共查询到20条相似文献,搜索用时 426 毫秒
1.
标准模型下高效的基于口令认证密钥协商协议 总被引:1,自引:0,他引:1
基于口令的认证密钥协商协议是利用预先共享的口令协商安全性较高的密钥。现有的基于口令认证密钥协商协议大多需要较大的计算量,或者只在随机预言模型下证明了协议的安全性。该文提出了新的标准模型下基于口令密钥协商协议,协议只需要一个生成元。 与其它标准模型下的协议相比,新协议不需要CPA或CCA2安全的加密方案,因而具有计算复杂度低和协议描述简单的特点。相对于殷胤等人在标准模型下可证安全的加密密钥协商协议一文中提出的协议,新协议将指数运算降低了64%。最后,基于DDH假设,在标准模型下证明了协议的安全性。 相似文献
2.
3.
4.
5.
6.
安全的认证密钥协商协议研究 总被引:1,自引:0,他引:1
对基于证书的密钥协商协议的设计与分析进行了比较深入的研究,研究内容包括:可证明安全的基于证书的密钥协商协议以及一种新的可认证密钥协商协议。主要研究成果有:介绍了密钥协商协议的概念和安全特性;提出一个新的认证密钥交换协议AKE-1。AKE-1效率较高,并且在最新的eCK07模型下是安全的,证明基于随机预言假设和CDH假设。另外,基于AKE-1,提出一轮的变体(满足只有一个实体在线)和三轮的变体(提供密钥确认属性),以满足不同的应用。 相似文献
7.
考虑到传统协议在医院HIS系统中存在丢包率高、运行时间长和计算复杂度高的问题,提出了基于云仿真平台的医院HIS系统数据安全多方计算协议。利用云仿真平台,从风险等级和风险概率等方面,评估了医院HIS系统数据的安全风险;根据医院HIS系统数据安全信息的属性取值,优化了医院HIS系统数据的分类属性;结合医院HIS系统数据安全信息的提取模型,设计医院HIS系统数据安全多方计算协议。实验结果表明,该方法可以降低丢包率、缩短运行时间并降低计算复杂度,保证了医院HIS系统中数据的安全性。 相似文献
8.
非承诺加密机制是语义安全的,不能抵抗选择密文攻击.在non-erase模型的安全假设下,基于非承诺加密机制的不经意传输协议不能实现自适应攻击者UC(Universally Composable)安全的定义.利用可否认加密体制和可验证平滑投影哈希函数,提出了一个新的不经意传输协议,可否认加密体制通过陷门承诺的双陷门解密技术实现,新协议方案是可证明UC安全的,基于公共参考串模型,安全性可以归约为确定性复合剩余假设.新协议参与方能够处理指数空间的消息,计算效率得到改善,通过两次协议交互可以实现string-OT协议,与bit-OT协议相比单轮通信效率提高O(n)倍. 相似文献
9.
协议验证是一个时空耗费很高的问题,本文将人工智能技术引入协议验证,建立了验证的图搜索模型,定义了协议错误、协议正确程度、验证算法的复杂度等概念。本文还提出了一个基于知识的协议验证算法Z,并分析了其复杂度。 相似文献
10.
11.
基于当前使用非常广泛的随机早期检测(RED)拥塞控制机制,提出了一种改进方案:在AODV的路由发现阶段,根据当前平均队列长度来确定以不同的方式响应路由请求,从而使建立起来的路由比较可靠,使数据流可以绕过负担比较重的节点,实现一定程度的拥塞控制和流量均衡,最后对改进前后的协议进行了性能仿真和分析。结果表明,改进后的协议与原协议相比在复杂度没有明显增加的前提下,降低了平均延时和丢包率,提高了网络性能。 相似文献
12.
The design of data dissemination protocol has been a great challenge due to the highly dynamic and unreliable wireless channel in vehicular ad hoc networks (VANET). In literature, several interesting solutions are proposed to perform data dissemination for this environment. But these solutions either use architectures requiring centralised coordination or global network knowledge or large intermediate buffers. In this paper, we propose a decentralised technique that overcomes above requirements and provides reliable and scalable communication in both dense and sparse traffic for VANET. Random walks are used in the proposed technique to disseminate data from one vehicle to other vehicles in the network. We use raptor codes to provide low decoding complexity and more scalability for data dissemination. Simulation results demonstrate that the proposed technique has better fault tolerance with lower complexity than general random-walk-based dissemination process and more scalability as compared to the other protocols. 相似文献
13.
14.
Echo state network (ESN) has become one of the most popular recurrent neural networks (RNN) for its good prediction performance of non-linear time series and simple training process. But several problems still prevent ESN from becoming a widely used tool. The most prominent problem is its high complexity with lots of random parameters. Aiming at this problem, a minimum complexity ESN model (MCESN) was proposed. In this paper, we proposed a new wavelet minimum complexity ESN model (WMCESN) to improve the prediction accuracy and increase the practical applicability. Our new model inherits the characters of minimum complexity ESN model using the fixed parameters and simple circle topology. We injected wavelet neurons to replace the original neurons in internal reservoir and designed a wavelet parameter matrix to reduce the computing time. By using different datasets, our new model performed better than the minimum complexity ESN model with normal neurons, but only utilized tiny time cost. We also used our own packets of transmission control protocol (TCP) and user datagram protocol (UDP) dataset to prove that our model can deal with the data packet bit prediction problem well. 相似文献
15.
16.
Mobile ad hoc networks (MANETs) are becoming an emerging technology that offer several advantages to users in terms of cost and ease of use. A MANET is a collection of mobile nodes connected by wireless links that form a temporary network topology that operates without a base station and centralized administration. Routing is a method through which information is forwarded from a transmitter to a specific recipient. Routing is a strategy that guarantees, at any time, the connection between any two nodes in a network. In this work, we propose a novel routing protocol inspired by the cuckoo search method. Our routing protocol is implemented using Network simulator 2. We chose Random WayPoint model as our mobility model. To validate our work, we opted for the comparison with the routing protocol ad hoc on-demand distance vector, destination sequence distance vector and the bio-inspired routing protocol AntHocNet in terms of the quality of service parameters: packet delivery ratio and end-to-end delay (E2ED). 相似文献
17.
支持用户撤销的属性认证密钥协商协议 总被引:1,自引:0,他引:1
用户撤销是基于属性的认证密钥协商(ABAKA, attribute-based authenticated key agreement)协议在实际应用中所必需解决的问题。通过将Waters的基于属性的加密方案和Boneh-Gentry-Waters的广播加密方案相结合,提出了一个支持用户撤销的ABAKA协议。该协议能够实现对用户的即时撤销且不需要密钥权威对所有未被撤销的用户私钥进行定期更新。相比于现有的协议,该协议具有较高的通信效率,并能够在标准模型和修改的ABCK模型下可证安全,具有弱的完美前向安全性,并能够抵抗密钥泄露伪装攻击。 相似文献
18.
The IMPORTANT framework for analyzing the Impact of Mobility on Performance Of RouTing protocols for Adhoc NeTworks 总被引:2,自引:0,他引:2
A Mobile Ad hoc Network (MANET) is a collection of wireless mobile nodes forming a temporary network without using any existing infrastructure. Since not many MANETs are currently deployed, research in this area is mostly simulation based. Random Waypoint is the commonly used mobility model in these simulations. Random Waypoint is a simple model that may be applicable to some scenarios. However, we believe that it is not sufficient to capture some important mobility characteristics of scenarios in which MANETs may be deployed. Our framework aims to evaluate the impact of different mobility models on the performance of MANET routing protocols. We propose various protocol independent metrics to capture interesting mobility characteristics, including spatial and temporal dependence and geographic restrictions. In addition, a rich set of parameterized mobility models is introduced including Random Waypoint, Group Mobility, Freeway and Manhattan models. Based on these models several ‘test-suite’ scenarios are chosen carefully to span the metric space. We demonstrate the utility of our test-suite by evaluating various MANET routing protocols, including DSR, AODV and DSDV. Our results show that the protocol performance may vary drastically across mobility models and performance rankings of protocols may vary with the mobility models used. This effect can be explained by the interaction of the mobility characteristics with the connectivity graph properties. Finally, we attempt to decompose the reactive routing protocols into mechanistic “building blocks” to gain a deeper insight into the performance variations across protocols in the face of mobility. 相似文献
19.