J4

• 研究论文 • 上一篇    下一篇

先应秘密共享系统安全性的动态分析和评估

史庭俊1,2;王超1;马建峰1   

  1. (1. 西安电子科技大学 计算机网络与信息安全教育部重点实验室, 陕西 西安 710071;
    2. 扬州大学 信息工程学院, 江苏 扬州 225009)

  • 收稿日期:1900-01-01 修回日期:1900-01-01 出版日期:2004-12-20 发布日期:2004-12-20

Dynamic analysis and evaluation of the security of a proactive secret sharing system

SHI Ting-jun1,2;WANG Chao1;MA Jian-feng1

  

  1. (1. Ministry of Education Key Lab. of Computer Network and Information Security, Xidian Univ., Xi'an 710071, China;
    2. Inst. of Information Technology, Yangzhou Univ., Yangzhou 225009, China)
  • Received:1900-01-01 Revised:1900-01-01 Online:2004-12-20 Published:2004-12-20

摘要: 针对目前先应秘密共享系统基于经验的设计和系统管理问题,采用随机过程的建模技术,建立了系统的安全性与配置参数之间的定量关系.将先应秘密共享系统中的服务器组由初始安全态向失效态转移的渐进过程抽象为马尔可夫过程,因而可在服务器组构成多样性的前提下,获得对先应秘密共享系统安全性的理论估算.通过建立系统的状态转移强度图和转移方程,获得了系统的配置参数与其安全性之间的定量关系,并给出了应用该方法的具体步骤.仿真实验验证了该方法在秘密共享系统安全性动态分析与定量评估方面具有有效性.

关键词: 先应秘密共享, 移动攻击, 入侵强度, 马尔可夫链, 失效概率

Abstract: This paper proposes a method for evaluating and analyzing the security of a proactive secret sharing system. Due to the difficulty in quantitatively estimating the adversary ability, the stochastic modeling techniques are used for depicting the relationships of the security to teh threshold, the time period and the behavior of adversary. Thus, the process of state transition from the secure state to the compromised state can be modeled as the Markov chain. With the state-transition diagram, the security probability of the system is obtained. Simulation experiment shows that te method has good feasibility and effectiveness. As a result, the threshold and the time period can be selected based on the quantitative method rather than on the empirical knowledge.

Key words: proactive secret sharing, mobile attack, intrusion rate, Markov chain, failture probability

中图分类号: 

  • TP393