To enhance the practicability of the trust negotiation system, an agent based automated trust negotiation model (ABAM) is proposed. The ABAM introduces an agent to keep the negotiation process with no human interven...To enhance the practicability of the trust negotiation system, an agent based automated trust negotiation model (ABAM) is proposed. The ABAM introduces an agent to keep the negotiation process with no human intervention. Meanwhile, the ABAM specifies the format of a meta access control policy, and adopts credentials with flexible format to meet the requirements of access control policies instead of disclosing the whole contents of a certificate. Furthermore, the ABAM uses asymmetric functions with a high security intensity to encrypt the transmitting message, which can prevent information from being attacked. Finally, the ABAM presents a new negotiation protocol to guide the negotiation process. A use case is studied to illuminate that the ABAM is sound and reasonable. Compared with the existing work, the intelligence, privacy and negotiation efficiency are improved in the ABAM.展开更多
In order to transmit secure messages, a quantum secure direct communication protocol based on extended three-particle GHZ state was presented, in which the extended three-particle GHZ state was used to detect eavesdro...In order to transmit secure messages, a quantum secure direct communication protocol based on extended three-particle GHZ state was presented, in which the extended three-particle GHZ state was used to detect eavesdroppers. In the security analysis, the method of the entropy theory is introduced, and three detection strategies are compared quantitatively by using the constraint between the information eavesdroppers can obtain and the interference introduced. If the eavesdroppers intend to obtain all inforrmtion, the detection rate of the original "Ping-pong" protocol is 50% ; the second protocol used two particles of EPR pair as detection particles is also 50%; while the presented protocol is 58%. At last, the security of the proposed protocol is discussed. The analysis results indicate that the protocol in this paper is more secure than the other two.展开更多
This paper presents adaptive hybrid protocols based on the declarative network and mainly discusses the principle and realization of the Bayesian-estimation based adaptive hybrid protocol in the declarative network, w...This paper presents adaptive hybrid protocols based on the declarative network and mainly discusses the principle and realization of the Bayesian-estimation based adaptive hybrid protocol in the declarative network, which is well adapted to the Mobile Ad hoc NETwork (MANET). The adaptive hybrid protocol is designed for ad hoc networks which have characteristics like self-organizing, no trusted party, flexibility, etc. The nodes that run the hybrid protocol can automatically select one routing protocol that is suitable for different network environment. The Bayesian-estimation based adaptive strategy, that improves the adaptability and stability of the protocol, succeeds in the Rapidnet, a declarative network engine. The result in the Rapidnet proves that the hybrid protocol and the adaptive strategy are feasible. The experiment on the ns-3 simulator, an emerging discrete-event network simulator, validates that this protocol performs well and reduces communication overheads.展开更多
The security of the multiparty quantum secret sharing protocol proposed by Gao [G.Gao,Commun.Theor.Phys.52 (2009) 421] is analyzed.It is shown that this protocol is vulnerable since the agents' imperfectencryption...The security of the multiparty quantum secret sharing protocol proposed by Gao [G.Gao,Commun.Theor.Phys.52 (2009) 421] is analyzed.It is shown that this protocol is vulnerable since the agents' imperfectencryption scheme can be attacked by a powerful participant.We introduce a attack strategy called participant forciblemanipulation and analyze the information leakage in this protocol under this attack.At last,we give an improved versionof the original protocol.The improved protocol is robust and has the same efficiency as the original one.展开更多
基金The National Natural Science Foundation of China(No60403027)
文摘To enhance the practicability of the trust negotiation system, an agent based automated trust negotiation model (ABAM) is proposed. The ABAM introduces an agent to keep the negotiation process with no human intervention. Meanwhile, the ABAM specifies the format of a meta access control policy, and adopts credentials with flexible format to meet the requirements of access control policies instead of disclosing the whole contents of a certificate. Furthermore, the ABAM uses asymmetric functions with a high security intensity to encrypt the transmitting message, which can prevent information from being attacked. Finally, the ABAM presents a new negotiation protocol to guide the negotiation process. A use case is studied to illuminate that the ABAM is sound and reasonable. Compared with the existing work, the intelligence, privacy and negotiation efficiency are improved in the ABAM.
基金Acknowledgements The project was supported by the Specialized Research Found for the Doctoral Program of Higher Education of China under Grant No. 20060013007 the National Natural Science Foundation of Beijing under Caant No. 4092029 and the National Natural Science Foundation of China under Grant No. 61100205, No. 60873001.
文摘In order to transmit secure messages, a quantum secure direct communication protocol based on extended three-particle GHZ state was presented, in which the extended three-particle GHZ state was used to detect eavesdroppers. In the security analysis, the method of the entropy theory is introduced, and three detection strategies are compared quantitatively by using the constraint between the information eavesdroppers can obtain and the interference introduced. If the eavesdroppers intend to obtain all inforrmtion, the detection rate of the original "Ping-pong" protocol is 50% ; the second protocol used two particles of EPR pair as detection particles is also 50%; while the presented protocol is 58%. At last, the security of the proposed protocol is discussed. The analysis results indicate that the protocol in this paper is more secure than the other two.
基金Supported by National Key Technology R&D Program of the Ministry of Science and Technology (2012BAB15B01)
文摘This paper presents adaptive hybrid protocols based on the declarative network and mainly discusses the principle and realization of the Bayesian-estimation based adaptive hybrid protocol in the declarative network, which is well adapted to the Mobile Ad hoc NETwork (MANET). The adaptive hybrid protocol is designed for ad hoc networks which have characteristics like self-organizing, no trusted party, flexibility, etc. The nodes that run the hybrid protocol can automatically select one routing protocol that is suitable for different network environment. The Bayesian-estimation based adaptive strategy, that improves the adaptability and stability of the protocol, succeeds in the Rapidnet, a declarative network engine. The result in the Rapidnet proves that the hybrid protocol and the adaptive strategy are feasible. The experiment on the ns-3 simulator, an emerging discrete-event network simulator, validates that this protocol performs well and reduces communication overheads.
基金Supported by National Natural Science Foundation of China under Grant Nos.60873191,60903152,60821001Specialized Research Fund for the Doctoral Program of High Education under Grant Nos.200800131016 and 20090005110010+2 种基金Beijing Nova Program under Grant No.2008B51Key Project of Chinese Ministry of Education under Grant No.109014Beijing Natural Science Foundation under Grant Nos.4072020 and 4102055
文摘The security of the multiparty quantum secret sharing protocol proposed by Gao [G.Gao,Commun.Theor.Phys.52 (2009) 421] is analyzed.It is shown that this protocol is vulnerable since the agents' imperfectencryption scheme can be attacked by a powerful participant.We introduce a attack strategy called participant forciblemanipulation and analyze the information leakage in this protocol under this attack.At last,we give an improved versionof the original protocol.The improved protocol is robust and has the same efficiency as the original one.