期刊文献+

一种基于反馈的信任生成算法 被引量:2

A Trust Generating Algorithm Based on Feedback
下载PDF
导出
摘要 安全多方计算中一般合作计算者之间互不信任,为保护私有信息通常采用零信息泄漏的安全策略,从而增加了合作计算复杂性和通信复杂性。提出了一种基于反馈的信任生成算法,通过参与者的历史行为评估其信任度,将参与者的信任度量化表示。根据参与者的信任度采取相应级别的安全措施,可降低合作的计算复杂性和通信复杂性,隔离信任值低的恶意参与者。仿真实验结果表明,该算法在安全多方计算环境中可有效遏制恶意参与者,提高合作成功率。 In secure multi-party computation,all cooperation participants are usually regarded distrust,in order to protect private information usually use zero information leakage security policy.This security policy greatly increases computational complexity and communication complexity.Propose a trust generating algorithm,through participants' history behaviors to assess their trust,express trust value in a quantitative way.Taking security policy according to participants' trust value can greatly reduce the cooperation computing complexity and insulate malicious participants.Experimental results show that this algorithm can effectively be against malicious participants and increase the ratio of success cooperation.
出处 《计算机技术与发展》 2010年第12期166-169,共4页 Computer Technology and Development
基金 国家自然科学基金项目(60703071 60773114) 安徽省优秀青年科技基金项目(08040106806) 安徽省自然科学基金项目(070412043) 安徽高校省级自然科学研究重点项目(KJ2010A133)
关键词 安全多方计算 信任 算法 secure multi-party computation trust algorithm
  • 相关文献

参考文献18

  • 1Blaze M, FeigenBaum J, Lacy J. Decentralized trust management[C]//Proceedings of the 17th Symposium on Security and Privacy. Oakland: IEEE Computer Society Press, 1996: 164 - 173.
  • 2Kamvar S D, Schlosser M T, Garcia- Molina H. The Eigentrust Algorithm for Reputation Management in P2P Networks [ C]//Proceedings of the 12th Internatiofial World Wide Web Conference. Budapest, Hungary: ACM Press, 2003:640 - 651.
  • 3唐文,陈钟.基于模糊集合理论的主观信任管理模型研究[J].软件学报,2003,14(8):1401-1408. 被引量:236
  • 4Li Xiong, Liu Ling. Peer Trust: Supporting reputation- based trust in peer- to - peer communities[J]. IEEE Transactions on Data and Knowledge Engineering, 2004,16(7) : 843 - 857.
  • 5Beth T, Borcherding M, Klein B. Valuation of Trust in Open Networks[ C]// Proceedings of the European Symposium on Research in Computer Security (ESORICS): Brighton: Springer - Verlag, 1994:3 - 18.
  • 6田春岐,邹仕洪,王文东,程时端.一种基于推荐证据的有效抗攻击P2P网络信任模型[J].计算机学报,2008,31(2):270-281. 被引量:42
  • 7Josang A. A model for trust in security systems[C]//Proceedings of the 2nd Nordic Workshop on Secure Computer Systems. New York: ACM Press, 1997.
  • 8Josang A. A logic for uncertain probabilities[J]. International Journal of Uncertainty Fuzziness and Knowledge- Based Systems,2001,9(3) :279 - 311.
  • 9胡建理,吴泉源,周斌.P2P环境下基于信誉的信任模型研究[J].计算机科学,2009,36(9):1-6. 被引量:15
  • 10Yao A C. Protocols for secure computations[ C] // Proceedings of the 23rd Annual IEEE Symposium on Foundations of Compurer Science (FOCS). Chicago, USA: [ s. n. ], 1982:160 - 164.

二级参考文献82

共引文献364

同被引文献26

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部