期刊文献+

主动安全技术发展综述

A Survey of Proactive Security
下载PDF
导出
摘要 Proactive security provides a method for maintaining the overall security of a system,even when individual components are repeatedly broken into and controlled by an attacker. Proactive security is a non-trivial extension of (t+1,n)-threshold cryptosystems,where shares are periodically renewed (without changing the secret) in such a way that information gained by the adversary in one time period is useless for attacking the secret after the shares are renewed. In this paper,we describe the proactive approach and review some basic technologies. We also report the problems need to be study. Proactive security provides a method for maintaining the overall security of a system,even when individual components are repeatedly broken into and controlled by an attacker. Proactive security is a non-trivial extension of (t + 1 ,n)-threshold cryptosystems,where shares are periodically renewed (without changing the secret) in such a way that information gained by the adversary in one time period is useless for attacking the secret after the shares are renewed. In this paper, we describe the proactive approach and review some basic technologies. We also report the problems need to be study.
出处 《计算机科学》 CSCD 北大核心 2003年第6期27-30,共4页 Computer Science
基金 863-306-ZD-02资助
关键词 主动安全 门限密码学 数字签名 计算机网络 网络安全 Proactive security, Threshold cryptographic, Proactive secret sharing, Adaptive-secure
  • 相关文献

参考文献21

  • 1[1]Ostrovsky R,Yung M. How to withstand mobile virus attacks. In: Proc. of the 10th ACM Symposium on the Principles of Distributed Computing, 1991.51~61
  • 2[2]Herzberg A,et al. Proactive Secret Sharing or: How to Cope With Perpetual Leakage? Advances in Cryptology--Crypto 95 Proceedings, LNCS, 1995,963:339~352
  • 3[3]Ganetti R,et al. Proactive Security: Long-term protection against break-ins. RSA CryptoBytes, 1997,3:1~8
  • 4[4]Shamir A How to Share a Secret. Communications of the ACM, 1979,22.612~613
  • 5[5]Gennaro R,et al. Secure Distributed Key Generation for Discrete-Log Based Cryptosystems. Eurocrypt '99, pp. 295~310
  • 6[6]Boneh D,Franklin M. Efficient Generation of Shared RSA Keys. Crypto 97, pp. 425~439
  • 7[7]Frankel Y,MacKenzie P D,Yung M. Robust Efficient Distributed RSA-Key Generation. PODC 1998. 320
  • 8[8]Canetti R,Halevi S,Herzberg A. Maintaining Authenticated Communication in the Presence of Break-ins. Journal of Cryptology, 2000,13 61~105
  • 9[9]Gennaro R, et al. Robust Threshold DSS Signatures. Eurocrypt '96,LNCS 1070. 354~371
  • 10[10]Herzberg A,et al. Proactive Public Key and Signature Systems. ACM Conference on Computers and Communication Security, 1997

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部