期刊文献+

秘密共享的抗攻击匿名通信系统 被引量:1

Secret sharing anti-attack anonymous communication system
下载PDF
导出
摘要 设计了一种抗攻击秘密共享匿名通信系统。该系统采用了秘密共享的思想来提高通信算法的可靠性和安全性。匿名通信时,通信双方存在多条链路;即使少量链路存在攻击者,仍然可以继续传输;发现攻击者后,也可以对链路进行动态地调整。分析发现该算法在抵抗前趋攻击等针对匿名通信的攻击方面优于传统的匿名通信算法。实验数据也表明:该算法在效率上虽然略劣于传统的匿名通信算法,但却以较小的效率代价获取了更高的可靠性和安全性。 An anti-attack anonymous communication system based on secret sharing is designed.It improves its reliability and security by secret sharing.When communicating,there are several links between sender and receiver,and if few links is controlled by attacker,the communication continues and other links can be selected to replace the controlled links.Although its efficiency is not more than the some efficient system,it is more secure and more reliable because it prevents some attack or decrease the effect of attack.
作者 徐静 王振兴
出处 《计算机工程与应用》 CSCD 北大核心 2010年第6期82-85,95,共5页 Computer Engineering and Applications
基金 国家高技术研究发展计划(863)(No.2006AA01Z449) the National High-Tech Research and Development Plan of China under Grant No.2006AA01Z449
关键词 匿名通信 秘密共享 秘密份额 链路 安全 anonymous communication secret sharing share link security
  • 相关文献

参考文献9

  • 1Chaum D.Untraceable electronic mail,return addresses and digital pseudonyms[J].Communications of the ACM,1981,24(2):84-88.
  • 2Moller U,Cottrell L,Palfrader P,et al.Mixmaster protocol Version 2[Z]. 2003-07.
  • 3Goldschlag D,Reed M,Syverson P.Onion routing for anonymous and private Intemet connections[J].Communications of the ACM, 1999,42(2):39-41.
  • 4Boucher P,Shostack A,Goldberg I.Freedom systems 2.0 architecture[EB/OL]. ( 2000).http://www.freedom.net/info/whitepapaers.
  • 5Chaum D.The dining cryptographers problem:Unconditional sender and recipient untraceability[J].Journal of Cryptology, 1988,1 ( 1 ) : 65-75.
  • 6Relter M K,Rubin A D.Anonymous Web transactions with crowds[J]. Communications of the ACM, 1999,42(2) : 32-38.
  • 7Tan K J,Zhu H W,Gu S J.Cheater identification in (t,n) threshold scheme[J].Computer Communication,1999,22(8):762-765.
  • 8Okada K,Kurosawa K.MDS' secret sharing scheme secure against cheaters[J].IEEE Transactions on Information Theory,2000,46(3): 1078-1081.
  • 9Yang C C,Chang T Y,Hwang M S.A (t,n) multi-secret sharing schem[J].Applied Mathematics and Comutation,2004,151(2):483-490.

同被引文献19

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部