A Linear Algebraic Approach to Metering Schemes

نویسندگان

  • Carlo Blundo
  • Sebastià Martín Molleví
  • Barbara Masucci
  • Carles Padró
چکیده

A metering scheme is a method by which an audit agency is able to measure the interaction between servers and clients during a certain number of time frames. Naor and Pinkas 21] proposed metering schemes where any server is able to compute a proof, i.e., a value to be shown to the audit agency at the end of each time frame, if and only if it has been visited by a number of clients larger than or equal to some threshold h during the time frame. The authors of 19] showed how to construct a metering scheme realizing any access structure, where the access structure is the family of all subsets of clients which enable a server to compute its proof. They also provided lower bounds on the communication complexity of metering schemes. In this paper we describe a linear algebraic approach to design metering schemes realizing any access structure. Namely, given any access structure, we present a method to construct a metering scheme realizing it from any linear secret sharing scheme with the same access structure. Besides, we prove some properties about the relationship between metering schemes and secret sharing schemes. These properties provide some new bounds on the information distributed to clients and servers in a metering scheme. According to these bounds, the optimality of the metering schemes obtained by our method relies upon the optimality of the linear secret sharing schemes for the given access structure.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Applying General Access Structure to Metering Schemes

In order to decide on advertisement fees for web servers, Naor and Pinkas [15] introduced metering schemes secure against coalition of corrupt servers and clients. In their schemes any server is able to construct a proof to be sent to an audit agency if and only if it has been visited by at least a certain number of clients. After that in series of papers Masucci et. al. [1–3, 13, 14] generaliz...

متن کامل

On Metering Schemes

In order to decide on advertisement fees for web servers, Naor and Pinkas introduced (threshold) metering schemes secure against coalitions of corrupt servers and clients. Several researchers have generalized the idea of Naor and Pinkas: first metering scheme with pricing and dynamic multi-threshold metering schemes have been proposed; later the solution has been extended to allow general acces...

متن کامل

Robust Metering Schemes for General Access Structures

In order to decide on advertisement fees for web servers, Naor and Pinkas introduced (threshold) metering schemes secure against coalitions of corrupt servers and clients. They show that one should be able to detect illegal behavior of clients, i.e., one needs to verify the shares received from clients. Most metering schemes do not offer this feature. But Ogata and Kurosawa pointed out a minor ...

متن کامل

Design a Secure and Practical Metering Scheme

More and more metering schemes based on some special protocols or mechanisms are used to calculate the number of visits which a website receives in a certain time frame. Then, the amount of money that an advertiser pay to a website depends on this number of visits. Until now, many protocols were suggested for metering schemes in literature. However, the discussion mainly focused on the theory o...

متن کامل

A study of two onramp metering schemes for congested freeways

We investigate the stability of a nonlinear (piecewise linear and possibly discontinuous) model of a freeway onramp, controlled by two popular onramp metering schemes: Alinea and Percent-Occupancy. The freeway model is based on Daganzo’s cell-transmission model and can be understood as a hybrid system switching among several discrete-time linear dynamic equations. It is shown, under conditions ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2001  شماره 

صفحات  -

تاریخ انتشار 2001