期刊文献+

P2P网络的动态门限准入控制方案

Dynamic threshold admission control scheme for P2P networks
下载PDF
导出
摘要 准入控制是仲裁加入申请是否被批准的一个过程。提出一种动态门限准入控制方案即通过改变秘密多项式(fz)的阶t-1达到改变门限值t,使门限值随着网络规模大小化,从而解决了不能灵活改变阀值的局限性。该方案不仅能根据安全需求对节点进行资格审核,屏蔽掉一些不符合安全要求的节点,而且能抵抗Kim等人方案中存在的合谋攻击。 Admission control is the process of mediating every request to admittance and determining whether the request should be granted or denied.This paper presents a dynamic threshold admission control scheme.This scheme changes the threshold(t) by changing the order(t-1) of the secret polynomial(fz) to make the threshold scale with the number of members in the network.In this way,it solves the problem which can't change the threshold neatly.The scheme not only can audit a new node according to secure requirements and eliminate undesired nodes for P2P networks,but also withstand conspiracy attack that exists in Kim et al's schemes.
作者 何朱生
出处 《计算机工程与应用》 CSCD 北大核心 2010年第13期73-75,共3页 Computer Engineering and Applications
基金 广东省自然科学基金No.81510632010000022~~
关键词 门限签名 门限值 秘密共享 动态门限 threshold signature threshold secret sharing dynamic threshold
  • 相关文献

参考文献9

  • 1Luo H,Kong J,Zerfos P,et al.URSA:Ubiquitons and robust access control for mobile ad-hoc networks[J].IEEE/ACM Transactions on Networking(ToN),2004,12:1049-1063. 被引量:1
  • 2Pietro R D,Mancini L V,Zanin G.Effieient and adaptive threshold signatures for ad hoe networks[J].Electronic Notes in Theoretical Computer Science,2007,171:93-105. 被引量:1
  • 3Deng H,Mukherjee A,Agrawel D P.Threshold and identity-based key management and authentication for wireless ad hoc networks[C]//Proc of IEEE International Conferences on Formation Technology(ITCC04),2004. 被引量:1
  • 4王斌,李建华.无可信中心的(t,n)门限签名方案[J].计算机学报,2003,26(11):1581-1584. 被引量:52
  • 5李慧贤,蔡皖东,庞辽军.一个安全的动态门限签名体制[J].计算机研究与发展,2007,44(9):1545-1549. 被引量:6
  • 6Frankel Y,Gemmell P,Mackenzie P,et al.Proactive RSA[C]//Advances in Cryptology:CRYPTO'97,1997. 被引量:1
  • 7Desmedt Y.Society and group oriented cryptography:A new concept[C]//LNCS 293:Advances in Cryptology CRYPTO'87,A Conference on the Theory and Applications of Cryptographic Techuiques on Advances in Cryptology,1988:120-127. 被引量:1
  • 8Kim Y,Mazzocchi D,Tsudik G.Admission control in peer groups[C]//Proc of IEEE International Symposium on Network Computing and Applications.Cambridge,MA:[s.n.],2003:131-139. 被引量:1
  • 9Frankel Y,Gemmell P,Mackenzie P,et al.Optimal resilience proacfive public-key cryptosystems[C]//Preceedings of the 38th Annual Symposium on Foundations of Computer Science:FOCS'97,1997. 被引量:1

二级参考文献15

  • 1马春波,何大可.基于双线性映射的卡梅隆门限签名方案[J].计算机研究与发展,2005,42(8):1427-1430. 被引量:8
  • 2Desmedt Y, Frankel Y. Shared generation of authenticators. In:Proceedings of Crypto'91, Santa Barbara, California, USA, 1991.457~469 被引量:1
  • 3Wang C T, Lin C H, Chang C C. Threshold signature schemes with traceable signers in group communications. Computer Communications,1998,21(8): 771~776 被引量:1
  • 4Harn L. Group-oriented(t,n) threshold digital signature scheme and digital multisignature. IEE Proceedings of Computers and Digital and Technique,1994,141(5):307~313 被引量:1
  • 5Rosario G, Stanislaw J, Hugo K. Robust threshold DSS signatures. Information and Computation,2001,164(1):54~84 被引量:1
  • 6Agnew G B, Mulin R C, Vanstone S A. Improved digital signature scheme based on discrete exponentiation. Electronic Letters,1990,26(14):1024~1025 被引量:1
  • 7A Shamir.How to share a secret[J].Communications of the ACM,1979,22(11):612-613 被引量:1
  • 8Y Desmedt,Y Frankel.Shared generation of authenticators and signatures[C].In:J Feigenbaum ed.Advances in Cryptology-Crypro'91,LNCS 576.Berlin:Springer-Verlag,1992.457-469 被引量:1
  • 9G Rosario,J Stanislaw,K Hugo.Robust threshold DSS signatures[J].Information and Computation,2001,164(1):54-84 被引量:1
  • 10Chang Tingyi,Yang Chouchen,Hwang Minshiang.A threshold signature scheme for group communications without a shared distribution center[J].Future Generation Computer Systems,2004,20(6):1013-1021 被引量:1

共引文献55

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部