首页 | 本学科首页   官方微博 | 高级检索  
     

一种基于多路径网络编码的匿名通信机制
引用本文:段桂华,王伟平,王建新,杨路明.一种基于多路径网络编码的匿名通信机制[J].软件学报,2010,21(9):2338-2351.
作者姓名:段桂华  王伟平  王建新  杨路明
作者单位:中南大学,信息科学与工程学院,湖南,长沙,410083
基金项目:Supported by the National Natural Science Foundation of China under Grant Nos.60873265, 60673164 (国家自然科学基金); the Hu’nan Provincial Natural Science Foundation of China under Grant No.06JJ10009 (湖南省自然科学基金); the Specialized Research Fund for the Doctoral Pro
摘    要:提出了基于多路径网络编码的信息分割传输策略ITNC(information slicing and transmitting with multi-path network coding),并基于ITNC提出了一种无需密钥基础设施的匿名通信机制AC-ITNC(anonymous communication mechanism based on ITNC).该机制将建路信息分割后编码传送,每个编码节点都对转发信息进行再次随机编码,编码系数与编码信息沿不同编码路径分离传输,从而可以在不需要密钥机制的情况下进行

关 键 词:匿名通信  网络编码  多路径  合谋攻击  网络安全
收稿时间:9/1/2008 12:00:00 AM
修稿时间:2009/3/31 0:00:00

Anonymous Communication Mechanism with Multi-Paths Network Coding
DUAN Gui-Hu,WANG Wei-Ping,WANG Jian-Xin and YANG Lu-Ming.Anonymous Communication Mechanism with Multi-Paths Network Coding[J].Journal of Software,2010,21(9):2338-2351.
Authors:DUAN Gui-Hu  WANG Wei-Ping  WANG Jian-Xin and YANG Lu-Ming
Abstract:This paper first proposes a new information slicing and transmitting method ITNC (information slicing and transmitting with multi-path network coding) with multi-paths network coding. Next, a novel anonymous communication mechanism AC-ITNC (anonymous communication mechanism based on ITNC) without key infrastructure, which is based on ITNC, is presented. In the new mechanism, the anonymous path setup information is sliced into pieces, and every piece is coded by the random coding coefficient. The coding coefficient and coded information pieces are delivered along different paths, which make the anonymous paths be set up in the case of non-cryptographic scheme. Theoretical analysis and simulation results show that AC-ITNC can significantly improve resistance against conspiracy attacks in an anonymous communication system within complete distributed environment without key infrastructure.
Keywords:anonymous communication  network coding  multi-paths  conspiracy attack  network security
本文献已被 万方数据 等数据库收录!
点击此处可从《软件学报》浏览原始摘要信息
点击此处可从《软件学报》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号