期刊文献+

适用于P2P网络的分布式认证机制

Distributed authentication scheme for P2P networks
下载PDF
导出
摘要 针对现有认证方案不能适应P2P网络动态性强的特点,对现有的门限签名方案进行了研究,提出了一种分布式认证机制。采用了基于门限签名的动态认证方案,将网络中的节点分成若干个共享组,并在共享组中使用可验证的门限签名算法。当网络中的总节点数改变时,参与认证的节点数也会相应的改变,这种机制具有很强的动态性,更适应不断改变的P2P网络。仿真实验结果表明,该机制在参数选取得当时能够满足P2P网络的安全需求。 The existing authentication scheme is not quite suitable for P2P networks, because nodes may join and withdraw from networks frequently. To solve this problem, a novel distributed authentication scheme based on dynamic threshold signature algorithm is presented. Nodes in the network are divided into a number of shared groups, and a verifiable threshold signature algorithm is used in each share group. When the overlay network becomes larger or smaller, the needed number of nodes in the authentication process changes correspondingly. The experiments show that the distributed authentication scheme can do better in the P2P networks when the parameters are properly chose.
出处 《计算机工程与设计》 CSCD 北大核心 2010年第19期4175-4177,4212,共4页 Computer Engineering and Design
关键词 P2P 门限签名 分布式认证 共享组 动态性 PeerSim P2P threshold signature distributed authentication share group dynamic PeerSim
  • 相关文献

参考文献8

  • 1郑纬民,胡进锋,代亚非,等.对等计算研究概论[R].2004中国计算机科学技术发展报告.北京:清华大学出版社,2005.
  • 2Ting-Yi Chang,Chou-Chen Yang,Min-Shiang Hwang.A threshold signature scheme for group communications without a shared distribution center[J].Future Generation Computer Systems,2004,20(6):1013-1021.
  • 3谢琪.两种门限签名方案的密码学分析及其改进[J].通信学报,2005,26(7):123-128. 被引量:16
  • 4Kong Jiejun,Petros Zerfos,Luo Haiyun,et al.Providing robust and ubiquitouss ecurity support for mobile ad hoc networks[C].Proceedings of the 9th IEEE International Conference on Network Protocols.IEEE Computer Society,2001:251-260.
  • 5Nitesh Saxena,Gene Tsudik,Jeong H Yi.Experimenting with admission control in P2P[C].Proceedings of the International Workshop on Advanced Developments in System and Software Security,2003.
  • 6甘元驹,施荣华.一种高效的可验证的门限签名方案[J].电子科技大学学报,2003,32(2):199-202. 被引量:11
  • 7李国文,李大兴.一种可验证的门限RSA签名方案[J].计算机应用研究,2007,24(5):153-155. 被引量:1
  • 8Jelasity M,Jesi GF,Montresor A,et al.PeerSim P2P simulator[EB/OL].http://pccrsim.sourceforge.net/,2004.

二级参考文献14

  • 1XIE Qi 1,2, YU Xiu-yuan 3 1.Department of Mathematics, Zhejiang University, Hangzhou 310027, Zhejiang,China,2.School of Information and Engineering, Hangzhou Teachers College, Hangzhou 310012, Zhejiang, China,3.Hangzhou Teachers College, Hangzhou 310012, Zhejiang, China.A New (t, n) Threshold Signature Scheme Withstanding the Conspiracy Attack[J].Wuhan University Journal of Natural Sciences,2005,10(1):107-110. 被引量:13
  • 2DESMEDT Y,FRANKEL Y.Shared generation of authenticators and signatures:proceedings of Advances in Cryptology-Crypto'91[C].Berlin:Springer-Verlag,1992:457-469.
  • 3GENNARO R,JARECKI S,KRAWCZYK H,et al.Robust threshold DSS signatures:proceedings of Advances in Cryptology-Eurocrypt'96[C].Berlin:Springer-Verlag,1996:354-371.
  • 4SHOUP V.Practical threshold signatures:proceedings of Advances in Cryptology-Eurocrypt'2000[C].Berlin:Springer-Verlag,2000:207-220.
  • 5SHAMIR A.How to share a secret[J].Communications of the ACM,1979,22(11):612-613.
  • 6FELDMAN P.A practical scheme for non-interactive verifiable secret sharing:proc.of the 28th Annual IEEE Symp on Foundation of Computer Science[C].New York:IEEE Computer Society Press,1987:427-437.
  • 7BONEH D,FRANKLIN M.Efficient generation of shared RSA keys:proc.of Advances in Cryptology-CRYPTO'97[C].Berlin:Springer-Verlag,1997:425-439.
  • 8DAMGARD I,KOPROWSKI M.Practical threshold RSA signatures without a trusted dealer:proc.of Eurocrypt'2001[C].Berlin:Springer-Verlag,2001:152-165.
  • 9徐秋亮.改进门限RSA数字签名体制[J].计算机学报,2000,23(5):449-453. 被引量:63
  • 10王贵林,卿斯汉.几个门限群签名方案的弱点[J].软件学报,2000,11(10):1326-1332. 被引量:61

共引文献24

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部