计算机工程与应用 ›› 2007, Vol. 43 ›› Issue (21): 12-15.

• 博士论坛 • 上一篇    下一篇

可信的组播接收方不可抵赖服务MNORS

刘 璟1,2,刘民岷3   

  1. 1.中山大学 信息科学与技术学院 计算机系,广州 510275
    2.中山大学 广东省信息安全技术重点实验室,广州 510275
    3.电子科技大学 机械电子工程学院,成都 610054
  • 收稿日期:1900-01-01 修回日期:1900-01-01 出版日期:2007-07-21 发布日期:2007-07-21
  • 通讯作者: 刘 璟

Receiver-based trusted multicast non-repudiation service:MNORS

LIU Jing1,2,LIU Min-min3   

  1. 1.Department of Computer Science,School of Information Science and Technology,Sun Yat-Sen University,Guangzhou 510275,China
    2.Guangdong Province Key Lab of Information Security Technology,Sun Yat-Sen University,Guangzhou 510275,China
    3.School of Mechatronics Engineering,University of Electronic Science and Technology of China,Chengdu 610054,China
  • Received:1900-01-01 Revised:1900-01-01 Online:2007-07-21 Published:2007-07-21
  • Contact: LIU Jing

摘要: 提出了基于移动Agent安全方案MABCM的组播接收方不可抵赖服务MNORS。在MABCM构造的移动Agent黑箱的保护下,通过内嵌解密密钥的方式,NRR移动Agent程序能够在不可信的接收方计算环境中强制生成可信的NRR不可抵赖证据,解决了在不可信的接收方环境中强制产生可信的NRR证据的技术难题。目前,针对组播接收方不可抵赖问题的研究成果非常少,作者所知的唯一一个研究成果Nark是基于智能卡实现的,且其伪随机序列的产生方法的安全性并没有经过严格的分析和证明。和Nark相比,MNORS具有如下优点:纯软件实现、高透明性、高安全性和高可伸缩性。

关键词: 组播, 不可抵赖, 移动Agent, 安全, 可信计算

Abstract: Propose the multicast NRR service: MNORS based on the mobile agent security scheme: MABCM.Under the protection of mobile agent blackbox,through the method of embedded decryption key,the trusted NRR evidence can be forcibly generated in the untrusted computing environment of receivers by the NRR mobile agent.So we have solved the technique problem of generating trusted NRR evidence in untrusted receivers’ environment.In the research subject of receiver-based Multicast Non-Repudiation,there existed few results and the only result,due to the authors’ knowledge,is Nark,whose implementation must be based on smart card.And the security of its method of generating pseudo-random sequence has not been strictly analyzed and proved.Compared with Nark,MNORS have the following advantages:pure software implementation,high-level transparency,high-level security and scalability.

Key words: multicast, non-repudiation, mobile Agent, security, trusted computing