期刊文献+
共找到162篇文章
< 1 2 9 >
每页显示 20 50 100
OBLIVIOUS TRANSFER WITH ACCESS CONTROL AND IDENTITY-BASED ENCRYPTION WITH ANONYMOUS KEY ISSUING
1
作者 Xu Lingling Zhang Fangguo Wen Yamin 《Journal of Electronics(China)》 2011年第4期571-579,共9页
In ACM'CCS 2009,Camenisch,et al.proposed the Oblivious Transfer with Access Control(AC-OT) in which each item is associated with an attribute set and can only be available,on request,to the users who have all the ... In ACM'CCS 2009,Camenisch,et al.proposed the Oblivious Transfer with Access Control(AC-OT) in which each item is associated with an attribute set and can only be available,on request,to the users who have all the attributes in the associated set.Namely,AC-OT achieves access control policy for conjunction of attributes.Essentially,the functionality of AC-OT is equivalent to the sim-plified version that we call AC-OT-SV:for each item,one attribute is associated with it,and it is requested that only the users who possess the associated attribute can obtain the item by queries.On one hand,AC-OT-SV is a special case of AC-OT when there is just one associated attribute with each item.On the other hand,any AC-OT can be realized by an AC-OT-SV.In this paper,we first present a concrete AC-OT-SV protocol which is proved to be secure in the model defined by Camenisch,et al..Then from the protocol,interestingly,a concrete Identity-Based Encryption(IBE) with Anonymous Key Issuing(AKI) is given which is just a direct application to AC-OT-SV.By comparison,we show that the AKI protocol we present is more efficient in communications than that proposed by Chow. 展开更多
关键词 Oblivious Transfer(OT) Access Control(AC) identity-based encryption(IBE) anonymous Key Issuing(AKI)
在线阅读 下载PDF
Some Remarks on Cocks'Identity-Based Encryption Scheme
2
作者 ZHAO Xiaopeng 《Journal of Donghua University(English Edition)》 CAS 2024年第4期447-450,共4页
The theory of quadratic residues plays an important role in cryptography.In 2001,Cocks developed an identity-based encryption(IBE)scheme based on quadratic residues,resolving Shamir’s 17-year-old open problem.However... The theory of quadratic residues plays an important role in cryptography.In 2001,Cocks developed an identity-based encryption(IBE)scheme based on quadratic residues,resolving Shamir’s 17-year-old open problem.However,a notable drawback of Cocks’scheme is the significant expansion of the ciphertext,and some of its limitations have been addressed in subsequent research.Recently,Cotan and Teşeleanu highlighted that previous studies on Cocks’scheme relied on a trial-and-error method based on Jacobi symbols to generate the necessary parameters for the encryption process.They enhanced the encryption speed of Cocks’scheme by eliminating this trialand-error method.Based on security analysis,this study concludes that the security of Cotan-Teşeleanu’s proposal cannot be directly derived from the security of the original Cocks’scheme.Furthermore,by adopting the Cotan-Teşeleanu method and introducing an additional variable as a public element,this study develops a similar enhancement scheme that not only accelerates the encryption speed but also provides security equivalent to the original Cocks’scheme. 展开更多
关键词 identity-based encryption(IBE) quadratic residue SECURITY Cocks’IBE scheme
在线阅读 下载PDF
Several Attacks on Attribute-Based Encryption Schemes
3
作者 Phi Thuong Le Huy Quoc Le Viet Cuong Trinh 《Computers, Materials & Continua》 2025年第6期4741-4756,共16页
Attribute-based encryption(ABE)is a cryptographic framework that provides flexible access control by allowing encryption based on user attributes.ABE is widely applied in cloud storage,file sharing,e-Health,and digita... Attribute-based encryption(ABE)is a cryptographic framework that provides flexible access control by allowing encryption based on user attributes.ABE is widely applied in cloud storage,file sharing,e-Health,and digital rightsmanagement.ABE schemes rely on hard cryptographic assumptions such as pairings and others(pairingfree)to ensure their security against external and internal attacks.Internal attacks are carried out by authorized users who misuse their access to compromise security with potentially malicious intent.One common internal attack is the attribute collusion attack,in which users with different attribute keys collaborate to decrypt data they could not individually access.This paper focuses on the ciphertext-policy ABE(CP-ABE),a type of ABE where ciphertexts are produced with access policies.Our firstwork is to carry out the attribute collusion attack against several existing pairingfree CP-ABE schemes.As a main contribution,we introduce a novel attack,termed the anonymous key-leakage attack,concerning the context in which users could anonymously publish their secret keys associated with certain attributes on public platforms without the risk of detection.This kind of internal attack has not been defined or investigated in the literature.We then show that several prominent pairing-based CP-ABE schemes are vulnerable to this attack.We believe that this work will contribute to helping the community evaluate suitable CP-ABE schemes for secure deployment in real-life applications. 展开更多
关键词 Attribute-based encryption ciphertext-policy attribute collusion attack anonymous key-leakage attack
在线阅读 下载PDF
Identity-based Broadcast Encryption with Shorter Transmissions 被引量:2
4
作者 张乐友 胡予濮 牟宁波 《Journal of Shanghai Jiaotong university(Science)》 EI 2008年第6期641-645,共5页
This paper describes two identity-based broadcast encryption (IBBE) schemes for mobile ad hoc networks. The first scheme proposed achieves sub-linear size cipertexts and the second scheme achieves O(1)- size ciphe... This paper describes two identity-based broadcast encryption (IBBE) schemes for mobile ad hoc networks. The first scheme proposed achieves sub-linear size cipertexts and the second scheme achieves O(1)- size ciphertexts. Furthermore, when the public keys are transmitted, the two schemes have short transmissions and achieve O(1) user storage cost, which are important for a mobile ad hoc network. Finally, the proposed schemes are provable security under the decision generalized bilinear Diffi-Hellman (GBDH) assumption in the random oracles model. 展开更多
关键词 broadcast encryption identity-based encryption short transmissions provable security
原文传递
Identity-based Encryption with Non-Interactive Opening 被引量:2
5
作者 范佳 唐小虎 +1 位作者 康立 路献辉 《Journal of Shanghai Jiaotong university(Science)》 EI 2008年第6期670-674,共5页
An identity-based encryption(IBE) was studied with non-interactively opening property that the plain text of a ciphertext can be revealed without affecting the security of the encryption system.Two kinds of non-intera... An identity-based encryption(IBE) was studied with non-interactively opening property that the plain text of a ciphertext can be revealed without affecting the security of the encryption system.Two kinds of non-interactive opening properties for IBE schemes were defined along with a concrete scheme in each case. 展开更多
关键词 identity-base encryption (IBE) public-key encryption with non-interactive opening (PKENO) identity-based encryption with non-interactive opening (IBENO)
原文传递
Fully Secure Identity-based Broadcast Encryption in the Subgroups 被引量:1
6
作者 张乐友 胡予濮 吴青 《China Communications》 SCIE CSCD 2011年第2期152-158,共7页
In this paper,we show how to use the dual techniques in the subgroups to give a secure identity-based broadcast encryption(IBBE) scheme with constant-size ciphertexts. Our scheme achieves the full security(adaptive se... In this paper,we show how to use the dual techniques in the subgroups to give a secure identity-based broadcast encryption(IBBE) scheme with constant-size ciphertexts. Our scheme achieves the full security(adaptive security) under three static(i.e. non q-based) assumptions. It is worth noting that only recently Waters gives a short ciphertext broadcast encryption system that is even adaptively secure under the simple assumptions. One feature of our methodology is that it is relatively simple to leverage our techniques to get adaptive security. 展开更多
关键词 identity-based broadcast encryption dual system encryption full security static assumption SUBGROUP provable security
在线阅读 下载PDF
An Identity-Based Encryption Scheme with Compact Ciphertexts
7
作者 刘胜利 郭宝安 张庆胜 《Journal of Shanghai Jiaotong university(Science)》 EI 2009年第1期86-89,共4页
This paper proposes an identity-based encryption scheme with the help of bilinear pairings, where the identity information of a user functions as the user's public key. The advantage of an identity-based public key s... This paper proposes an identity-based encryption scheme with the help of bilinear pairings, where the identity information of a user functions as the user's public key. The advantage of an identity-based public key system is that it can avoid public key certificates and certificate management. Our identity-based encryption scheme enjoys short ciphertexts and provable security against chosen-ciphertext attack (CCA). 展开更多
关键词 identity-based encryption compact ciphertext ehosen-ciphertext attack (CCA)
原文传递
An Efficient Identity-Based Homomorphic Broadcast Encryption
8
作者 Mei Cai 《Journal of Computer and Communications》 2019年第2期23-30,共8页
Broadcast encryption (BE) allows a sender to broadcast its message to a set of receivers in a single ciphertext. However, in broadcast encryption scheme, ciphertext length is always related to the size of the receiver... Broadcast encryption (BE) allows a sender to broadcast its message to a set of receivers in a single ciphertext. However, in broadcast encryption scheme, ciphertext length is always related to the size of the receiver set. Thus, how to improve the communication of broadcast encryption is a big issue. In this paper, we proposed an identity-based homomorphic broadcast encryption scheme which supports an external entity to directly calculate ciphertexts and get a new ciphertext which is the corresponding result of the operation on plaintexts without decrypting them. The correctness and security proofs of our scheme were formally proved. Finally, we implemented our scheme in a simulation environment and the experiment results showed that our scheme is efficient for practical applications. 展开更多
关键词 identity-based BROADCAST encryption Homomorphic COMMUNICATION
在线阅读 下载PDF
Security Analysis of a Privacy-Preserving Identity-Based Encryption Architecture
9
作者 Carlisle Adams 《Journal of Information Security》 2022年第4期323-336,共14页
Identity-Based Encryption (IBE) has seen limited adoption, largely due to the absolute trust that must be placed in the private key generator (PKG)—an authority that computes the private keys for all the users in the... Identity-Based Encryption (IBE) has seen limited adoption, largely due to the absolute trust that must be placed in the private key generator (PKG)—an authority that computes the private keys for all the users in the environment. Several constructions have been proposed to reduce the trust required in the PKG (and thus preserve the privacy of users), but these have generally relied on unrealistic assumptions regarding non-collusion between various entities in the system. Unfortunately, these constructions have not significantly improved IBE adoption rates in real-world environments. In this paper, we present a construction that reduces trust in the PKG without unrealistic non-collusion assumptions. We achieve this by incorporating a novel combination of digital credential technology and bilinear maps, and making use of multiple randomly-chosen entities to complete certain tasks. The main result and primary contribution of this paper are a thorough security analysis of this proposed construction, examining the various entity types, attacker models, and collusion opportunities in this environment. We show that this construction can prevent, or at least mitigate, all considered attacks. We conclude that our construction appears to be effective in preserving user privacy and we hope that this construction and its security analysis will encourage greater use of IBE in real-world environments. 展开更多
关键词 Security Analysis identity-based encryption (IBE) Reducing Trust Preserving Privacy Honest-but-Curious Attacker Malicious Attacker
在线阅读 下载PDF
Construction and Implementation of a Privacy-Preserving Identity-Based Encryption Architecture
10
作者 David Bissessar Carlisle Adams 《Journal of Information Security》 2023年第4期304-329,共26页
A recent proposal by Adams integrates the digital credentials (DC) technology of Brands with the identity-based encryption (IBE) technology of Boneh and Franklin to create an IBE scheme that demonstrably enhances priv... A recent proposal by Adams integrates the digital credentials (DC) technology of Brands with the identity-based encryption (IBE) technology of Boneh and Franklin to create an IBE scheme that demonstrably enhances privacy for users. We refer to this scheme as a privacy-preserving identity-based encryption (PP-IBE) construction. In this paper, we discuss the concrete implementation considerations for PP-IBE and provide a detailed instantiation (based on q-torsion groups in supersingular elliptic curves) that may be useful both for proof-of-concept purposes and for pedagogical purposes. 展开更多
关键词 identity-based encryption (IBE) Digital Credentials (DC) PRIVACY Pairing-Based Cryptography Supersingular Elliptic Curve q-Torsion Group
在线阅读 下载PDF
Identity-Based Encryption with Equality Test Supporting Accountable Authorization in Cloud Computing
11
作者 Zhen Zhao Bao-Cang Wang Wen Gao 《Journal of Computer Science & Technology》 2025年第1期215-228,共14页
Identity-based encryption with equality test(IBEET)is proposed to check whether the underlying messages of ciphertexts,even those encrypted with different public keys,are the same or not without decryption.Since peopl... Identity-based encryption with equality test(IBEET)is proposed to check whether the underlying messages of ciphertexts,even those encrypted with different public keys,are the same or not without decryption.Since people prefer to encrypt before outsourcing their data for privacy protection nowadays,the research of IBEET on cloud computing applications naturally attracts attention.However,we claim that the existing IBEET schemes suffer from the illegal trapdoor sharing problem caused by the inherited key escrow problem of the Identity-Based Encryption(IBE)mechanism.In traditional IBEET,the private key generator(PKG)with the master secret key generates trapdoors for all authorized cloud servers.Considering the reality in practice,the PKG is usually not fully trusted.In this case,the Private-Key Generator(PKG)may generate,share,or even sell any trapdoor without any risk of being caught,or not being held accountable,which may lead to serious consequences such as the illegal sharing of a gene bank's trapdoors.In this paper,to relieve the illegal trapdoor sharing problem in IBEET,we present a new notion,called IBEET Supporting Accountable Authorization(IBEET-AA).In IBEET-AA,if there is a disputed trapdoor,the generator will be distinguished among the PKG and suspected testers by an additional tracing algorithm.For the additional tracing function,except for the traditional indistinguishability(IND)and one-way(OW)security models in IBEET,we define three more security models to protect the tracing security against dishonest authorizers,PKG,and testers,respectively.Based on Gentry's IBE scheme,we instantiate IBEET-AA and give a specific construction along with a formalized security proof with random oracles. 展开更多
关键词 identity-based encryption with equality test accountable authorization cloud computing Gentry's IBE zero-knowledge proof
原文传递
Double-Blockchain Assisted Secure and Anonymous Data Aggregation for Fog-Enabled Smart Grid 被引量:14
12
作者 Siguang Chen Li Yang +2 位作者 Chuanxin Zhao Vijayakumar Varadarajan Kun Wang 《Engineering》 SCIE EI 2022年第1期159-169,共11页
As a future energy system,the smart grid is designed to improve the efficiency of traditional power systems while providing more stable and reliable services.However,this efficient and reliable service relies on colle... As a future energy system,the smart grid is designed to improve the efficiency of traditional power systems while providing more stable and reliable services.However,this efficient and reliable service relies on collecting and analyzing users’electricity consumption data frequently,which induces various security and privacy threats.To address these challenges,we propose a double-blockchain assisted secure and anonymous data aggregation scheme for fog-enabled smart grid named DA-SADA.Specifically,we design a three-tier architecture-based data aggregation framework by integrating fog computing and the blockchain,which provides strong support for achieving efficient and secure data collection in smart grids.Subsequently,we develop a secure and anonymous data aggregation mechanism with low computational overhead by jointly leveraging the Paillier encryption,batch aggregation signature and anonymous authentication.In particular,the system achieves fine-grained data aggregation and provides effective support for power dispatching and price adjustment by the designed double-blockchain and two-level data aggregation.Finally,the superiority of the proposed scheme is illustrated by a series of security and computation cost analyses. 展开更多
关键词 Blockchain Fog computing Homomorphic encryption Smart grid anonymITY
在线阅读 下载PDF
A Hierarchical Attribute-Based Encryption Scheme 被引量:2
13
作者 ZOU Xiubin 《Wuhan University Journal of Natural Sciences》 CAS 2013年第3期259-264,共6页
According to the relation of an attribute set and its subset,the author presents a hierarchical attribute-based encryption scheme in which a secret key is associated with an attribute set.A user can delegate the priva... According to the relation of an attribute set and its subset,the author presents a hierarchical attribute-based encryption scheme in which a secret key is associated with an attribute set.A user can delegate the private key corresponding to any subset of an attribute set while he has the private key corresponding to the attribute set.Moreover,the size of the ciphertext is constant,but the size of private key is linear with the order of the attribute set in the hierarchical attribute-based encryption scheme.Lastly,we can also prove that this encryption scheme meets the security of IND-sSETCPA in the standard model. 展开更多
关键词 attribute-based encryption hierarchical attributebased encryption identity-based encryption(IBE) bilinear map
原文传递
A Certificateless Threshold Public Key Encryption Scheme
14
作者 ZOU Xiubin ZOU Ran 《Wuhan University Journal of Natural Sciences》 CAS 2012年第3期223-228,共6页
The decryption participant's private key share for decryption is delegated by key generation center in the threshold IBE scheme.However,a key generation center which is absolutely trustworthy does not exist.So the au... The decryption participant's private key share for decryption is delegated by key generation center in the threshold IBE scheme.However,a key generation center which is absolutely trustworthy does not exist.So the author presents a certificateless threshold public key encryption scheme.Collaborating with an administrator,the decryption participant generates his whole private key share for decryption in the scheme.The administrator does not know the decryption participant's private key share for decryption.Making use of q-SDH assumption,the author constructs a certificateless threshold public key encryption scheme.The security of the scheme is eventually reduced to the solving of Decisional Bilinear Diffie-Hellman problem.Moreover,the scheme is secure under the chosen ciphertext attack in the standard model. 展开更多
关键词 certificateless public key cryptosystem identity-based encryption threshold public key encryption decisional bilinear Diffie-Hellman assumption bilinear pairings
原文传递
Secure Proxy Re-Encryption from CBE to IBE
15
作者 CHEN Yan ZHANG Futai 《Wuhan University Journal of Natural Sciences》 CAS 2008年第6期657-661,共5页
In this paper, an efficient hybrid proxy re-encryption scheme that allows the transformation of the ciphertexts in a traditional public key cryptosystem into the ciphertexts in an identity-based system is proposed. Th... In this paper, an efficient hybrid proxy re-encryption scheme that allows the transformation of the ciphertexts in a traditional public key cryptosystem into the ciphertexts in an identity-based system is proposed. The scheme is non-interactive, unidirectional and collude "safe". Furthermore, it is compatible with current IBE (identity-based encryption) deployments. The scheme has chosen ciphertext security in the random oracle model assuming the hardness of the Decisional Bilinear Diffie-Hellman problem. 展开更多
关键词 proxy re-encryption traditional public key encryption identity-based public key encryption Decisional Bilinear Diffie-Hellman problem random oracle model
原文传递
Identity-Based Steganography in Spatial Domain
16
作者 Xuba Xu Qiankai Nie 《Journal of Computer and Communications》 2018年第3期68-77,共10页
This paper proposed an identity-based steganographic scheme, where a receiver with certain authority can recover the secret message ready for him, but cannot detect the existence of other secret messages. The proposed... This paper proposed an identity-based steganographic scheme, where a receiver with certain authority can recover the secret message ready for him, but cannot detect the existence of other secret messages. The proposed scheme created several separate covert communication channels tagged by the Fuzzy Identity-Based Encryption (FIBE) in one grayscale image. Then each channel is used to embed one secret message by using any content-aware steganographic scheme. Receivers with different attributes can extract different messages corresponded. The Experiments illustrated the feasibility of this identity-based secret message extraction. Further, the proposed scheme presents high undetectability against steganalytic attack launched by receivers without corresponded attributes. 展开更多
关键词 STEGANOGRAPHY MULTIPLE EMBEDDING FUZZY identity-based encryption
在线阅读 下载PDF
ACR-MLM:a privacy-preserving framework for anonymous and confidential rewarding in blockchain-based multi-level marketing
17
作者 Saeed Banaeian Far Azadeh Imani Rad Maryam Rajabzadeh Asaar 《Data Science and Management》 2022年第4期219-231,共13页
Network marketing is a trading technique that provides companies with the opportunity to increase sales.With the increasing number of Internet-based purchases,several threats are increasingly observed in this field,su... Network marketing is a trading technique that provides companies with the opportunity to increase sales.With the increasing number of Internet-based purchases,several threats are increasingly observed in this field,such as user privacy violations,company owner(CO)fraud,the changing of sold products’information,and the scalability of selling networks.This study presents the concept of a blockchain-based market called ACR-MLM that functions based on the multi-level marketing(MLM)model,through which registered users receive anonymous and confidential rewards for their own and their subgroups’sales.Applying a public blockchain as the ACR-MLM framework’s infrastructure solves existing problems in MLM-based markets,such as CO fraud(against the government or its users),user privacy violations(obtaining their real names or subgroup users),and scalability(when vast numbers of users have been registered).To provide confidentiality and scalability to the ACR-MLM framework,hierarchical identity-based encryption(HIBE)was applied with a functional encryption(FE)scheme.Finally,the security of ACR-MLM is analyzed using the random oracle(RO)model and then evaluated. 展开更多
关键词 anonymous rewarding Blockchain Functional encryption Multi-level marketing PRIVACY
在线阅读 下载PDF
云计算环境下多模态异构网络数据安全存储方法 被引量:1
18
作者 李晓静 杨秀杰 《现代电子技术》 北大核心 2025年第6期63-67,共5页
为了快速、准确地存储多模态异构网络数据,提出一种云计算环境下多模态异构网络数据安全存储方法。采用编译套件部署多模态异构网络,利用后端编译模组生成网络的初始化配置,再利用前端编译模组分析与优化网络。针对多模态异构网络,构建... 为了快速、准确地存储多模态异构网络数据,提出一种云计算环境下多模态异构网络数据安全存储方法。采用编译套件部署多模态异构网络,利用后端编译模组生成网络的初始化配置,再利用前端编译模组分析与优化网络。针对多模态异构网络,构建包括客户端、服务器端、云存储服务插件、元数据存储的私有云存储架构。私有云存储架构采用虚拟化加解密方式,运行基于匿名广播加密的数据加密算法,引入拉格朗日插值方法,利用数据对应的会话密钥实现多模态异构网络数据的安全存储。实验结果表明,所提方法能够高效地存储多模态异构网络数据,数据传输的吞吐量高于3 Mb/s,加解密耗时低,存储的完整性高。 展开更多
关键词 云计算环境 多模态 异构网络 数据安全 存储方法 匿名广播加密 云存储架构
在线阅读 下载PDF
利用盲签名+洋葱路由的匿名服务器访问方案
19
作者 李猛 李晓宇 《计算机工程与设计》 北大核心 2025年第6期1664-1669,共6页
为保护注册用户的身份和IP地址隐私,提出一种结合盲签名和洋葱路由的匿名访问方案。用户通过盲签名技术从服务器获取假名ID,并用此假名ID访问服务器,确保服务器能验证ID合法性但无法识别用户真实身份。用户通过假名ID访问服务器时使用... 为保护注册用户的身份和IP地址隐私,提出一种结合盲签名和洋葱路由的匿名访问方案。用户通过盲签名技术从服务器获取假名ID,并用此假名ID访问服务器,确保服务器能验证ID合法性但无法识别用户真实身份。用户通过假名ID访问服务器时使用洋葱路由技术,使请求经过多个中转节点后到达服务器,确保服务器和中转节点均无法获取用户的IP地址。方案整合盲签名技术和洋葱路由技术,使合法的注册用户在访问服务器时其真实身份和IP地址均保持匿名,有效保护用户的隐私。 展开更多
关键词 网络安全 混合加密 洋葱路由 匿名通信 健壮性 盲签名 匿名访问
在线阅读 下载PDF
移动群智感知下的隐私保护:安全感知的探索、发展、未来
20
作者 何丽丽 蒋胜 +3 位作者 管新如 张洁楠 郑发扬 张磊 《计算机应用研究》 北大核心 2025年第11期3201-3214,共14页
移动群智感知(mobile crowdsensing,MCS)广泛应用于智慧城市、环境监测等领域,但由于其依赖大规模用户敏感数据,面临严峻的隐私泄露风险,已成为制约其推广应用的关键障碍。针对MCS中的隐私保护问题,开展了系统性调查与分类研究。通过梳... 移动群智感知(mobile crowdsensing,MCS)广泛应用于智慧城市、环境监测等领域,但由于其依赖大规模用户敏感数据,面临严峻的隐私泄露风险,已成为制约其推广应用的关键障碍。针对MCS中的隐私保护问题,开展了系统性调查与分类研究。通过梳理任务分配、数据采集与数据处理三阶段的隐私威胁,综合分析当前主流隐私保护技术,并构建了由匿名与假名、数据扰动、数据加密和分布式隐私保护四类方法构成的技术框架;进一步从隐私保护效果、计算复杂度、数据效用与适配性等维度对各类方法进行对比分析,揭示其原理特性与应用边界。最后,结合当前研究局限,探讨新兴技术在MCS隐私保护中的发展趋势与未来方向。 展开更多
关键词 移动群智感知 隐私保护 匿名与假名算法 数据扰动 数据加密 分布式隐私保护
在线阅读 下载PDF
上一页 1 2 9 下一页 到第
使用帮助 返回顶部