𝔖 Bobbio Scriptorium
✦   LIBER   ✦

On the security of metering scheme

✍ Scribed by Huang Lin; Zhenfu Cao


Publisher
Elsevier Science
Year
2010
Tongue
English
Weight
223 KB
Volume
60
Category
Article
ISSN
0898-1221

No coin nor oath required. For personal study only.

✦ Synopsis


In 2001, Harn and Lin [4]

proposed a non-repudiation metering scheme. In this paper, we reveal two security weaknesses in their scheme, which could make the scheme either too inefficient or incapable of presenting the exact visiting number of a server. An improved scheme will be presented in this paper to avoid these weaknesses in the metering scheme.


πŸ“œ SIMILAR VOLUMES


A note on optimal metering schemes
✍ Carlo Blundo; Stelvio Cimato; Barbara Masucci πŸ“‚ Article πŸ“… 2002 πŸ› Elsevier Science 🌐 English βš– 105 KB

A metering scheme is a method by which an audit agency is able to measure the interaction between servers (e.g., web servers) and clients (e.g., browsers) during a certain number of time frames. Metering schemes involve distributing information to clients and servers. Obviously, such information dis

Comments on the security of Chen’s authe
✍ Mohamed Rasslan; Amr Youssef πŸ“‚ Article πŸ“… 2011 πŸ› Elsevier Science 🌐 English βš– 169 KB

Chen (Computers and Electrical Engineering, vol. 30, 2004) illustrated that Tseng et al.'s authenticated encryption schemes, with message linkages for message flows, do not achieve their claimed integrity and authenticity properties. Furthermore, Chen presented some modified schemes to repair these

Some remarks on the security of the iden
✍ Jean Georgiades πŸ“‚ Article πŸ“… 1992 πŸ› Springer 🌐 English βš– 219 KB

We present in this paper an idea ofhow to reduce the number of possible permutations when trying to solve the permuted kernels problem. We refer to the identification scheme of Shamir [2] and we also show how a dishonest prover can maximize his prospects to pass the test.

On the security of an identity based mul
✍ Hu Xiong; Jianbin Hu; Zhong Chen; Fagen Li πŸ“‚ Article πŸ“… 2011 πŸ› Elsevier Science 🌐 English βš– 208 KB

In a multi-proxy signature scheme, an original signer could authorize a proxy group as his proxy agent. Then only the cooperation of all the signers in the proxy group can generate the proxy signatures on behalf of the original signer. Recently, Cao and Cao gave the first formal definition and secur

Secure video distribution scheme based o
✍ Shiguo Lian πŸ“‚ Article πŸ“… 2009 πŸ› John Wiley and Sons 🌐 English βš– 487 KB

## Abstract In TV program distribution, the receiver's identification information is embedded into video data in order to trace illegal distributors, and video data are encrypted in order to protect the confidentiality against unauthorized users. In traditional method, the TV program is firstly fin