Web metering scheme based on the bilinear pairings

被引:2
|
作者
Lee, Narn-Yih [1 ]
Lee, Ming-Feng [1 ]
机构
[1] So Taiwan Univ Technol, Informat Management Dept, Tainan 710, Taiwan
关键词
cryptography; metering scheme; secret sharing; bilinear pairings; network security;
D O I
10.1093/ietisy/e90-d.3.688
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Web metering is an effective means of measuring the number of visits from clients to Web servers during a specific time frame. Naor and Pinkas, in 1998, first introduced metering schemes to evaluate the popularity of Web servers. Ogata and Kurosawa proposed two schemes that improve on the Naor-Pinkas metering schemes. This study presents a Web metering scheme which is based on the bilinear pairings and built on the GDH group. The proposed scheme can resist fraud attempts by malicious Web servers and disruptive attacks by malicious clients.
引用
收藏
页码:688 / 691
页数:4
相关论文
共 50 条
  • [41] Efficient Certificateless Signature Scheme without Bilinear Pairings
    Ye, Junyao
    Wang, Yanhong
    Liu, Simin
    Wang, Yinglian
    Ye, Junyao
    3RD INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION ENGINEERING (CSIE 2015), 2015, : 19 - 23
  • [42] Proxy structured multisignature scheme from bilinear pairings
    Li, XX
    Chen, KF
    Zhang, LJ
    Li, SQ
    PARALLEL AND DISTRIBUTED PROCESSING AND APPLICATIONS, PROCEEDINGS, 2004, 3358 : 705 - 714
  • [43] A VERIFIABLE PROXY SIGNATURE SCHEME BASED ON BILINEAR PAIRINGS WITH IDENTITY-BASED CRYPTOGRAPHIC APPROACHES
    Chang, Ya-Fen
    Tai, Wei-Liang
    Lin, Chung-Yi
    INFORMATION TECHNOLOGY AND CONTROL, 2012, 41 (01): : 60 - 68
  • [44] A Model of Bilinear-Pairings Based Designated-Verifier Proxy Signatue Scheme
    Li, Fengying
    Xue, Qingshui
    Zhang, Jiping
    Cao, Zhenfu
    COLLABORATIVE COMPUTING: NETWORKING, APPLICATIONS AND WORKSHARING, 2009, 10 : 416 - +
  • [45] BILINEAR PAIRINGS-BASED THRESHOLD IDENTITY AUTHENTICATION SCHEME FOR AD HOC NETWORK
    Xu, Feng
    Zhu, Yuqi
    Ma, Hongxu
    Cai, Bin
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2012, 18 (05): : 601 - 609
  • [46] An Identity Based Public Key Cryptography Blind Signature Scheme from Bilinear Pairings
    Shakerian, Reza
    MohammadPour, Touraj
    Kamali, Seyed Hossein
    Hedayati, Maysam
    PROCEEDINGS OF 2010 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (ICCSIT 2010), VOL 7, 2010, : 28 - 32
  • [47] An E-Cash Scheme Based on Proxy Blind Signature from Bilinear Pairings
    Tan, Zuowen
    JOURNAL OF COMPUTERS, 2010, 5 (11) : 1638 - 1645
  • [48] An energy efficient authentication scheme for wireless body area networks based on the bilinear pairings
    Dai, Songsong
    Jiang, Linmei
    He, Shan
    Guo, Donghui
    INTERNATIONAL JOURNAL OF INTERNET PROTOCOL TECHNOLOGY, 2018, 11 (04) : 232 - 241
  • [49] Dynamic and verifiable threshold multi-secret sharing scheme based on bilinear pairings
    Li, Huina
    ICIC Express Letters, 2015, 9 (10): : 2819 - 2825
  • [50] Novel remote user authentication scheme using bilinear pairings
    Yang, Chen
    Ma, Wenping
    Wang, Xinmei
    AUTONOMIC AND TRUSTED COMPUTING, PROCEEDINGS, 2007, 4610 : 306 - +