恶意代理环境下的不可区分代码转换系统.doc
上传人:sy****28 上传时间:2024-09-14 格式:DOC 页数:8 大小:101KB 金币:18 举报 版权申诉
预览加载中,请您耐心等待几秒...

恶意代理环境下的不可区分代码转换系统.doc

恶意代理环境下的不可区分代码转换系统.doc

预览

在线预览结束,喜欢就下载吧,查找使用更方便

18 金币

下载此文档

如果您无法下载资料,请参考说明:

1、部分资料下载需要金币,请确保您的账户上有足够的金币

2、已购买过的文档,再次下载不重复扣费

3、资料包下载后请先用软件解压,在使用对应软件打开

密码实现与应用.277.豆ndiStinguishablePresenceofMaliciousProxiesHuafeiZhuFengBao12R,A-star,Singapore{huafei,baofeng}@i2r.a—star.edu.sgAbstract:inthispaper,anovelframeworkthatguaranteesindistinguishabletrans—codinginthepresenceofmaliciousproxiesispresentedandanalyzed.Theideabehindofourimplementationissimple:astreamissegmentedtWOparts:abaselayerandanenhancementlayer.Thebaselayeristhenencodedbystandardhashingchaintechnique,whiletheenhancelayerisencodedbymercurialcommitments.Wewillshowthattheproposedschemeenjoysnicefeatures:itiscompatible,provablysecureandlowband—widthoverhead.Keywords:proxy;trans—coding;zero—knowledgeset(mercurialcommitments)1IntroductionConsideringascenariowhereamobileuserdown—scaleshighqualitystreamsfromamultimediaservertohis/hersmalldevice.Sincethestreamsoriginatedfromtheserverarenormallythehighestinqualityandtherichestincontent,aconversionofonedataformattolesswillbecertaindataitemsfromtheoriginalmultimediacostlyoneperformed(e.g.,removingstreams)inordertoadaptthemtotheparticulardevice.Allowingsuchintermediateproxiesintroducesinterestingresearchproblem:howweachieveend..to..endsecuritybetweentheancanoriginalresourceandultimaterecipient?Thereexistsolutionstotheend..to..endsecurityproblemstatedabove.ThemostobviouswayisforthetoproxyitssigningkeythattheserveragiveSOproxycanre—signthemodifiedstreams.Thisapproachhasseveralknowndisadvantagesandmostseriousoneisthattheservermusttrusttheproxywithsigningpower.AnotherapproachisfortheservertoseparatelysigneachstreamindependentlySOthateveniftheproxyremovesframestheendusercanstillverifytheremainingones.Unfortunately,thisapproachisnotsuitableforresource—constraineddevicessincemobileuserscannotaffordthecosttohandleexpensivedigitalsignaturecomputations.Veryrecently,twointerestingprotocols(oneiscallLISSA,andtheotheriscalledTRESSA)thatdigestthestreamusingcryptographichashfunctions:andonlyrequireonedigitalsignaturecomputationhavebeenproposedin[5】and[7】.Theirschemesallowanintelligentnetworkintermediarytointerceptstreamsignedbyconte