首页 | 本学科首页   官方微博 | 高级检索  
     

主动安全技术发展综述
引用本文:滕猛 邹鹏 王怀民. 主动安全技术发展综述[J]. 计算机科学, 2003, 30(6): 27-30
作者姓名:滕猛 邹鹏 王怀民
作者单位:国防科技大学计算机学院,长沙,410073
基金项目:本文研究得到863—306—ZD—02资助.
摘    要:Proactive security provides a method for maintaining the overall security of a system,even when individual components are repeatedly broken into and controlled by an attacker.Proactive security is a non-trivial extension of (t 1,n)-threshold cryptosystems,where shares are periodically renewed (without changing the secret) in such a way that information gained by the adversary in one time period is useless for attacking the secret after the shares are renewed.In this paper,we describe the proactive approach and review some basic technologies.We also report the problems need to be study.

关 键 词:主动安全 门限密码学 数字签名 计算机网络 网络安全

A Survey of Proactive Security
TENG Meng ZOU Peng WANG Huai-Ming. A Survey of Proactive Security[J]. Computer Science, 2003, 30(6): 27-30
Authors:TENG Meng ZOU Peng WANG Huai-Ming
Abstract:Proactive security provides a method for maintaining the overall security of a system,even when individual components are repeatedly broken into and controlled by an attacker. Proactive security is a non-trivial extension of (t + 1 ,n)-threshold cryptosystems,where shares are periodically renewed (without changing the secret) in such a way that information gained by the adversary in one time period is useless for attacking the secret after the shares are renewed. In this paper, we describe the proactive approach and review some basic technologies. We also report the problems need to be study.
Keywords:Proactive security   Threshold cryptographic   Proactive secret sharing   Adaptive-secure
本文献已被 CNKI 维普 万方数据 等数据库收录!
点击此处可从《计算机科学》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号