期刊文献+

一个基于多方秘密共享的代理加密转换信息传送方案 被引量:1

A scheme of the massage transportation based on quorum controlled proxy re-encryption
在线阅读 下载PDF
导出
摘要 在公开的网络中采用匿名连接,使攻击者既窃听不到机密也实施不了流量分析。但现有方案中,使用重复加密和签名同一消息包的方法传送信息必然使系统效率降低;其次,使用常规公钥密码方法仍可使攻击者通过验证密钥等分析原发节点位置。而采用代理加密转换方法时,其中间节点不用解密就可把密文消息转换成后续节点可接受的密文消息,从而取得更高的隐蔽程度。因此,本文应用多方门限代理加密转换技术,提出了信息传送的新方案并分析了其安全性。 Anonymous routing connections on open networks are strongly resistant to both eavesdropping and traffic analysis. However, encrypting and signing the same massage package in the schemes available will reduce its efficiency. In addition, the attacker can still perform traffic analysis by getting the originator抯 keys to the massage packages when these packages are transported by using standard public key cryptographic techniques. But when used proxy re-encryption, the mid-proxy can transform between ciphers from one encryption key to another encryption key without having to expose the cleartexts to the participants involved. Therefore, a new massage transportation scheme is proposed with quorum controlled proxy re-encryption technique and an analysis of security is given.
出处 《通信学报》 EI CSCD 北大核心 2003年第4期133-138,共6页 Journal on Communications
基金 国家自然科学基金资助项目(19931010 60073052)
关键词 网络安全 信息隐藏 匿名路由 代理加密转换 门限加密转换 秘密共享 networks security information hiding anonymous routing proxy re-encryption quorum controlled proxy re-encryption
  • 相关文献

参考文献7

  • 1CHAUM D. Untraceable electronic mail, return addresses and digital pseudonyms[J]. Communications of the ACM, 1981,24(2):84-88.
  • 2CHAUM D. The dining cryptographers problem: unconditional sender and recipient untraceability[Y], Journal of Crptology,1988,(1):65-75.
  • 3REED M, SYVERSON P, GOLDSCHI.,AG D, Protocols using anonymous connections :mobile applications[A]. Proc of Security Protocols'97--the 5th International Workshop on Security Protocols[C]. LNCS 1361, Springer-Veriag,Paris, France, 1997. 13-23.
  • 4SYVERSON P F, GOLDSCHLAG D M, REED M G. Anonymous connections and onion routing[J]. IEEE J Selected Areas in Communication, 1998,16 (4):482-494.
  • 5GOLDSCHLAG D M, REED M G, SYVERSON P E Onion routing for anonymous and private internet connections[J].Communications of ACM, 1999,42(2):39-42.
  • 6GOLDSCHLAG D M, REED M G, SYVERSON P F. Hiding routing information[A]. Proceedings of Information Hiding'96-First International Workshop[C]. Cambridge, UK, LNCS 1174, Springer-Verlag, 1996. 137-150.
  • 7JAKOBSSON M. On quorum controlled asymmetric proxy re-enctyption[A]. PKC'99---the 2nd International Workshop on Practice and Theory in Public Key Cryptography[C]. LNCS 1560 Kamakura, Japan, March 1999. 112-121.

同被引文献3

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部