期刊文献+

基于门限签名方案的BQS系统的服务器协议 被引量:2

Server Protocols of Byzantine Quorum Systems Implemented Utilizing Threshold Signature Schemes
在线阅读 下载PDF
导出
摘要 利用冗余复制技术,BQS(Byzantine quorum system)系统在异步信道上提供了能容忍f台服务器拜占庭失效的存储服务.COCA系统和CODEX系统设计了一种结合门限签名方案和BQS系统的服务器协议,完成了TSS-BQS(threshold signature schemes-BQS)系统.与普通BQS系统相比,具有更易于支持Proactive Recovery,简化客户端密钥管理和客户端通信的优点.基于相同的系统模型和信道假设,提出了一种新的服务器协议,满足TSS-BQS系统的安全要求;而且与已有协议相比,该协议只需更少的通信轮数,在读/写并发情况下执行效果更优. Byzantine quorum systems (BQSs) provide attack-resilient storage services over asynchronous channels and tolerate f servers' Byzantine failures. COCA (Cornell online certification authority) and CODEX (COrnell Data EXchange) have designed a server protocol to implement BQSs threshold signature schemes (TSS-BQSs), which can execute proactive recovery, conveniently, and can simplify the key management and communication of clients. Under the same system model and channel assumptions, a new server protocol that satisfies the security requirements of TSS-BQS is proposed. The proposed protocol involves less rounds of communication and performs better than that of COCA/CODEX in the case of concurrent read-write operations.
出处 《软件学报》 EI CSCD 北大核心 2010年第10期2631-2641,共11页 Journal of Software
基金 国家自然科学基金No.70890084/G021102 国家高技术研究发展计划(863)No.2006AA01Z454~~
关键词 拜占庭选举系统 门限签名方案 攻击容忍 服务器协议 容错 Byzantine quorum system threshold signature scheme attack-resilience server protocol fault-tolerance
  • 相关文献

参考文献3

二级参考文献34

  • 1刘海蛟,林璟锵,耿玉波,荆继武.基于关系数据库的LDAP证书查询服务器的实现[J].计算机工程,2005,31(4):104-106. 被引量:2
  • 2Reiter MK, Franklin MK, Lacy JB, et al. The Ω key management service. In: Proceedings of the 3rd ACM Conference on Computer and Communications Security, 1996.38 - 47.
  • 3Zhou LD. COCA: a secure distributed online certification authority. ACM Transaction on Computer Systems, 2002, 20(4) : 329 - 368.
  • 4Jing JW, Liu P, Feng DG, et al. ARECA: a highly attack resilient certification authority. In: Proceedings of the 2003 ACM Workshop on Surivable and Self-Regenerative Systems, 2003.53- 63.
  • 5Malkhi D, Reiter M K. Byzantine quorum systems. Journal of Distributed Computing, 1998,11 (4):203 - 213.
  • 6Lamport L. On interprocess communication (part Ⅱ : algorithms). Distributed Computing, 1986, 1:86 - 101.
  • 7Kim J M,Manabe Y.A Byzantine Fault-Tolerant Mutual Exclusion Algorithm and its Application to Byzantine Fault-Tolerant Storage Systems.In:Proceedings in 25th IEEE Conference on Distributed Computing Systems Workshops,2005
  • 8Malkhi D,Reiter M K.Byzantine quorum systems.Distributed Computing,1998,11(4):203~213
  • 9Alvisi L,et al.Dynamic Byzantine Quorum Systems.In:Proceedings of Internationa conference on Dependable Systems and Networks,2000
  • 10Goodson R G,et al.Efficient Byzantine-tolerant erasure-coded storage.In:2004 International Conference on Dependable Systems and Networks,2004

共引文献10

同被引文献30

  • 1付小青,沈剑.能容纳拜占庭错误的身份认证协议[J].华中科技大学学报(自然科学版),2005,33(5):22-25. 被引量:2
  • 2邹立新,丁建立.基于拜占庭协议的入侵容忍系统模型设计[J].计算机工程,2005,31(B07):88-90. 被引量:5
  • 3刘海蛟,荆继武,林璟锵,杜皎.一种入侵容忍的资料库[J].中国科学院研究生院学报,2006,23(1):46-51. 被引量:4
  • 4Mall-hi D, Reiter M. Byzantine quorum systems. Distributed Computing, 1998, 11(4): 203-213.
  • 5Lamport L, Shostak R, Pease M. The Byzantine generals problem. ACM Transactions on Programming Languages and Systems, 1982, 4(3): 382-401.
  • 6Zhou L, Schneider F, Renesse R. COCA: A secure on-line certification authority. ACM Transactions on Computer Sys terns, 2002, 20(4): 329-368.
  • 7Herlihy H, Wing J. Specifying graceful degradation. IEEE Transactions on Parallel and Distributed Systems, 1991, 2(1): 93-104.
  • 8Marsh M, Schneider F. CODEX: A robust and secure secret distribution system. IEEE Transactions on Dependable and Secure Computing, 2004, 1(1): 34-47.
  • 9Lin Jing-Qiang, Liu Peng, Jing Ji-Wu, Wang Qiong-Xiao. Impossibility of finding any third family of server protocols integrating Byzantine quorum systems with threshold signa- ture schemes//Proceedings of the 6th International ICST Conference on Security and Privacy in Communication Net works (SecureComm). Singapore, 2010:307 325.
  • 10Desmedt Y. Society and group oriented cryptography: A new concept//Proceedings of the Advances in Cryptology-Crypto' 87. Santa Barbara, USA, 1987:120-127.

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部