首页 | 本学科首页   官方微博 | 高级检索  
     

面向容侵的秘密共享系统的设计
引用本文:蔡红柳,陈波,李小强. 面向容侵的秘密共享系统的设计[J]. 装甲兵工程学院学报, 2004, 18(3): 66-68
作者姓名:蔡红柳  陈波  李小强
作者单位:装甲兵工程学院信息工程系,北京,100072
摘    要:针对Intemet服务器间安全连接所使用的会话密钥面临的威胁,利用秘密共享理论,结合Shamir有限域Zp中的多项式方程,提出面向容侵的(w,t)丁限设计方案.此方案是将会话密钥K分成W个子密钥,并秘密存储在不同的共享服务器中,若恢复会话密钥K,只需W个子密钥中的t个子密钥.而入侵者得到t个子密钥要比得到一个会话密钥更难,因此系统具有一定容侵功能,以保证会话密钥的安全.从结构、协议工作和特点等方面加以描述,并对安全性作了分析.初步建立了基于(w,t)秘密共享理论的网络容侵模型.

关 键 词:门限设计  入侵容忍  秘密共享
文章编号:1672-1497(2004)03-0066-03
修稿时间:2004-05-08

Design of Sharesecret System on Intrusion Tolerance
CAI Hong-liu CHEN Bo LI Xiao-qiang. Design of Sharesecret System on Intrusion Tolerance[J]. Journal of Armored Force Engineering Institute, 2004, 18(3): 66-68
Authors:CAI Hong-liu CHEN Bo LI Xiao-qiang
Affiliation:CAI Hong-liu CHEN Bo LI Xiao-qiang
Abstract:The (w, t) threshold scheme on intrusion tolerance, which relies on the polynomial equation in the Limited Domain of Shamir and the Share-secret Theory, has been presented in this thesis. The good of the scheme is to safeguard the session keys, which are used to bring the communication between servers to success. The scheme divides one session key such as K into several sub-keys and stores them into different servers secretly. We can restore the session key by several members of all sub-keys. The intrusion tolerance function of the scheme lies in the difficulty in getting some sub-keys through intruding upon several servers. This dissertation makes a mathematical analysis of the security of the scheme as well as works at describing the designed framework, working protocols and features of the scheme. So a model of network intrusion tolerance based on (w, t) threshold scheme has been put forward in this paper.
Keywords:(w  t)
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号