期刊文献+

一种基于椭圆曲线的社交网络协议

An elliptic curve-based protocol for Social Networks
下载PDF
导出
摘要 为了解决社交网络(SNS)易遭受中间友人攻击的缺点,提出了一个新协议,通过结合异或(XOR)编码,并引入杂凑函数、消息认证等密码学机制,使得提出的协议简单易行且为轻量级。通过安全性分析和计算量分析,证明该协议能够有效地抵抗中间友人攻击和重放攻击,同时较大程度降低计算量,节省存储空间。 In order to resist friend-in-middle attack in Social Networks(SNS), a new protocol is proposed to solve above issues. Combined with Exclusive OR(XOR) coding, cryptology schemes of hash function and message authentication, the protocol is easy to be carried out and light-weighted. Through security and computing overhead analysis, the protocol has been proved to be efficient in resisting friend-in-middle attack and replay attack, as well as largely reducing computation overhead, cutting down the storage space. As other protocols at present can not efficiently solve above issues, the new one is evidently advanced and applicable.
出处 《太赫兹科学与电子信息学报》 2013年第2期299-303,共5页 Journal of Terahertz Science and Electronic Information Technology
基金 国家重点基础研究发展计划资助项目(973计划)(2012CB315905) 高等学校博士学科点专项科研基金资助项目(20091102110004)
关键词 社交网络 中间友人攻击 椭圆曲线 XOR编码 轻量级 Social Networks friend-in-middle-attack elliptic curve Exclusive OR coding light-weighted
  • 相关文献

参考文献8

  • 1陈虹志,周安民,邓赟.基于网络环境安全的可信访问控制策略[J].信息与电子工程,2010,8(4):463-466. 被引量:1
  • 2XU L,Chainan S,Takizawa H. Resisting Sybil Attack By Social Network and Network Clustering[A].Seoul,2011.15-21.
  • 3Fong L. Preventing Sybil Attacks by Privilege Attenuation:A Design Principle for Social Network Systems[A].Oakland,California,2011.263-278.
  • 4Huber M,Mulazzani M,Kitzler G. Friend-in-the-middle attacks,Exploiting Social Networking Sites foe Spam[J].IEEE Computer Society,2011,(03):28-34.
  • 5Ding X,Zhang L,Wan Z. A Brief Survey on De-anonymization Attacks in Online Social Networks[A].Taiyuan,2010.611-615.
  • 6Tripathy B K,Panda G K. A New Approach to Manage Security Against Neighborhood Attacks in Social Networks[A].athens,Greek,2010.264-269.
  • 7Zhou B,Pei J. Preserving privacy in social networks against neighborhood attacks[A].ICDE,2008.506-515.
  • 8Du X,Guizani M,Xiao Y. A Routing-Driven Elliptic Curve Cryptography Based Key Management Scheme for Heterogeneous Sensor Networks[J].{H}IEEE Transactions on Wireless Communications,2009,(03):1223-1229.

二级参考文献7

  • 1Sandhu R S,Coyne E J,Feinstein H,et al.Role-based access control models[J].IEEE Computer,1996,29(2):38-47.
  • 2Covington M J,Long W,Srinivasan S,et al.Securing context-aware applications using environment role[C] // College of Computing Georgia Institute of Technology Atlanta,Georgia USA:[s.n] ,2000:10-20.
  • 3Miao Liu,He-Qing Guo,Jin-Dian Su.An attribute and role based access control model for Web services[C] // Machine Learning and Cybernetics,Proceedings of 2005 International Conference,Guangzhou:[s.n] ,2005:1302-1306.
  • 4Sadnghi A Selhorst M Stuble C.TCG TPM Main Specification[Z].Version 1.2 Revision 94,Part1,Design Principles,2006.
  • 5Sadnghi A Selhorst M Stuble C.TCG TPM Main Specification[Z].Version 1.2 Revision 94,Part2,TPM Structures,2006.
  • 6董理君,余胜生,杜敏,周敬利.一种基于环境安全的角色访问控制模型研究[J].计算机科学,2009,36(1):51-54. 被引量:12
  • 7刘伟,刘嘉勇.一种基于扩展角色的访问控制模型和方法[J].信息与电子工程,2009,7(1):76-79. 被引量:4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部