On Metering Schemes
نویسندگان
چکیده
In order to decide on advertisement fees for web servers, Naor and Pinkas introduced (threshold) metering schemes secure against coalitions of corrupt servers and clients. Several researchers have generalized the idea of Naor and Pinkas: first metering scheme with pricing and dynamic multi-threshold metering schemes have been proposed; later the solution has been extended to allow general access structures and an approach on linear algebra has been introduced. But all previous papers consider the following scenario a general (or threshold) access structure for the clients and a threshold access structure for the servers. We generalize the model allowing also a general access structure for the servers, moreover we strengthen it limiting the possibility of corrupt servers to help each other. A more efficient protocol satisfying the requirements of the new model is described. Naor and Pinkas show that one should be able also to detect illegal behavior of clients, i.e., one needs to verify the shares received from clients. Most metering schemes do not offer this feature. But Ogata and Kurosawa pointed out a minor flaw in the extension protocol by Naor and Pinkas providing detection of such illegal behavior and propose a correction. So, we extend the used linear algebra approach in order to build robust unconditionally secure general metering schemes. As a tool to achieve this goal we introduce doubly-labelled matrices and an operation on such matrices. Certain properties of this operation are proven.
منابع مشابه
Eecient Metering Schemes with Pricing
In order to decide on advertisement fees for web servers, Naor and Pinkas 7] introduced metering schemes. They proposed metering schemes in which any server is able to construct a proof to be sent to an audit agency if and only if it has been visited by at least a certain number, say h, of clients. Afterwards, the authors of 3] generalized the idea of Naor and Pinkas and proposed metering schem...
متن کاملA Linear Algebraic Approach to Metering Schemes
A metering scheme is a method by which an audit agency is able to measure the interaction between servers and clients during a certain number of time frames. Naor and Pinkas 21] proposed metering schemes where any server is able to compute a proof, i.e., a value to be shown to the audit agency at the end of each time frame, if and only if it has been visited by a number of clients larger than o...
متن کاملApplying General Access Structure to Metering Schemes
In order to decide on advertisement fees for web servers, Naor and Pinkas [15] introduced metering schemes secure against coalition of corrupt servers and clients. In their schemes any server is able to construct a proof to be sent to an audit agency if and only if it has been visited by at least a certain number of clients. After that in series of papers Masucci et. al. [1–3, 13, 14] generaliz...
متن کاملDynamic Multi-threshold Metering Schemes
A metering scheme is a method by which an audit agency is able to measure the interaction between clients and servers on the web during a certain number of time frames. Naor and Pinkas 7] considered metering schemes in which any server is able to construct a proof to be sent to the audit agency if and only if it has been visited by at least a number, say h, of clients in a given time frame. In ...
متن کاملBounds for Robust Metering Schemes and Their Relationship with A2-code
A metering scheme allows a correct counting on the number of hits that a Web site received during a certain period. In this paper, we first derive tight lower bounds on the communication complexity |Vi| (i = 1, . . . , n) and the size of server’s secrets |Es| for robust and perfect (k, n)-metering schemes. We next show an almost equivalence between (k, n)-metering schemes and k-multiple-use A-c...
متن کاملBounds for Robust Metering Schemes and Their Relationship with A-code
A metering scheme allows a correct counting on the number of hits that a Web site received during a certain period. In this paper, we first derive tight lower bounds on the communication complexity |Vi| (i = 1, . . . , n) and the size of server’s secrets |Es| for robust and perfect (k, n)-metering schemes. We next show an almost equivalence between (k, n)-metering schemes and k-multiple-use A-c...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2004