期刊文献+

利用P2P的网络特性构造多态性密码 被引量:2

Construction of PMC Based on Characteristics of P2P Network
下载PDF
导出
摘要 为了解决没有第三方认证的情况下,P2P网络通信过程中对等点的授权问题,本文基于P2P网络中对等点的信任度管理,提出了利用P2P网络结构的特点来构造一个多态性密码的新方法。该理论提供了可实现的自编译的密码通用模式。多态性密码采用一个伪随机数产生器,这个产生器包含许多简单的伪随机数产生器用于产生一个混乱的序列,此序列直接和明文位进行XOR运算。 To solve the problem of authentication for two parties across a communication channel without the third party, we propose a new method of construction of the Polymorphic Cipher (PMC) by managing the trust degree of peers in peer-to-peer (P2P) network. The theory use a pseudo-random number generator which consists of a number of simple pseudo-random number generators for the generation of a confusion sequence which is directly used to XOR plaintext sequence.
出处 《微计算机信息》 北大核心 2007年第21期74-75,共2页 Control & Automation
基金 现代通信国家重点实验室基金项目的资助(51436030105DZ0105)
关键词 P2P 多态性密码 信任度 P2P, PMC, trust degree
  • 相关文献

参考文献5

  • 1朱晓姝,周娅,黄桂敏.P2P协议通用仿真器模型设计[J].微计算机信息,2006,22(05X):106-108. 被引量:5
  • 2C.B.Roellgen.“Polymorphic Cipher Theory”,[EB/OL],http://www.ciphers.de/products/polymorphic_cipher_theory.html,2004
  • 3Bruceschneier.应用密码学协议、算法与C源程序[M].北京:机械工业出版社,2000..
  • 4Douglas R.Stinson著 .冯登国译,密码学原理与实践第二版,北京,电子工业出版社,2003.
  • 5S.Chari,C.Jutla,J.R.Rao,P.Rohatgi.A cautionary Note Regarding Evaluation of AES Candidates on Smart-Cards.[EB/OL],http://citeseer.nj.nec.com/chari99cautionary.html,1999.

二级参考文献5

共引文献8

同被引文献10

  • 1左东石,孙龙清.网格与P2P计算混合模型研究[J].微计算机信息,2006(12X):126-128. 被引量:4
  • 2AhlswedeR, CaiN,LiSR,etal.Network information flow[J]. IEEE- Trans. On Information Theory, 2000 46(4):120421216.
  • 3S. Y. R. Li, R. W. Yeung, and N. Cai, "Linear Network Coding," IEEE Transactions on Information Theory, vol. 49, pp. 371, 2003.
  • 4M. Wang and B. Li, "How Practical is Network Cocing?", in Proc. Of the 14th Intl. Workshop on Quality of Service (IWQoS 2006), 2006, pp. 274 - 278.
  • 5Hassan Shojania, Baochun Li,"Parallelized Progressive Network Coding With Hardware Acceleration"
  • 6Desmedt Y, Frankel Y. Shared Generation of Authenticators and Signatures[C]In: Proceedings of Cryptology-Crypto'91, Berlin: Springer-Verlag, 1991:457-469
  • 7Wang C.T., Lin C.H.. Threshold signature schemes with traceable signers in group communications. Computer Communications, 1998,21(8):771-776
  • 8L Z Granville, D M da Rosa. A Panisson. Managing computer networks using peer-to-peer technologies [J].CommunicationsMagazine, 2005, 43(10): 62-68
  • 9徐秋亮.改进门限RSA数字签名体制[J].计算机学报,2000,23(5):449-453. 被引量:63
  • 10王贵林,卿斯汉.几个门限群签名方案的弱点[J].软件学报,2000,11(10):1326-1332. 被引量:61

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部