期刊文献+

“教育云”实验资源加密平台的设计与实现 被引量:1

Design and implementation of platform with encryption system of Education Cloud experimental resources
在线阅读 下载PDF
导出
摘要 云计算在教育领域中的迁移称之为"教育云",是未来教育信息化的基础架构。针对在"教育云"实验资源平台共享资源池的模式下,用户个人隐私数据具有极高的重要性、敏感性和保密性等安全问题,综合利用了同态加密和椭圆曲线算法,设计了"教育云"实验资源平台加密系统,阐述了系统加密关键技术,详细描述了系统加密实现过程和关键算法。实验结果表明:该系统具有良好的加密效果,可满足"教育云"实验资源平台中数据安全的要求。 The Education Cloud is the future of information technology in education infrastructure, which is the cloud computing migration in the field of education. In the Education Cloud experimental resources platform shared resource pool mode, the user privacy data security issues have high importance, sensitivity and confidentiality. This paper uses homomorphism encryption and elliptic curve algorithms comprehensively, and designs Education Cloud experimental resources platform with encryption system. The key technology of the encryption system including detailed description of the encryption implementation process and the key algorithms are expounded. The experimental results show that the system has good encryption effect, which can meet the requirements of data security in the platform of Education Cloud experimental resources.
作者 孔艺权
出处 《实验技术与管理》 CAS 北大核心 2013年第6期77-79,95,共4页 Experimental Technology and Management
基金 广东省教育科研"十二五"规划研究项目(2011TJK439) 湛江师范学院年教学改革项目(ZSJG1225) 湛江市科技攻关项目(2012C3105025)
关键词 加密系统 教育云 实验资源 encryption system education cloud experimental resources
  • 相关文献

参考文献13

二级参考文献120

  • 1林霞,朱艳琴.椭圆曲线密码体制在SET协议中的应用[J].微机发展,2005,15(2):58-60. 被引量:2
  • 2杨勇,方勇,周安民.秘密同态技术研究及其算法实现[J].计算机工程,2005,31(2):157-159. 被引量:18
  • 3XIANG Guang-li,CHEN Xin-meng,ZHU Ping,MA Jie.A Method of Homomorphic Encryption[J].Wuhan University Journal of Natural Sciences,2006,11(1):181-184. 被引量:8
  • 4尹春勇,李秦伟,孙汝霞.一种秘密同态的改进模式[J].贵州工业大学学报(自然科学版),2007,36(1):68-70. 被引量:3
  • 5Diffle W, Hellman M. New direction in cryptography[C]. IEEE Tran Inform Theory IT-22, 1976,664-654.
  • 6Shaft Goldwasser, Silvio Micali,Ronald L.A digital signature secure against adaptive chosen-message attacks[J].SIAM J Computing, 1988,(17):281-308.
  • 7Alfred Menezes, Nigel Smart. Security of signature schemes in a multi-user setting[DB/OL], http://citeseer.ist.psu.edu/menezes 01 security.html.
  • 8Rivest R, Shamir A, Adleman L. A method for obtaining digital signatures and public-key cryptosystems[C].Com of the ACM,1978.120-126.
  • 9NIST. Digital signature standard(DSS)[S].Publication 196,Federal Information Processing Standards, 1994-11.
  • 10Hellman M E,An extension of the Shannon theory approach to ctytography[J].IEEE Trans Inform Theory, 1975,10(4): 334-336.

共引文献1751

同被引文献10

引证文献1

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部