期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Practical Secret Sharing Scheme Realizing Generalized Adversary Structure 被引量:2
1
作者 Yuan-BoGuo Jian-FengMa 《Journal of Computer Science & Technology》 SCIE EI CSCD 2004年第4期564-569,共6页
Most existing secret sharing schemes are constructed to realize generalaccess structure, which is defined in terms of authorized groups of participants, and is unable tobe applied directly to the design of intrusion t... Most existing secret sharing schemes are constructed to realize generalaccess structure, which is defined in terms of authorized groups of participants, and is unable tobe applied directly to the design of intrusion tolerant system, which often concerns corruptiblegroups of participants instead of authorized ones. Instead, the generalized adversary structure,which specifies the corruptible subsets of participants, can be determined directly by exploit ofthe system setting and the attributes of all participants. In this paper an efficient secret sharingscheme realizing generalized adversary structure is proposed, and it is proved that the schemesatisfies both properties of the secret sharing scheme, i.e., the reconstruction property and theperfect property. The main features of this scheme are that it performs modular additions andsubtractions only, and each share appears in multiple share sets and is thus replicated. The formeris an advantage in terms of computational complexity, and the latter is an advantage when recoveryof some corrupted participants is necessary. So our scheme can achieve lower computation cost andhigher availability. Some reduction on the scheme is also done finally, based on an equivalencerelation defined over adversary structure. Analysis shows that reduced scheme still preserves theproperties of the original one. 展开更多
关键词 secret sharing generalized adversary structure write structure equivalenceclass REDUCTION
原文传递
基于通用攻击结构的秘密共享方案
2
作者 Yuan-BOGuo Jian-FengMa 《Journal of Computer Science & Technology》 SCIE EI CSCD 2004年第C00期104-104,共1页
秘密共享方法已经应用到信息安全的多个领域,容忍入侵就是其应用的一个典型范例。根据容忍入侵理论,系统中任何敏感的数据或系统部件等都可以利用秘密共享技术以冗余分割的方法进行保护。例如,Stanford大学的ITTC项目就是基于门限技... 秘密共享方法已经应用到信息安全的多个领域,容忍入侵就是其应用的一个典型范例。根据容忍入侵理论,系统中任何敏感的数据或系统部件等都可以利用秘密共享技术以冗余分割的方法进行保护。例如,Stanford大学的ITTC项目就是基于门限技术构造容忍入侵的应用程序;欧盟支持的一个长期研究计划MAFTIA也主要是利用秘密共享技术来实现对Internet应用中恶意的以及偶然的故障(入侵)的容忍。 展开更多
关键词 容忍入侵 秘密共享方案 攻击 应用程序 通用 信息安全 冗余 技术构造 故障 门限
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部