期刊文献+

基于DC-Nets的分级匿名通信系统模型 被引量:1

Scalar Anonymous System Model Based on DC-Nets
下载PDF
导出
摘要 为了解决匿名系统中匿名性和代价的权衡问题,提出了基于DC-Nets的分级匿名通信系统模型,然后描述了系统中主要协议及实现,最后对系统的效率和安全性进行了分析.相关的分析结果表明,采用该系统进行匿名通信,不仅能获得分级匿名,使用户在匿名性能和代价之间权衡,而且具有较好的可扩展性和较高的通信效率. This paper proposed scalar anonymous system model, which partitions an anonymous system based on DC-Nets into groups of different size and provides anonymity degrees at different cost. The protocol, which is used for intra-group and intergroup communication, was described and analyzed in detail The analysis results, including theoretical analysis and simulation experiments, show that this system offers good scalability, strong security, better efficiency, and provides tradeoff between anonymity and cost for users.
出处 《小型微型计算机系统》 CSCD 北大核心 2006年第3期461-465,共5页 Journal of Chinese Computer Systems
基金 国家自然科学基金项目(90104028)资助 国家留学基金 湖南大学科学基金重点项目基金(521101626)资助.
关键词 匿名通信 分级匿名 DC-Nets anonymous communications scalar anonymity degree DC-Nets
  • 相关文献

参考文献15

  • 1Atkinson R.Security architecture for the Internet protocol[S].RFC 1825,1995.
  • 2Atkinson R.IP authentication header[S].RFC 1826,1995.
  • 3Atkinson R.IP encapsulating security payload(ESP)[S].RFC 1827,1995.
  • 4Chaum D.Untraceable electronic mail,return addresses,and digital pseudonyms[J].Communications of the ACM,1981,24(2),84-90.
  • 5Syverson P,Goldschlag D,Reed M.Anonymous connections and onion routing[C].Proceedings of the IEEE Symposium on security and privacy[M].Oakland,CA,IEEE CS 1997,44-54.
  • 6Roger Dingledine,Nick Mathewson,and Paul Syverson.Tor:the second-generation onion router[C].In:the Proceedings of the 13th USENIX Security Symposium,August 2004,303-320.
  • 7Reiter M K,Rubin A D.Crowds:anonymity for Web transaction[J].ACM Transaction on Information and System Security,1998,1(1):66-92.
  • 8Freedman M J,Morris R.Tarzan:a peer-to-peer anonymizing network layer[C].In:Proceedings of the 9th ACM Conference on Computer and Communications Security(CCS 2002),Washington,D.C.,November 2002,193-206.
  • 9David Chaum.The dining cryptographers problem:unconditional sender and recipient untraceability[J].Journal of Cryptology,1988,1(1):65-75.
  • 10Torben P.Pedersen.Non-interactive and information theoretic secure verifiable secret sharing[C].Advances in Cryptology:CRYPTO91,1991,129-140.

二级参考文献6

  • 1Gilbert H, Chasse G. A statistical attack of the feal-8 cryptosystem[J]. Computer Science,1991, 537:22-33.
  • 2Andre L, M dos Santos. Statistical attack against Virtual Banks[R]. Reliable Software Group,University of California, 2000.
  • 3Reiter M K, Rubin A D. Crowds:anonymity for web transactions[J]. ACM Transactions on Information and System Security, 1998,1(1):62-92.
  • 4Stefan Savage, David Wetherall, Anna Karlin , Tom Anderson. Practical network support for IP traceback[R]. Department of Computer Science and Engineering,University of Washington, Seattle. Technical Report UW-CSE-00-02-01
  • 5Micah Adler. Tradeoffs in probabilistic packet marking for IP traceback[D]. Department of Computer Science,University of Massachusetts, Amherst, November 9,2001.
  • 6Matsui M, Yamagishi A. Statistical attack on secret key cryptosystems[J]. Electronics and Communications in Japan Part Ⅲ-Fundamental Electronic Science, Sep. 1994, 77(9):61-72.

共引文献6

同被引文献22

  • 1吴振强,马建峰.一种基于IPSec的宽带无线IP网络匿名方案与实现[J].计算机应用,2005,25(1):168-172. 被引量:1
  • 2吴振强,马建峰.基于联合熵的多属性匿名度量模型[J].计算机研究与发展,2006,43(7):1240-1245. 被引量:9
  • 3吴振强,马建峰.一种无线Ad Hoc网络动态混淆匿名算法[J].计算机研究与发展,2007,44(4):560-566. 被引量:8
  • 4张春瑞,徐恪,王开云,姜建国.基于信任向量的P2P网络信任管理模型[J].清华大学学报(自然科学版),2007,47(7):1224-1228. 被引量:12
  • 5陆天波,方滨兴.Internet上匿名技术研究[C]..全国网络与信息安全技术研讨会.,2005..
  • 6Sherwood R,Bhattacharjee B,Srinivasan A.P5:A protocol for scalable anonymous communication[C]//Proceedings of the 2002 IEEE Symposium on Security and Privacy.[S.l.]:IEEE Computer Society Press, 2002: 58-70.
  • 7Reiter M K,Rubin A D.Crowds:anonymity for Web transaction[J]. ACM TISSEC, 1998,1 ( 1 ) : 66-92.
  • 8Reiter M K,Rubin A D.Anonymous Web transaction with crowds[J]. Communications of the ACM,1992,42(2).
  • 9Clarke I,Sandberg O,Wiley B,et al.Freenet:A distributed anonymous information storage and retrieval system[C]//Proceedings of International Workshop on Design Issues in Anonymity and Unobservability, July 2000: 46-66.
  • 10Reed M,Syverson P,Goldschlag D.Anonymous connections and onion routing[J].IEEE Journal on Selected Areas in Communications, 1998,16(4) : 482-494.

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部