cryptography Library [ EB / OL ]. (2010-07-15). http:/ / crypto. stanford. edu / pbc / . 编辑 陆燕菲 |