Web metering scheme based on the bilinear pairings

被引:2
|
作者
Lee, Narn-Yih [1 ]
Lee, Ming-Feng [1 ]
机构
[1] So Taiwan Univ Technol, Informat Management Dept, Tainan 710, Taiwan
关键词
cryptography; metering scheme; secret sharing; bilinear pairings; network security;
D O I
10.1093/ietisy/e90-d.3.688
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Web metering is an effective means of measuring the number of visits from clients to Web servers during a specific time frame. Naor and Pinkas, in 1998, first introduced metering schemes to evaluate the popularity of Web servers. Ogata and Kurosawa proposed two schemes that improve on the Naor-Pinkas metering schemes. This study presents a Web metering scheme which is based on the bilinear pairings and built on the GDH group. The proposed scheme can resist fraud attempts by malicious Web servers and disruptive attacks by malicious clients.
引用
收藏
页码:688 / 691
页数:4
相关论文
共 50 条
  • [31] ID-based threshold proxy signcryption scheme from bilinear pairings
    School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu 610054 Sichuan, China
    不详
    不详
    Int. J. Secur. Netw., 2008, 3 (206-215):
  • [32] Certificateless Proxy Identity-Based Signcryption Scheme Without Bilinear Pairings
    Qi Yanfeng
    Tang Chunming
    Lou Yu
    Xu Maozhi
    Guo Baoan
    CHINA COMMUNICATIONS, 2013, 10 (11) : 37 - 41
  • [33] ID-Based Encryption with Keyword Search Scheme from Bilinear Pairings
    Tian, Xiuxia
    Wang, Yong
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 12518 - 12521
  • [34] Certificateless Group Signature Scheme from Bilinear Pairings
    Chen Yameng
    Cheng Xiangguo
    PROCEEDINGS OF 2017 2ND INTERNATIONAL CONFERENCE ON COMMUNICATION AND INFORMATION SYSTEMS (ICCIS 2017), 2015, : 262 - 267
  • [35] An Efficient Fuzzy Identity-based Signature Scheme without Bilinear Pairings
    Wang, Changji
    2014 TENTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2014, : 440 - 444
  • [36] Efficient Certificate-Based Blind Signature Scheme Without Bilinear Pairings
    Huang, Rufen
    Nong, Qiang
    ADVANCES IN MANUFACTURING TECHNOLOGY, PTS 1-4, 2012, 220-223 : 2735 - 2739
  • [37] Practical Hidden Identity-based Signature Scheme from Bilinear Pairings
    Liu Xin
    Xu Qiu-liang
    PROCEEDINGS OF 2010 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (ICCSIT 2010), VOL 6, 2010, : 97 - 102
  • [38] An Authenticated Self-Healing Key Distribution Scheme Based on Bilinear Pairings
    Tian, Biming
    Chang, Elizabeth
    Dillon, Tharam S.
    Han, Song
    Hussain, Farookh K.
    2009 6TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1 AND 2, 2009, : 1061 - 1065
  • [39] Efficient identity-based threshold decryption scheme from bilinear pairings
    Gao, Wei
    Wang, Guilin
    Chen, Kefei
    Wang, Xueli
    FRONTIERS OF COMPUTER SCIENCE, 2018, 12 (01) : 177 - 189
  • [40] An ID-Based Proxy Multi Signature Scheme without Bilinear Pairings
    Tiwari, Namita
    Padhye, Sahadeo
    SECURITY ASPECTS IN INFORMATION TECHNOLOGY, 2011, 7011 : 83 - 92