進階搜尋


 
系統識別號 U0026-0812200910394080
論文名稱(中文) 有效率的網站瀏覽計量系統之研究
論文名稱(英文) A Study on Efficient Metering Schemes
校院名稱 成功大學
系所名稱(中) 電機工程學系碩博士班
系所名稱(英) Department of Electrical Engineering
學年度 91
學期 2
出版年 92
研究生(中文) 傅君茹
研究生(英文) Chun-Ju Fu
學號 n2690139
學位類別 碩士
語文別 英文
論文頁數 52頁
口試委員 指導教授-賴溪松
口試委員-吳宗成
口試委員-顏嵩銘
口試委員-林開榮
口試委員-黃悅民
中文關鍵字 密碼學  網路廣告  中國餘數定理  秘密分享  安全 
英文關鍵字 Chinese remainder theorem  secret sharing schemes  Cryptography  security  network advertisement 
學科別分類
中文摘要 網站瀏覽計量系統(Metering Scheme)是計算網站與顧客互動次數的方法,它是利用特殊的協定或機制,紀錄網站在某一段時間之中被顧客瀏覽的次數,這些網站瀏覽計量的結果,可以被應用在計算網路廣告費用上。在1997年,Franklin和Malkhi首先就安全性的考量,提出如何計算網站流量的方法,但是他們所提出的方法只能提供輕微的安全性(lightweight security);在1998年,Naor與Pinkas提出使用密碼學上的技巧(即polynomial secret sharing scheme)來準確地計算網站被瀏覽的次數,之後便有許多學者專家從各種不同的觀點來探討網站瀏覽計量系統。
我們經由研讀多個目前被提出的網站瀏覽計量系統之後,發現它可以經由修改秘密分享(Secret sharing scheme)的方式而達成,在本論文中,我們提出如何將秘密分享轉換成網站瀏覽計量系統的要點,並且採用基於Naor和Pinkas所提出的架構,即包含網站(Server)、顧客(Client)與審查代理商(Audit agency)三種角色,再利用中國餘定理設計一個有效率的網站瀏覽計量系統,在效率上,網站可以快速且精確計算出實際拜訪人數,並且防止不肖者蓄意破壞計量的結果,同時亦可降低顧客端的運算負荷,達到兼具有高效率且強健性(Robustness)的網站瀏覽計量系統。
英文摘要 Metering schemes are methods to measure the interactions between servers and clients. They use special protocols or mechanisms to calculate the number of visits, which a server receives in a certain time frame. The metering results can be used to meter the network advertisement payment. In 1997, Franklin and Malkhi were the first to use the rigorous technical approach to audit the traffic of websites, but their scheme can only offer “lightweight security”. In 1998, Naor and Pinkas proposed a metering scheme by using the cryptographic technique (polynomial secret sharing) to account the audience of websites accurately. Subsequently, many researches are proposed from different viewpoints.
We observed that secret sharing schemes are with some features related to metering schemes. It is possible to make some modification on secret sharing scheme to transform into metering schemes. In this thesis, we proposed the key points of such transformation. Then we also use the structure (i.e. servers, clients and an audit agency) proposed by Naor and Pinkas to design an efficient metering scheme based on Chinese Remainder Theorem
(CRT). Our proposed scheme enables servers to count the visits efficiently and accurately without increasing the overloads of clients and prevents the metering processes from disrupting by malicious persons. It is efficient as well as robust.
論文目次 Chapter 1 Introduction 1
1.1 Introduction to Metering Schemes 1
1.2 Research Motives 6
1.3 Organization of the Thesis 6
Chapter 2 Previous Work 8
2.1. Metering Schemes in Practical Problems 8
2.2. The Basic Model of Metering Scheme 11
2.2.1. Franklin and Malkhi Scheme 12
2.2.2. Naor and Pinkas Scheme 13
2.3. Ogata and Kurosawa Attack 18
2.4. Other Schemes 19
Chapter 3 Our Schemes 21
3.1. Difficulties 21
3.2. Scenario 25
3.3. Requirements for Our Metering Schemes 28
3.4. Our Metering Schemes 29
3.4.1. The CRT Threshold Scheme 29
3.4.2. The Basic Model 34
3.5. The Advanced Model 39
3.6. Analysis of Our Scheme 42
3.6.1. Security Analysis 42
3.6.2. Efficiency Analysis 44
Chapter 4 Applications 46
Chapter 5 Conclusions and Future Work 48
References 50
參考文獻 [1] C. Asmuth, J. Bloom, “A modular approach to key safeguarding,” IEEE Transaction on information theory, Vol. IT-29, No. 2, pp. 208-210, Mar. 1983.
[2] A. Beimel, A. G’al and M. Paterson, “Lower bounds for monotone span programs,”in Proc. IEEE Symposium on the Foundations of Computer Science – FOCS ’95, pp. 674-681, 1995.
[3] J. Benaloh and J. Leichter, “Generalized Secret Sharing and Monotone Functions,” in Proc. Advances in Cryptology - CRYPT0 '88, Lecture Note in Computer Science, Vol. 0403, pp. 27-35, 1988.
[4] G. R.Blakley, “Safeguarding Cryptographic Keys,” In Proc. of the AFIPS 1979 National Computer Conference, vol.48, pp. 313--317, 1979.
[5] C. Blundo, A. De Bonis and B. Masucci, “Metering Schemes with Pricing,” in Proc. International Symposium on DIStributed Computing - DISC 2000, Lecture Note in Computer Science, Vol. 1914, pp. 194-208, 2000.
[6] C. Blundo, A. De Bonis, B. Masucci and D. R. Stinson, “Dynamic Multi-Threshold Metering Schemes,” in Proc. Annual Workshop on Selected Areas in Cryptography - SAC 2000, Lecture Note in Computer Science, Vol. 2012, pp.130-144, 2001.
[7] C. Blundo, S. Martin, B. Masucci and C. Padr’o, “A Linear Algebraic Approach to Metering Schemes,” Submitted by Cryptology ePrint Archive: Report 2001/087.
[8] C. Blundo, A. De Bonis and B. Masucci, “Bounds and Constructions for Metering Schemes,” Communications in Information and Systems, Vol. 2, No. 1, pp. 1-28, June 2002.
[9] C. Blundo, S. Cimato and B. Masucci, “A Note on Optimal Metering Schemes, Information Processing Letters,” Information Processing Letters, Vol. 84 No. 6, pp. 319-326, Nov. 2002.
[10] E. F. Brickell, “Some Ideal Secret Sharing Schemes,” Journal of Combinatorial Mathematics and Combinatorial Computing, Vol. 6, pp. 105-113, 1989.
[11] M. K. Franklin and D. Malkhi, “Auditable Metering with Lightweight Security,” Journal of Computer Security, Vol. 6, No. 4, pp. 237-255, 1998.
[12] L. Harn and H.Y. Lin, “A non-repudiation metering scheme,” IEEE Communications Letters, Vol.5, Issue 12, pp-486-487, Dec. 2001.
[13] R.J. Hwang and C. C. Chang, “An Improved Threshold Scheme Based On Modular Arithmetic,” in Journal of Information Science Engineering, Vol. 15, pp. 691-699, 1999.
[14] S.S. Kim, J.Y. Shin, and S.K. Kim, “Efficient metering scheme in the WWW,” in Proc. 2001 International Conferences on Infor-tech and Infor-net, pp. 117-121, Beijing, China, Oct. 2001.
[15] D. Knuth, The art of Computer Programming, Vol. 2: Seminumerical Algorithms, 3rd Ed, Reading, Massachusetts, Addison-Wesley, 1997.
[16] L. Lamport, “Password authentication with secure communication,” Commun. ACM, vol. 24, no. 11, pp. 770-772, 1981, submitted for publication.
[17] Liqun Chen and Wenbo Mao, “An Auditable Metering Scheme for Web Advertisement Applications,” in Proc. Information Security Conference - ISC 2001, Lecture Note in Computer Science, Vol. 2200, pp. 475-485, 2001.
[18] B. Masucci and D. R.Stinson, “Metering Schemes for General Access Structures,” in Proc. European Symposium on Research in Computer Security - ESORICS 2000, Lecture Note in Computer Science, Vol. 1895, pp. 72-87, 2000.
[19] B. Masucci and D. R. Stinson, “Efficient metering schemes with pricing,” IEEE Transactions on Information Theory, Vol. 47 Issue.7, pp. 2835-2844, Nov 2001.
[20] A.J. Menezes, P.C. van Oorschot and S.A. Vanston, Handbook of Applied Cryptology, CRC Press, Boca Raton, Florida, 1997.
[21] M. Naor and B. Pinkas, “Secure and Efficient Metering schemes,” in Proc. Advances in Cryptology - EUROCRYPT ’98, Lecture Note in Computer Science, Vol. 1403, pp. 576-590, 1998.
[22] V. Nikov, S. Nikova, B. Preneel and J. Vandewalle, “Applying General Access Structure to Metering Schemes,” Cryptology ePrint Archive: Report 2002/102.
[23] T. P. Novka and D. L. Hollman, “New metrics for new media: toward the development of Web measurement standards,” World Wide Web Journal, Vol. 2 No. 1, pp. 213-246, 1997.
[24] W. Ogata and K. Kurosawa, “Provably Secure Metering Schemes,” in Proc. Advances in Cryptology - ASIACRYPT 2000, Lecture Note in Computer Science, Vol. 1976, pp. 388-398, 2000.
[25] W. Ogata and K. Kurosawa, “Bounds for Robust Metering Schemes and Their
Relationship with A2-code,” Proceedings of Advances in Cryptology - ASIACRYPT 2002, Lecture Note in Computer Science, Vol. 2501, pp. 64-80, 2002.
[26] J. Pitkow, “In search of reliable usage data on the WWW,” Sixth International WWW conf., Apr. 1997.
[27] K. H. Rosen, Elementary Number Theory and Its Applications, 4th ed, Reading, Massachusetts, Addison-Wesley, 2000.
[28] A. Shamir, “How to share a secret,” Communications of the ACM, Vol. 22, 22, No.11, pp. 612-613, Nov. 1979.
[29] Tilborg Henk C. A. van, Fundamentals of Cryptology: a professional reference and interactive tutorial, pp. 321-332, Kluwer Academic publisher, 1999.
[30] 賴溪松、韓亮、張真誠,近代密碼學及其應用,旗標出版有限公司,2003年
論文全文使用權限
  • 同意授權校內瀏覽/列印電子全文服務,於2004-07-11起公開。
  • 同意授權校外瀏覽/列印電子全文服務,於2004-07-11起公開。


  • 如您有疑問,請聯絡圖書館
    聯絡電話:(06)2757575#65773
    聯絡E-mail:etds@email.ncku.edu.tw