期刊文献+

基于投票的P2P文件真实性认证协议

A Voting-Based File Authentication Protocol
下载PDF
导出
摘要 提出了一种基于电子投票的文件真实性认证协议。需要验证文件真实性的发起者将投票请求发送给多个代理节点,由代理节点泛洪(Flood)投票并收集结果返回给发起者。发起者根据各选区的非重复选票确定文件的真实性。交互过程中使用洋葱路由和路由交换表,实现了发起者匿名、投票者匿名和文件提供者匿名。理论分析和实验表明,用该协议进行文件真实性认证,成功率在95%以上。与已有文件真实性认证协议比较,交互次数大大减少,并提供了参与者匿名。 An electronic voting-based file authentication protocol(EV-FAP) is presented. The initiator asks a number of proxies to flood an electronic voting and return the tickets collected. The initiator tallies returned tickets and determines that file is the authentic copy of the document. The protocol archives initiator anonymity, voter anonymity and provider anonymity by utilizing means of onion routing and switch route table. Theoretical analysis and experiential simulation show that the protocol can successfully authenticate the authenticity of the file searched with a probability exceeding 95 %. Compared with existing file authentication protocols, it reduces communications and provides anonymity of participants.
出处 《计算机科学》 CSCD 北大核心 2006年第8期113-117,137,共6页 Computer Science
基金 国家自然科学基金(60373041)资助项目
关键词 P2P系统 文件真实性 匿名 电子投票 洋葱路由 P2P system, File authenticity, Anonymity, Electronic voting, Onion routing
  • 相关文献

参考文献9

  • 1Saroiu S, Gummadi K P, Dunn R J, et al. An Analysis of Internet Content Delivery Systems. OSDI'02, 2002
  • 2Suryanarayana G, Taylor R N. A Survey of Trust Management and Resource Discovery Technologies in Peer-to-Peer Applications:[UCI-ISR Technical Report 04-7]. 2004
  • 3Daswani N, Garcia-Molina H, Yang B. Open Problems in Datasharing Peer-to-peer Systems. ICDT2003, 2003
  • 4Cornelli F, Damiani E, Vimercati S D C D, et al. Choosing Reputable Servents in a P2P Network. In: Proceedings of the 11th World Wide Web Conference, 2002. 441-449
  • 5Damiani E, Vimercati D C D, Paraboschi S. A Reputation-Based Approach for Choosing Reliable Resources in Peer-to-Peer Networks. In: ACM Conference on Computer and Communications Security 2002, 2002. 207-216
  • 6Maniatis P, Roussopoulos M, Giuli T, et al. Preserving Peer Replicas By Rate-Limited Sampled Voting. In: Proceedings of the 19th ACM Symposium on Operating Systems Principles, 2003
  • 7Goldschlag D M, Reed M G F P. Onion Routing for Anonymous and Private Internet Connections. Communications of the ACM,1999, 42(2): 39-41
  • 8Xiao L, Xu Z, Zhang X. Low-cost and Reliable Mutual Anonymity Protocols in Peer-to-Peer Networks. IEEE Transactions on Parallel and Distributed Systems, 2003, 14:829-840
  • 9Gnutella Protocol Specification. www. gnutella. co. uk/library/pdf/gnutella -protocol-0. 4, 2000-07

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部