期刊文献+

利用RSA与信任的CliqueNet接入策略

Accessing policy of CliqueNet based on RSA public-key and trust mechanism
下载PDF
导出
摘要 随着网络应用的迅速发展,因暴露通信双方的身份及商业领域的敏感信息对人们造成的影响日趋严重,从而导致人们匿名的要求越来越强。CliqueNet是一个自组织的P2P匿名协议,具有强匿名性、良好的可扩展性。然而CliqueNet网络无法抵抗扑攻击。在文中对其结点加入的规则进行了改进,添加了基于RSA的公钥机制,使结点以随机的形式加入clique网络,增加了CliqueNet抗拓扑攻击的能力;同时引入了基于阈值控制的信任体制,降低了RSA公钥加密机制的计算复杂度,保证结点加入网络效率并提高了CliqueNet网络的安全性能。 With the rapid development of network applications,the impact of exposing the identity of communications and commercial sensitive information is becoming more and more serious,which results in much more requirements about anonymous. CliqueNet is a peer-to-peer,self-organizing,and scalable anonymous communication protocol.However,CliqnuNet does not resist topology attacks.In this paper,the accessing rules and add RSA public-key mechanism is improved,thus the accessing protocol takes the decision on which clique to join out of the hands of the joining node and prohibit topology attacks efficiently.Then threshold based trust mechanism is introduced,which reduces the computing complexity of RSA public-key encryption,ensures the node accessing network efficiency and improves the CliqueNet security performance.
出处 《计算机工程与应用》 CSCD 北大核心 2009年第7期119-122,共4页 Computer Engineering and Applications
基金 国家自然科学基金重点项目No.60633020 国家自然科学基金No.60503008 陕西师范大学校级重点科研项目~~
关键词 CliqueNet协议 拓扑攻击 RSA公钥 信任机制 阈值 CliqueNet topology attack RSA public-key trust mechanism threshold
  • 相关文献

参考文献23

  • 1陆天波,方滨兴.Internet上匿名技术研究[C]..全国网络与信息安全技术研讨会.,2005.. 被引量:1
  • 2Sherwood R,Bhattacharjee B,Srinivasan A.P5:A protocol for scalable anonymous communication[C]//Proceedings of the 2002 IEEE Symposium on Security and Privacy.[S.l.]:IEEE Computer Society Press, 2002: 58-70. 被引量:1
  • 3Reiter M K,Rubin A D.Crowds:anonymity for Web transaction[J]. ACM TISSEC, 1998,1 ( 1 ) : 66-92. 被引量:1
  • 4Reiter M K,Rubin A D.Anonymous Web transaction with crowds[J]. Communications of the ACM,1992,42(2). 被引量:1
  • 5Clarke I,Sandberg O,Wiley B,et al.Freenet:A distributed anonymous information storage and retrieval system[C]//Proceedings of International Workshop on Design Issues in Anonymity and Unobservability, July 2000: 46-66. 被引量:1
  • 6Reed M,Syverson P,Goldschlag D.Anonymous connections and onion routing[J].IEEE Journal on Selected Areas in Communications, 1998,16(4) : 482-494. 被引量:1
  • 7Freedman M J,Morris R.Tarzan:A peer-to-peer anonymizing network layer[C]//CCS' 02, ACM, 2002-11. 被引量:1
  • 8Rennhard M, Plattner B.Introducing morphMix: peer -to-peer based anonymous internet usage with collusion detection[C]//Preceedings of the 2004 International Conference on Parallel and Distributed Processing Techniques and Applications(PDPTA 2004),June 2004: 1102-1106. 被引量:1
  • 9Chaum D.Untraeeable electronic mail,return addresses,and digital pseudonyms[J].Communications of the ACM, 1981,24 (2) : 84-90. 被引量:1
  • 10吴振强,马建峰.一种无线Ad Hoc网络动态混淆匿名算法[J].计算机研究与发展,2007,44(4):560-566. 被引量:8

二级参考文献62

共引文献345

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部