{"title":"用后量子密码学方法提高多代理信息安全系统的效率","authors":"S. V. Bezzateev, S. G. Fomicheva, A. F. Suprun","doi":"10.3103/S0146411623080035","DOIUrl":null,"url":null,"abstract":"<p>The information security problems for open multiagent systems using access control schemes based on RSA algorithm are analyzed. It is shown that when using such schemes, a significant part of the agents’ lifetime is spent on authentication processes. In order to increase the efficiency of multiagent systems by reducing the number of agent authentication processes, a method of access differentiation based on Goppa codes is justified and proposed. For the proposed methodology, an assessment of the security level of agents' information is given.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"57 8","pages":"1005 - 1017"},"PeriodicalIF":0.6000,"publicationDate":"2024-02-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Improving the Efficiency of Multiagent Information Security Systems by Post-Quantum Cryptography Methods\",\"authors\":\"S. V. Bezzateev, S. G. Fomicheva, A. F. Suprun\",\"doi\":\"10.3103/S0146411623080035\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<p>The information security problems for open multiagent systems using access control schemes based on RSA algorithm are analyzed. It is shown that when using such schemes, a significant part of the agents’ lifetime is spent on authentication processes. In order to increase the efficiency of multiagent systems by reducing the number of agent authentication processes, a method of access differentiation based on Goppa codes is justified and proposed. For the proposed methodology, an assessment of the security level of agents' information is given.</p>\",\"PeriodicalId\":46238,\"journal\":{\"name\":\"AUTOMATIC CONTROL AND COMPUTER SCIENCES\",\"volume\":\"57 8\",\"pages\":\"1005 - 1017\"},\"PeriodicalIF\":0.6000,\"publicationDate\":\"2024-02-29\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"AUTOMATIC CONTROL AND COMPUTER SCIENCES\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://link.springer.com/article/10.3103/S0146411623080035\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"AUTOMATION & CONTROL SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","FirstCategoryId":"1085","ListUrlMain":"https://link.springer.com/article/10.3103/S0146411623080035","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"AUTOMATION & CONTROL SYSTEMS","Score":null,"Total":0}
Improving the Efficiency of Multiagent Information Security Systems by Post-Quantum Cryptography Methods
The information security problems for open multiagent systems using access control schemes based on RSA algorithm are analyzed. It is shown that when using such schemes, a significant part of the agents’ lifetime is spent on authentication processes. In order to increase the efficiency of multiagent systems by reducing the number of agent authentication processes, a method of access differentiation based on Goppa codes is justified and proposed. For the proposed methodology, an assessment of the security level of agents' information is given.
期刊介绍:
Automatic Control and Computer Sciences is a peer reviewed journal that publishes articles on• Control systems, cyber-physical system, real-time systems, robotics, smart sensors, embedded intelligence • Network information technologies, information security, statistical methods of data processing, distributed artificial intelligence, complex systems modeling, knowledge representation, processing and management • Signal and image processing, machine learning, machine perception, computer vision