Secure and efficient metering
We consider an environment in which many servers serve an even larger number of clients (e.g. the web), and it is required to meter the interaction between servers and clients. More specifically, it is desired to count the number of clients that were served by a server. A major possible application is to measure the popularity of web pages in order to decide on advertisement fees. The metering process must be very efficient and should not require extensive usage of any new communication channels. The metering ould also be secure against fraud attempts by servers which inflate the number of their clients and against clients that attempt to disrupt the metering process. We suggest several secure and efficient constructions of metering systems, based on efficient cryptographic techniques. They are also very accurate and can preserve the privacy of the clients.
Supplementary Material (0)
- Aho A., Hopcroft J. and Ullman J., The design and analysis of computer algorithms, Addison-Wesley, 1974.
- Ben-Or M., Goldwasser S. and Wigderson A., Completeness theorems for noncryp-tographic fault tolerant distributed computation, 20th STOC, 1988, 1–9.
- Carter L. and Wegman M., Universal hash functions, J. of Computer and System Sciences, Vol. 18, 1979, 143–154. CrossRef
- Desmedt Y. and Frankel Y., Threshold cryptosystems, Crypto '89, LNCS 435, 1990, 307–315.
- Dwork C. and Naor M., Pricing via Processing or Combating Junk Mail, Crypto '92, LNCS 576, 1992, 114–128.
- Feldman P., A practical scheme for non-interactive verifiable secret sharing, 28th FOCS, 1987, 427–437.
- Feldman P. and Micali S., An Optimal Probabilistic Protocol for Synchronous Byzan-tine Agreement, SIAM J. on Comp., Vol. 26, No. 4, 1997, 873–933. CrossRef
- Frankel Y., Gemmell P., MacKenzie P. D. and Yung M., Optimal-resilience proactive public-key cryptosystems, 38th FOCS, 1997, 384–393.
- Franklin M. K. and Malkhi D., Auditable metering with lightweight security, Finan-cial Cryptography '97, 1997.
- J. Kilian, Founding Cryptography on Oblivious Transfer, 20th STOC, 1988, 20–31.
- Jarecki S. and Odlyzko A., An efficient micropayment system based on probabilistic polling, Financial Cryptography '97, 1997.
- Merkle R., A certified digital signature, Crypto '89, LNCS 435, 1990, 218–238.
- McEliece R. J. and Sarwate D. V., On sharing secrets and Reed-Solomon Codes, Comm. ACM, Vol. 24, No. 9, 1981, 583–584. CrossRef
- Novak T. and Hoffman D., New metrics for web media: toward the devel-opment of web measurement standards, Sep. 1996. Manuscript available at http://www2000.ogsm.vanderbilt.edu/novak/web.standards/webstand.html
- Pedersen T. P., Non-interactive and information-theoretic secure verifiable secret sharing, Crypto '91, LNCS 576, 1991, 129–140.
- Pitkow J., In search of reliable usage data on the WWW, Sixth International WWW Conf., Apr. 1997.
- Rabin T. and Ben-Or M., Verifiable secret sharing and multiparty protocols with honest majority, 21st STOC, 1989, 73–85.
- Kinsman M., Web advertising 1997: market analysis and forecast, Cowles/Simba Information, Stamford, Connecticut. May 1997.
- Shamir A., How to share a secret, Comm. ACM Vol. 22, No. 11, 1979, 612–613. CrossRef
- Wegman M. and Carter L., New hash functions and their use in authentication and set equality, J. of Computer and System Sciences, vol. 20, 1981, 265–279. CrossRef
- 21. Yao A. C., How to generate and exchange secretes, 27th FOCS, 1986, 162–167.
About this Chapter
- Secure and efficient metering
- Book Title
- Advances in Cryptology — EUROCRYPT'98
- Book Subtitle
- International Conference on the Theory and Application of Cryptographic Techniques Espoo, Finland, May 31 – June 4, 1998 Proceedings
- pp 576-590
- Print ISBN
- Online ISBN
- Series Title
- Lecture Notes in Computer Science
- Series Volume
- Series ISSN
- Springer Berlin Heidelberg
- Copyright Holder
- Additional Links
- Industry Sectors
- eBook Packages
To view the rest of this content please follow the download PDF link above.