期刊文献+

p2p网络自服务访问控制协议设计 被引量:2

Self-service Acess Control Protocol of p2p Network
下载PDF
导出
摘要 纯分散式p2p(peer-to-peer)网络中没有中心服务器,网络的各种安全服务由网络组内节点联合完成。本文研究了应用门限密码学方法实现p2p网络访问控制服务的问题。在分析前人访问控制协议安全漏洞基础上,以门限签名机制为核心,设计了由一系列安全门限运算协议构成的多方参与p2p网络自服务访问控制协议。整个协议过程不需要中心服务器参与。文章分析了协议的安全性、鲁棒性和效率。  In fully distributed peer-to-peer systems,secure services have to be fulfilled by the union of peer-group members because there is no centralized authority.This paper investigates the application of threshold cryptography for membership control in p2p system .We analyze the secure flaws in prior works and design a multi-party self-service p2p access control protocol on the basis of threshold computation protocols.No centralized authority is needed through the whole protocol process.The analysis of security,robust and efficiency is provided.
出处 《微计算机信息》 北大核心 2007年第05X期69-71,共3页 Control & Automation
基金 发改委下一代互联网示范工程"视频多媒体点播系统"(CNGI-04-15-2A)
关键词 P2P网络 动态节点组 访问控制 门限密码学 peer-to-peer network, Dynamic peer group,Access control, Threshold cryptography
  • 相关文献

参考文献13

  • 1R.Gennaro,S.Jarecki,H.Krawczyk,and T.Rabin.Robust threshold DSS signatures In Information and Computation,Volume 164,?Issue 1,Pages:54-84 2001.
  • 2R.Gennaro,M.Rabin,and T.Rabin.Simplified VSS and fasttrack multiparty computations with applications to threshold cryptography.In Proc.17th ACM Symp.on Principles of Distributed Computation.ACM,1998.
  • 3L.Harn.Group oriented (t; n) digital signature scheme.IEEE Proceedings.Computers and Digital Techniques,141(5),September 1994.
  • 4I.Ingemarsson,,and G.J.Simmons.A Protocol to Set Up Shared Secret Schemes Without the Assistance of a Mutualy Trusted Party.In I.B.Damg?rd,editor,Advances in Cryptology-Eurocrypt'91,Lecture Notes in Computer Science,No.473,pp.266-282.Springer-Verlag,1990.
  • 5S.Jarecki.Efficient threshold cryptosystems,MIT PhD thesis,2001.
  • 6S.Jarecki,N.Saxena,and J.H.Yi.An Attack on the Proactive RSA Signature Scheme in the URSA Ad Hoc Network Access Control Protocol.In SASN'04,October 25,2004,Washington,DC,USA.
  • 7Y.Kim,D.Mazzocchi,and G.Tsudik.Admission control in peer groups.In IEEE International Symposium on NetworkComputing and Applications (NCA),Apr.2003.
  • 8J.Kong,P.Zerfos,H.Luo,S.Lu,and L.Zhang.Providing robust and ubiquitous securitysupport for mobile ad-hoc networks.In IEEE ICNP,2001.
  • 9H.Luo,J.Kong,P.Zerfos,S.Lu,and L.Zhang.URSA:Ubiquitous and Robust Access Control for Mobile Ad Hoc Networks.In IEEE/ACM Transactions on Networking,Oct 2004.
  • 10M.Narasimha,G.Tsudik,and J.Yi.On the Utility of Distributed Cryptography in p2p and MANETs:the Case of Membership Control.In:IEEE ICNP.(2003),336-345.

二级参考文献1

  • 1Ham LNew digital signature scheme based on discrete logarithm.Electronics Letters,1994;30(5):396~398

共引文献14

同被引文献10

  • 1杜跃进,崔翔.僵尸网络及其启发[J].中国数据通信,2005,7(5):9-13. 被引量:14
  • 2金双民,郑辉,段海新.僵尸网络研究系列文章之二 设计自动识别系统[J].中国教育网络,2006(7):44-46. 被引量:4
  • 3G Gu, J. Zhang and W. Lee. BotSniffer: Detecting Botnet Com-mand and Control Channels in Network Traffic[A].In Proc. NDSS' 08[C],2008.
  • 4国家计算机网络应急技术处理协调中心.CNCERT/CC网络安全工作报告.http://www.cert.org.cn.
  • 5The Honeynet Project & Research Alliance, “Know your Enemy: Tracking Botnets-Using honeynets to learn more about Bots”, http://www.honeynet.org/, Mar. 2005.
  • 6E. Cooke, F. Jahanian, and D. McPherson, “The Zombie Roundup: Understanding, Detecting, and Disrupting Botnets, Proc. of Steps to Reducing Unwanted Tra#c on the Internet Workshop (SRUTI ' 05), Boston, 2005.
  • 7James R. Binkley and Suresh Singh, "An Algorithm for Anomaly-based Botnet Detection", Computer Science, PSU, USENIX SRUTI: ' 06 2nd Workshop on Steps to Reducing Unwanted Traffic on the Internet, July 7 2006.
  • 8Cliff Zou, David Dagon and Wenke Lee. Modeling and Measuring Botnets, SRI International ARO-DARPA-DHS Special Workshop on Botnets, Arlington, VA, June 22, 2006.
  • 9D. Dagon, G. Gu, C. Zou, J. Grizzard et al.A Taxonomy of Botnets, 2005 NSF Cyber Trust Principal Investigators Meeting Newport Beach, Calif, Sept. 25-27, 2005.
  • 10孔雪辉,王述洋,黎粤华.面向网络安全的关于僵尸网络的研究[J].中国安全科学学报,2009,19(7):110-118. 被引量:5

引证文献2

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部