首页 | 本学科首页   官方微博 | 高级检索  
     

基于不经意传输的拓扑隐藏广播协议设
引用本文:米波,周小艳,黄大荣. 基于不经意传输的拓扑隐藏广播协议设[J]. 国际商务研究, 2017, 57(2)
作者姓名:米波  周小艳  黄大荣
作者单位:重庆交通大学 信息科学与工程学院,重庆 400074,重庆交通大学 信息科学与工程学院,重庆 400074,重庆交通大学 信息科学与工程学院,重庆 400074
基金项目:重庆市教委科学技术研究项目(JK1705139)
摘    要:为了保护消息广播中节点关系、地理位置等敏感信息,将高效的NTRU(Number Theory Research Unit)公钥加密算法与不经意传输协议相结合,通过引入不可信的第三方以保证广播的中间过程无法被任意节点所获知,从而实现了隐藏网络拓扑结构的目标。该协议可认为是拓扑隐藏广播的具体实现,解决了现有概念性方案中尚未涉及的秘钥重构、相邻节点身份隐藏及网络动态变化等问题。安全性分析表明,在半诚实攻击模型下该方案能够保证网络中任何一部分节点被攻破均不会导致其他节点拓扑信息泄露。此外,通过与相关概念性协议进行实验对比分析,该方案除安全性外还可充分体现计算、通信开销与节点平均度数无关的优势。

关 键 词:多方安全计算  拓扑隐藏  NTRU  不经意传输  广播协议设计

Design of a topology-hiding broadcast protocol based on oblivious transfer
MI Bo,ZHOU Xiaoyan and HUANG Darong. Design of a topology-hiding broadcast protocol based on oblivious transfer[J]. International Business Research, 2017, 57(2)
Authors:MI Bo  ZHOU Xiaoyan  HUANG Darong
Abstract:In order to protect sensitive information such as node relationship and geographical position,an efficient public key cryptosystem named NTRU(Number Theory Research Unit) is introduced into oblivious transfer protocol and an untrusted third party is used to hide the intermediate process of broadcasting for the sake of topological privacy. The protocol can be considered as the implementation of topology hiding broadcast,and it addresses some uncovered problems of its previous conceptual schemes such as key reconstruction,confidentiality of IDs within neighboring nodes as well as nodes network dynamicity. Security and performance analysis indicates that the proposed protocol endures topology concealment as long as any part of the network is corrupted,and manifests its merits of low computation and communication overheads as well as the advantage of independence on node degree.
Keywords:
点击此处可从《国际商务研究》浏览原始摘要信息
点击此处可从《国际商务研究》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号