期刊文献+

基于计数布鲁姆过滤器删除运算的高效远程集合调和算法

Efficiently Reconciliating Remote Sets Using Counting Bloom Filters' Deletion Operator
下载PDF
导出
摘要 该文基于计数布鲁姆过滤器的删除运算构建了一种远程集合调和算法,理论分析和实验结果表明,基于计数布鲁姆过滤器删除运算的远程集合调和算法能够较好地完成远程集合高效求解集合并集的问题,仅有少量差集元素被遗漏,调和成功率较高,而且可通过参数的调整将调和成功率提高至100%。 A new set reconciliation algorithm was examined,which reconciliates remote two sets using counting Bloom filters' deletion operator.The theoretical analysis and experimental results show that the algorithm can complete reconciliation between remote sets efficiently.Only a very small number of differential elements are missing in the reconciliation process,and the reconciliation success rate is high,and can be increased to 100% by adjusting algorithm parameters.
作者 田小梅 李浪 许琼方 TIAN Xiao-mei;Li Lang;Xu Qiong-fang(College of Computer Science and Technology,Hengyang Normal University,Hengyang Hunan 421002,China;Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hcngyang Hunan 421002,China)
出处 《衡阳师范学院学报》 2018年第3期19-23,共5页 Journal of Hengyang Normal University
基金 国家自然科学基金项目(61572174 61772178) 湖南省科技计划资助项目(2016TP1020) 衡阳师范学院智能信息处理与应用湖南省重点实验室开放基金资助项目
关键词 计数布鲁姆过滤器 数据同步 删除运算 集合调和 counting Bloom filter data synchronization deletion operator set reconciliation
  • 相关文献

参考文献3

二级参考文献54

  • 1CHANG E C, FEDYUKOVYCH V, LI Qi-ming. Secure sketch for multi-sets[ EB/OL]. (2006-03). http//citeseerx.ist. psu. edu/viewdoc/summary? doi = 10.11.60. 1939.
  • 2TSAI C S,LEE C C, HWANG M S. Password authentication schemes: current status and key issues [ J ]. International Joural of Network Security,2006,93 ( 2 ) : 101-115.
  • 3LEE J K, RYU S R, YOO K Y. Finger-based remote user authentication scheme using smart cards [ J ]. Electronics Letters, 2006,38 (12) :554-555.
  • 4CLARK P C, HOFFMAN L J. BITS : a smartcard protected operating system[J]. Communications of the ACM ,1994,37(11) :66-94.
  • 5JAIN A K,ROSS A,PANKANTI S. Biometrics: a tool for information security[ J ]. IEEE Information Forensics and Security, 2006,1 (2) :125-143.
  • 6SIYAL M Y, AHMED F. A biometric-based scheme for enhancing security of cryptographic keys [C]//Proc of IEEE Region 10 Conference. Piscataway, NJ : IEEE Press ,2004:407-410.
  • 7HAMILTON S S, CARLISLE M C, HAMILTON J A. A global look at authentication[ C ]//Proc of IEEE SMC Information Assurance and Security Workshop. West Point, NY : [ s. n. ] ,2007 : 1-8.
  • 8FRYKHOLM N, JUEKS A. Error-tolerant password recovery [ C ]// Proc of the 8th ACM Conference on Computer and Communications Security. New York : ACM Press,2001 : 1 - 8.
  • 9MENEZES A, OORSCHOT P V, VANSTONE S A. Handbook of applied cryptography[M]. [ S. l. ] :CRC Press, 1996.
  • 10SHAMIR A. How to share a secret[ J]. Communications of the Association for Computing Machinery, 1979,22( 11 ) :612-613.

共引文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部