| 研究生: |
傅君茹 Fu, Chun-Ju |
|---|---|
| 論文名稱: |
有效率的網站瀏覽計量系統之研究 A Study on Efficient Metering Schemes |
| 指導教授: |
賴溪松
Laih, Chi-Sung |
| 學位類別: |
碩士 Master |
| 系所名稱: |
電機資訊學院 - 電機工程學系 Department of Electrical Engineering |
| 論文出版年: | 2003 |
| 畢業學年度: | 91 |
| 語文別: | 英文 |
| 論文頁數: | 52 |
| 中文關鍵詞: | 密碼學 、網路廣告 、中國餘數定理 、秘密分享 、安全 |
| 外文關鍵詞: | Chinese remainder theorem, secret sharing schemes, Cryptography, security, network advertisement |
| 相關次數: | 點閱:67 下載:1 |
| 分享至: |
| 查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
網站瀏覽計量系統(Metering Scheme)是計算網站與顧客互動次數的方法,它是利用特殊的協定或機制,紀錄網站在某一段時間之中被顧客瀏覽的次數,這些網站瀏覽計量的結果,可以被應用在計算網路廣告費用上。在1997年,Franklin和Malkhi首先就安全性的考量,提出如何計算網站流量的方法,但是他們所提出的方法只能提供輕微的安全性(lightweight security);在1998年,Naor與Pinkas提出使用密碼學上的技巧(即polynomial secret sharing scheme)來準確地計算網站被瀏覽的次數,之後便有許多學者專家從各種不同的觀點來探討網站瀏覽計量系統。
我們經由研讀多個目前被提出的網站瀏覽計量系統之後,發現它可以經由修改秘密分享(Secret sharing scheme)的方式而達成,在本論文中,我們提出如何將秘密分享轉換成網站瀏覽計量系統的要點,並且採用基於Naor和Pinkas所提出的架構,即包含網站(Server)、顧客(Client)與審查代理商(Audit agency)三種角色,再利用中國餘定理設計一個有效率的網站瀏覽計量系統,在效率上,網站可以快速且精確計算出實際拜訪人數,並且防止不肖者蓄意破壞計量的結果,同時亦可降低顧客端的運算負荷,達到兼具有高效率且強健性(Robustness)的網站瀏覽計量系統。
Metering schemes are methods to measure the interactions between servers and clients. They use special protocols or mechanisms to calculate the number of visits, which a server receives in a certain time frame. The metering results can be used to meter the network advertisement payment. In 1997, Franklin and Malkhi were the first to use the rigorous technical approach to audit the traffic of websites, but their scheme can only offer “lightweight security”. In 1998, Naor and Pinkas proposed a metering scheme by using the cryptographic technique (polynomial secret sharing) to account the audience of websites accurately. Subsequently, many researches are proposed from different viewpoints.
We observed that secret sharing schemes are with some features related to metering schemes. It is possible to make some modification on secret sharing scheme to transform into metering schemes. In this thesis, we proposed the key points of such transformation. Then we also use the structure (i.e. servers, clients and an audit agency) proposed by Naor and Pinkas to design an efficient metering scheme based on Chinese Remainder Theorem
(CRT). Our proposed scheme enables servers to count the visits efficiently and accurately without increasing the overloads of clients and prevents the metering processes from disrupting by malicious persons. It is efficient as well as robust.
[1] C. Asmuth, J. Bloom, “A modular approach to key safeguarding,” IEEE Transaction on information theory, Vol. IT-29, No. 2, pp. 208-210, Mar. 1983.
[2] A. Beimel, A. G’al and M. Paterson, “Lower bounds for monotone span programs,”in Proc. IEEE Symposium on the Foundations of Computer Science – FOCS ’95, pp. 674-681, 1995.
[3] J. Benaloh and J. Leichter, “Generalized Secret Sharing and Monotone Functions,” in Proc. Advances in Cryptology - CRYPT0 '88, Lecture Note in Computer Science, Vol. 0403, pp. 27-35, 1988.
[4] G. R.Blakley, “Safeguarding Cryptographic Keys,” In Proc. of the AFIPS 1979 National Computer Conference, vol.48, pp. 313--317, 1979.
[5] C. Blundo, A. De Bonis and B. Masucci, “Metering Schemes with Pricing,” in Proc. International Symposium on DIStributed Computing - DISC 2000, Lecture Note in Computer Science, Vol. 1914, pp. 194-208, 2000.
[6] C. Blundo, A. De Bonis, B. Masucci and D. R. Stinson, “Dynamic Multi-Threshold Metering Schemes,” in Proc. Annual Workshop on Selected Areas in Cryptography - SAC 2000, Lecture Note in Computer Science, Vol. 2012, pp.130-144, 2001.
[7] C. Blundo, S. Martin, B. Masucci and C. Padr’o, “A Linear Algebraic Approach to Metering Schemes,” Submitted by Cryptology ePrint Archive: Report 2001/087.
[8] C. Blundo, A. De Bonis and B. Masucci, “Bounds and Constructions for Metering Schemes,” Communications in Information and Systems, Vol. 2, No. 1, pp. 1-28, June 2002.
[9] C. Blundo, S. Cimato and B. Masucci, “A Note on Optimal Metering Schemes, Information Processing Letters,” Information Processing Letters, Vol. 84 No. 6, pp. 319-326, Nov. 2002.
[10] E. F. Brickell, “Some Ideal Secret Sharing Schemes,” Journal of Combinatorial Mathematics and Combinatorial Computing, Vol. 6, pp. 105-113, 1989.
[11] M. K. Franklin and D. Malkhi, “Auditable Metering with Lightweight Security,” Journal of Computer Security, Vol. 6, No. 4, pp. 237-255, 1998.
[12] L. Harn and H.Y. Lin, “A non-repudiation metering scheme,” IEEE Communications Letters, Vol.5, Issue 12, pp-486-487, Dec. 2001.
[13] R.J. Hwang and C. C. Chang, “An Improved Threshold Scheme Based On Modular Arithmetic,” in Journal of Information Science Engineering, Vol. 15, pp. 691-699, 1999.
[14] S.S. Kim, J.Y. Shin, and S.K. Kim, “Efficient metering scheme in the WWW,” in Proc. 2001 International Conferences on Infor-tech and Infor-net, pp. 117-121, Beijing, China, Oct. 2001.
[15] D. Knuth, The art of Computer Programming, Vol. 2: Seminumerical Algorithms, 3rd Ed, Reading, Massachusetts, Addison-Wesley, 1997.
[16] L. Lamport, “Password authentication with secure communication,” Commun. ACM, vol. 24, no. 11, pp. 770-772, 1981, submitted for publication.
[17] Liqun Chen and Wenbo Mao, “An Auditable Metering Scheme for Web Advertisement Applications,” in Proc. Information Security Conference - ISC 2001, Lecture Note in Computer Science, Vol. 2200, pp. 475-485, 2001.
[18] B. Masucci and D. R.Stinson, “Metering Schemes for General Access Structures,” in Proc. European Symposium on Research in Computer Security - ESORICS 2000, Lecture Note in Computer Science, Vol. 1895, pp. 72-87, 2000.
[19] B. Masucci and D. R. Stinson, “Efficient metering schemes with pricing,” IEEE Transactions on Information Theory, Vol. 47 Issue.7, pp. 2835-2844, Nov 2001.
[20] A.J. Menezes, P.C. van Oorschot and S.A. Vanston, Handbook of Applied Cryptology, CRC Press, Boca Raton, Florida, 1997.
[21] M. Naor and B. Pinkas, “Secure and Efficient Metering schemes,” in Proc. Advances in Cryptology - EUROCRYPT ’98, Lecture Note in Computer Science, Vol. 1403, pp. 576-590, 1998.
[22] V. Nikov, S. Nikova, B. Preneel and J. Vandewalle, “Applying General Access Structure to Metering Schemes,” Cryptology ePrint Archive: Report 2002/102.
[23] T. P. Novka and D. L. Hollman, “New metrics for new media: toward the development of Web measurement standards,” World Wide Web Journal, Vol. 2 No. 1, pp. 213-246, 1997.
[24] W. Ogata and K. Kurosawa, “Provably Secure Metering Schemes,” in Proc. Advances in Cryptology - ASIACRYPT 2000, Lecture Note in Computer Science, Vol. 1976, pp. 388-398, 2000.
[25] W. Ogata and K. Kurosawa, “Bounds for Robust Metering Schemes and Their
Relationship with A2-code,” Proceedings of Advances in Cryptology - ASIACRYPT 2002, Lecture Note in Computer Science, Vol. 2501, pp. 64-80, 2002.
[26] J. Pitkow, “In search of reliable usage data on the WWW,” Sixth International WWW conf., Apr. 1997.
[27] K. H. Rosen, Elementary Number Theory and Its Applications, 4th ed, Reading, Massachusetts, Addison-Wesley, 2000.
[28] A. Shamir, “How to share a secret,” Communications of the ACM, Vol. 22, 22, No.11, pp. 612-613, Nov. 1979.
[29] Tilborg Henk C. A. van, Fundamentals of Cryptology: a professional reference and interactive tutorial, pp. 321-332, Kluwer Academic publisher, 1999.
[30] 賴溪松、韓亮、張真誠,近代密碼學及其應用,旗標出版有限公司,2003年