期刊文献+
共找到650篇文章
< 1 2 33 >
每页显示 20 50 100
Evolve and Revoke:A Secure and Efficient Conditional Proxy Re-Encryption Scheme with Ciphertext Evolution
1
作者 Han-Yu Lin Tung-Tso Tsai Yi-Jia Ye 《Computers, Materials & Continua》 2026年第4期1565-1583,共19页
Cloud data sharing is an important issue in modern times.To maintain the privacy and confidentiality of data stored in the cloud,encryption is an inevitable process before uploading the data.However,the centralized ma... Cloud data sharing is an important issue in modern times.To maintain the privacy and confidentiality of data stored in the cloud,encryption is an inevitable process before uploading the data.However,the centralized management and transmission latency of the cloud makes it difficult to support real-time processing and distributed access structures.As a result,fog computing and the Internet of Things(IoT)have emerged as crucial applications.Fog-assisted proxy re-encryption is a commonly adopted technique for sharing cloud ciphertexts.It allows a semitrusted proxy to transforma data owner’s ciphertext into another re-encrypted ciphertext intended for a data requester,without compromising any information about the original ciphertext.Yet,the user revocation and cloud ciphertext renewal problems still lack effective and secure mechanisms.Motivated by it,we propose a revocable conditional proxy re-encryption scheme offering ciphertext evolution(R-CPRE-CE).In particular,a periodically updated time key is used to revoke the user’s access privileges while an access condition prevents a malicious proxy from reencrypting unauthorized ciphertext.We also demonstrate that our scheme is provably secure under the notion of indistinguishability against adaptively chosen identity and chosen ciphertext attacks in the random oracle model.Performance analysis shows that our scheme reduces the computation time for a complete data access cycle from an initial query to the final decryption by approximately 47.05%compared to related schemes. 展开更多
关键词 REVOCABLE proxy re-encryption conditional access control ciphertext evolution fog computing
在线阅读 下载PDF
A Fully Homomorphic Encryption Scheme Suitable for Ciphertext Retrieval
2
作者 Ronglei Hu ChuceHe +3 位作者 Sihui Liu Dong Yao Xiuying Li Xiaoyi Duan 《Computers, Materials & Continua》 2025年第7期937-956,共20页
Ciphertext data retrieval in cloud databases suffers from some critical limitations,such as inadequate security measures,disorganized key management practices,and insufficient retrieval access control capabilities.To ... Ciphertext data retrieval in cloud databases suffers from some critical limitations,such as inadequate security measures,disorganized key management practices,and insufficient retrieval access control capabilities.To address these problems,this paper proposes an enhanced Fully Homomorphic Encryption(FHE)algorithm based on an improved DGHV algorithm,coupled with an optimized ciphertext retrieval scheme.Our specific contributions are outlined as follows:First,we employ an authorization code to verify the user’s retrieval authority and perform hierarchical access control on cloud storage data.Second,a triple-key encryption mechanism,which separates the data encryption key,retrieval authorization key,and retrieval key,is designed.Different keys are provided to different entities to run corresponding system functions.The key separation architecture proves particularly advantageous in multi-verifier coexistence scenarios,environments involving untrusted third-party retrieval services.Finally,the enhanced DGHV-based retrieval mechanism extends conventional functionality by enabling multi-keyword queries with similarity-ranked results,thereby significantly improving both the functionality and usability of the FHE system. 展开更多
关键词 Cloud storage homomorphic encryption ciphertext retrieval identity authentication
在线阅读 下载PDF
车联网中具有多密文等值测试的在线/离线异构签密方案
3
作者 周美贤 范馨月 《电信科学》 北大核心 2026年第2期106-119,共14页
针对车联网(Internet of vehicles,IoV)中异构加密体制通信问题,提出了一种支持多密文等值测试的在线/离线异构签密方案,实现了无证书密码体制到公钥基础设施的安全通信。所提方案基于椭圆曲线加密(elliptic curve cryptosystem,ECC)构... 针对车联网(Internet of vehicles,IoV)中异构加密体制通信问题,提出了一种支持多密文等值测试的在线/离线异构签密方案,实现了无证书密码体制到公钥基础设施的安全通信。所提方案基于椭圆曲线加密(elliptic curve cryptosystem,ECC)构建,利用在线/离线签密机制降低车辆端的计算开销。在云端进行多密文等值测试使接收者只须从云端下载一次重复密文,减轻接收者负担。安全性方面,在随机预言机模型(random oracle model,ROM)下证明不可伪造性和机密性。再采用ProVerif和Scyther工具验证,ProVerif结果表明该方案能够保证消息机密性、身份匿名性与签名正确性,Scyther结果显示未发现有效的攻击路径。性能分析表明,与现有方案相比,该方案在计算与通信开销上更具优势,在密文数量较大时优势更明显,适用于车联网环境。 展开更多
关键词 车联网 椭圆曲线加密 异构签密 在线/离线 多密文等值测试
在线阅读 下载PDF
基于密文混淆的不经意传输协议
4
作者 李晓东 朱晓鹏 +2 位作者 张健毅 吴庸 窦一萌 《计算机工程》 北大核心 2026年第1期293-302,共10页
不经意传输(OT)协议是一种保护隐私的两方通信协议,也是构建安全多方计算的重要模块。该协议通常基于RSA(Rivest—Shamir—Adleman)或DH(Diffie—Hellman)密码系统来交换对称密钥,在消息的加密阶段使用对称密钥进行加密。然而,在现有的O... 不经意传输(OT)协议是一种保护隐私的两方通信协议,也是构建安全多方计算的重要模块。该协议通常基于RSA(Rivest—Shamir—Adleman)或DH(Diffie—Hellman)密码系统来交换对称密钥,在消息的加密阶段使用对称密钥进行加密。然而,在现有的OT协议中,多对公私钥生成以及数据计算非常耗时。在同一密文域中,采用双射函数对密文进行变换,可以确保密文解密后的不可区分性,同时减少计算量。在半诚实模型上,提出一种基于密文混淆的OT协议框架,并在该框架下基于RSA和DH实例化OT协议。相较基于RSA的加密方案,所提协议只需要一对公私钥,同时,当公私钥减少为一对时,接收方可以利用发送方数字证书中的公钥,实现具有身份认证功能的OT协议。对比基于DH密钥交换的OT协议,该协议具有数据传输量小、计算复杂度低的优势。实验结果表明,与现有OT协议相比,实例化的协议在密钥交换阶段的效率至少可提高30%。此外,该协议还可以用于隐私集合求交、混淆电路和OT扩展协议中的基础协议。 展开更多
关键词 不经意传输 双射函数 密文混淆 身份认证 安全多方计算
在线阅读 下载PDF
面向长文本的通配符对称搜索加密方案
5
作者 张茜 王柳旭 +4 位作者 苏烨 杨海宁 李青茹 谷志斌 王长广 《河北师范大学学报(自然科学版)》 2026年第1期9-24,共16页
针对数据要素在生命周期使用过程中面临的安全检索问题,以能够准确描述多种数据类型的长文本为研究对象,聚焦对称加密场景下的长文本安全检索需求,围绕长文本密文搜索的问题建模、算法设计与安全模型构建等方面展开研究,设计了一种面向... 针对数据要素在生命周期使用过程中面临的安全检索问题,以能够准确描述多种数据类型的长文本为研究对象,聚焦对称加密场景下的长文本安全检索需求,围绕长文本密文搜索的问题建模、算法设计与安全模型构建等方面展开研究,设计了一种面向长文本的对称可搜索加密方案.针对长文本数据字符规模大、字符空间固定和位置特征显著等特点,提出了粒子化搜索思想,并构建了相应的实例化位图索引结构,进而设计出支持任意通配符的长文本密文搜索方案.该方案在基于模拟的框架下被证明满足L-适应性安全.为进一步评估方案的实际效率,首先在理论上与多个现有方案在存储、计算和通信开销方面进行了对比分析,证明了所提方案在理论上的高效性,进一步地,通过实验将所提方案与明文基线方案进行性能对比.结果表明,所提方案的索引构建时间约为基线方案的100倍,而搜索时间与基线方案处于同一量级,验证了方案在搜索阶段的实用性与高效性. 展开更多
关键词 可搜索加密 对称可搜索加密 通配符可搜索加密 适应性安全 长文本密文搜索
在线阅读 下载PDF
属性分级并部分盲化的多机构CP-ABE
6
作者 王娟 古丽博斯坦·阿克木 +1 位作者 雷雪娇 努尔买买提·黑力力 《计算机应用与软件》 北大核心 2026年第2期347-355,370,共10页
针对CP-ABE的访问策略中有些属性可能会泄露一些隐私或敏感信息,提出盲化敏感属性的多属性监管机构CP-ABE方案。该方案根据属性和敏感信息之间的相关程度将属性分成三类:全局敏感、局部敏感和一般。加密时盲化访问策略中出现敏感属性,... 针对CP-ABE的访问策略中有些属性可能会泄露一些隐私或敏感信息,提出盲化敏感属性的多属性监管机构CP-ABE方案。该方案根据属性和敏感信息之间的相关程度将属性分成三类:全局敏感、局部敏感和一般。加密时盲化访问策略中出现敏感属性,而一般属性以明文形式出现。两个属性监管机构协调预判用户的解密能力,进而避免徒劳的解密运算。这样不仅能针对性地防止访问策略泄露敏感信息,而且通过保留一般属性的明文出现,能降低加解密的计算代价,从而得到策略机密性和密码系统的效率之间的更好折中。 展开更多
关键词 密文策略属性基加密 多授权机构 属性分类 全局敏感属性 局部敏感属性
在线阅读 下载PDF
基于属性加密技术的去中心化跨链车联网数据共享方案
7
作者 俞惠芳 周雯泽 《小型微型计算机系统》 北大核心 2026年第3期709-714,共6页
针对车联网中隐私泄露、数据易被非授权访问及篡改、云存储系统单点故障等问题,提出一种基于属性加密技术的跨链数据交互方法.传统单区块链模式存在数据共享壁垒,难以实现不同品牌车辆链间的数据互通,存储模式单一且无法规避数据孤岛问... 针对车联网中隐私泄露、数据易被非授权访问及篡改、云存储系统单点故障等问题,提出一种基于属性加密技术的跨链数据交互方法.传统单区块链模式存在数据共享壁垒,难以实现不同品牌车辆链间的数据互通,存储模式单一且无法规避数据孤岛问题.所提方案通过中继链、云存储系统和可扩展的拜占庭容错共识机制的融合,解决了传统单区块链模式的可扩展性限制和海量数据的存储问题,设置访问树结构和文件访问有效期进行细粒度访问控制.分散的路侧单元采集车辆实时信息上传至区块链,协助用户完成数据上链;利用可信中继链实现同一城区内不同品牌车辆之间的数据交换.所提方案安全性高且适于复杂庞大的数据环境.相比而言,总计算效率相比同类算法提升约14.28%,通信总开销降低34.4%,极大地提升了跨链数据交换效率. 展开更多
关键词 车联网 跨链协议 数据共享 中继链 密文策略
在线阅读 下载PDF
格上具有短密文和密钥的CP-ABE方案
8
作者 卫成亮 郭宇燕 +1 位作者 江明明 张天桥 《淮北师范大学学报(自然科学版)》 2026年第1期54-60,共7页
针对大多数密文策略属性基加密(CP-ABE)方案无法有效抵抗量子计算机攻击,且密文和密钥尺寸过大,制约CP-ABE在实际场景中推广应用问题,使用新型陷门生成算法和原像采样算法,将陷门生成算法中标签矩阵与属性差满秩编码函数绑定,将密文和... 针对大多数密文策略属性基加密(CP-ABE)方案无法有效抵抗量子计算机攻击,且密文和密钥尺寸过大,制约CP-ABE在实际场景中推广应用问题,使用新型陷门生成算法和原像采样算法,将陷门生成算法中标签矩阵与属性差满秩编码函数绑定,将密文和密钥尺寸大幅度缩减,提出基于格的CP-ABE方案。使用格理论中容错学习(LWE)困难问题对方案进行严格形式化证明,使其能够抵抗选择性选择明文攻击(IND-sCPA)。该方案与相关方案相比,在性能和实用性方面更有优势。 展开更多
关键词 密文策略 属性基加密 陷门 容错学习
在线阅读 下载PDF
基于数据加密融合双Logistic混沌和RSA的改进哈希算法研究
9
作者 温游 《自动化与仪器仪表》 2026年第1期17-20,共4页
使用更强的哈希算法对密码进行哈希处理能够使加密后的数据长度更加统一,且可以增强密码复杂性,避免数据被篡改。为实现上述目的,针对基于数据加密融合双Logistic混沌和RSA的改进哈希算法展开研究。定义哈希算法原函数,并结合双Logisti... 使用更强的哈希算法对密码进行哈希处理能够使加密后的数据长度更加统一,且可以增强密码复杂性,避免数据被篡改。为实现上述目的,针对基于数据加密融合双Logistic混沌和RSA的改进哈希算法展开研究。定义哈希算法原函数,并结合双Logistic混沌算法与RSA算法表达式,描述数据样本特征,进而实现基于数据加密的哈希算法改进。实验结果表明,应用上述方法对数据进行加密处理,可以有效解决加密后数据存储长度差异较为突出的问题,能够在一定程度上节约数据库内存空间,且密文模板中所包含码元数量明显增多,基于该模板能够定义更为复杂的密码序列,有助于提升数据传输的安全性。 展开更多
关键词 数据加密 双Logistic混沌 RSA算法 哈希算法 数据特征 密文模板
原文传递
基于RSA同态加密的联邦学习隐私保护方案
10
作者 管桂林 蔡惠民 +4 位作者 支婷 曹扬 丁洪鑫 黄江 代杨 《电子科技》 2026年第2期96-104,共9页
针对现有联邦学习安全聚合方案存在梯度信息泄露、参与方计算开销较大以及缺乏对模型的完整性保护等问题,文中提出一种基于RSA(Rivest-Shamir-Adleman)同态加密的联邦学习隐私保护方案。采用构建高效且安全的RSA同态加密算法解决梯度数... 针对现有联邦学习安全聚合方案存在梯度信息泄露、参与方计算开销较大以及缺乏对模型的完整性保护等问题,文中提出一种基于RSA(Rivest-Shamir-Adleman)同态加密的联邦学习隐私保护方案。采用构建高效且安全的RSA同态加密算法解决梯度数据泄露问题,利用中央服务器实现解密计算以降低参与方的计算开销。基于区块链的不可篡改性、存证保护等特性将数据训练过程中关键数据进行上链存证,实现对模型数据的全生命周期维护。通过安全性分析可知,所提方案具有抗合谋攻击以及密文不可区分性。由性能以及效率方面分析对比结果可知,所提方案较传统方案具有一定优势。 展开更多
关键词 联邦学习 隐私保护 同态加密 区块链 RSA 安全聚合 存证保护 密文不可去分性
在线阅读 下载PDF
Attribute-Based Access Control for Multi-Authority Systems with Constant Size Ciphertext in Cloud Computing 被引量:16
11
作者 CHEN Yanli SONG Lingling YANG Geng 《China Communications》 SCIE CSCD 2016年第2期146-162,共17页
In most existing CP-ABE schemes, there is only one authority in the system and all the public keys and private keys are issued by this authority, which incurs ciphertext size and computation costs in the encryption an... In most existing CP-ABE schemes, there is only one authority in the system and all the public keys and private keys are issued by this authority, which incurs ciphertext size and computation costs in the encryption and decryption operations that depend at least linearly on the number of attributes involved in the access policy. We propose an efficient multi-authority CP-ABE scheme in which the authorities need not interact to generate public information during the system initialization phase. Our scheme has constant ciphertext length and a constant number of pairing computations. Our scheme can be proven CPA-secure in random oracle model under the decision q-BDHE assumption. When user's attributes revocation occurs, the scheme transfers most re-encryption work to the cloud service provider, reducing the data owner's computational cost on the premise of security. Finally the analysis and simulation result show that the schemes proposed in this thesis ensure the privacy and secure access of sensitive data stored in the cloud server, and be able to cope with the dynamic changes of users' access privileges in large-scale systems. Besides, the multi-authority ABE eliminates the key escrow problem, achieves the length of ciphertext optimization and enhances the effi ciency of the encryption and decryption operations. 展开更多
关键词 cloud computing attribute-basedencryption access control multi-authority constant ciphertext length attribute revocation
在线阅读 下载PDF
An Improved Ciphertext Retrieval Scheme Based on Fully Homomorphic Encryption 被引量:1
12
作者 LI Xinyan MOU Huajian LU Dianjun 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2019年第3期218-222,共5页
In order to guarantee the user's privacy and the integrity of data when retrieving ciphertext in an untrusted cloud environment, an improved ciphertext retrieval scheme was proposed based on full homomorphic encry... In order to guarantee the user's privacy and the integrity of data when retrieving ciphertext in an untrusted cloud environment, an improved ciphertext retrieval scheme was proposed based on full homomorphic encryption. This scheme can encrypt two bits one time and improve the efficiency of retrieval. Moreover, it has small key space and reduces the storage space. Meanwhile, the homomorphic property of this scheme was proved in detail. The experimental results and comparisons show that the proposed scheme is characterized by increased security, high efficiency and low cost. 展开更多
关键词 fully homomorphic ENCRYPTION PUBLIC key size the GREATEST common divisor(GCD) problem ciphertext RETRIEVAL
原文传递
Chosen Ciphertext Secure Identity-Based Broadcast Encryption in the Standard Model 被引量:1
13
作者 孙瑾 胡予濮 张乐友 《Journal of Shanghai Jiaotong university(Science)》 EI 2011年第6期672-676,共5页
To give concurrent consideration both the efficiency and the security(intensity of intractable problem) in the standard model,a chosen ciphertext secure identity-based broadcast encryption is proposed.Against the chos... To give concurrent consideration both the efficiency and the security(intensity of intractable problem) in the standard model,a chosen ciphertext secure identity-based broadcast encryption is proposed.Against the chosen ciphertext security model,by using identity(ID) sequence and adding additional information in ciphertext,the self-adaptive chosen identity security(the full security) and the chosen ciphertext security are gained simultaneously.The reduction of scheme's security is the decisional bilinear Diffie-Hellman(BDH) intractable assumption,and the proof of security shows that the proposed scheme is indistinguishable against adaptive chosen ciphertext attacks in the standard model under the decisional BDH intractable assumption.So the security level is improved,and it is suitable for higher security environment. 展开更多
关键词 the standard model provably secure broadcast encryption the chosen ciphertext security the self-adaptive chosen identity security
原文传递
The Cloud Storage Ciphertext Retrieval Scheme Based on ORAM 被引量:1
14
作者 SONG Ningning SUN Yan 《China Communications》 SCIE CSCD 2014年第A02期156-165,共10页
Due to its characteristics distribution and virtualization, cloud storage also brings new security problems. User's data is stored in the cloud, which separated the ownership from management. How to ensure the securi... Due to its characteristics distribution and virtualization, cloud storage also brings new security problems. User's data is stored in the cloud, which separated the ownership from management. How to ensure the security of cloud data, how to increase data availability and how to improve user privacy perception are the key issues of cloud storage research, especially when the cloud service provider is not completely trusted. In this paper, a cloud storage ciphertext retrieval scheme based on AES and homomorphic encryption is presented. This ciphertext retrieval scheme will not only conceal the user retrieval information, but also prevent the cloud from obtaining user access pattern such as read-write mode, and access frequency, thereby ensuring the safety of the ciphertext retrieval and user privacy. The results of simulation analysis show that the performance of this ciphertext retrieval scheme requires less overhead than other schemes on the same security level. 展开更多
关键词 cloud storage ciphertext retrieval scheme ORAM index map
在线阅读 下载PDF
Ciphertext-Policy Attribute-Based Encryption for General Circuits from Bilinear Maps 被引量:2
15
作者 HU Peng GAO Haiying 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2017年第2期171-177,共7页
In this paper, we present the first ciphertext-policy attribute-based encryption (CP-ABE) scheme for polynomial-size general circuits based on bilinear maps which is more suitable for practical use and more efficien... In this paper, we present the first ciphertext-policy attribute-based encryption (CP-ABE) scheme for polynomial-size general circuits based on bilinear maps which is more suitable for practical use and more efficient than multilinear maps. Our scheme uses a top-down secret sharing and FANOUT gate to resist the "backtracking attack" which is the main barrier expending access tree to general circuit. In the standard model, selective security of our scheme is proved. Comparing with current scheme for general circuits from bilinear maps, our work is more efficient. 展开更多
关键词 ciphertext-policy attribute-based encryption general circuits bilinear maps selective security
原文传递
Broadcast group-oriented encryption secure against chosen ciphertext attack
16
作者 Ma Chunbo Ao Jun Li Jianhua 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2007年第4期811-817,共7页
A novel broadcast encryption scheme for group communication scenarios in distributed networks is presented. In the scheme, anyone is allowed to encrypt a message and distribute it to a designated group. Each member in... A novel broadcast encryption scheme for group communication scenarios in distributed networks is presented. In the scheme, anyone is allowed to encrypt a message and distribute it to a designated group. Each member in the designated group has the ability to independently decrypt a ciphertext. In contrast to traditional broadcast encryption, all the valid receivers in the proposed scheme compose the designated group. To take advantage of this property, a tab for the group is set and the matching private key for each member is generated. In addition, before decrypting a ciphertext, anyone in the scheme can verify the ciphertext, to ensure that the ciphertext is correct. This property is very important for large-scale group communication, as the gateway can filter incorrect ciphertext and alleviate the receiver's workload. Finally, a proof in the random oracle model is given, to show that the proposed scheme is secure against the adaptively chosen ciphertext attack. 展开更多
关键词 BROADCAST group-oriented encryption chosen ciphertext attack public verification
在线阅读 下载PDF
A Practical Approach to Attaining Chosen Ciphertext Security
17
作者 LI Jun CUI Guohua YANG Muxiang 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1601-1604,共4页
Strong security in public key cryptography is not enongh; the encryption has to be achieved in an efficient way. OAEP or SAEP is only suitable for special applications (e. g. key transport), and securely transportin... Strong security in public key cryptography is not enongh; the encryption has to be achieved in an efficient way. OAEP or SAEP is only suitable for special applications (e. g. key transport), and securely transporting message of any length is a challenge. Motivated by the hybrid encryption, we present a practical approach to achieve the (adaptively) chosen eiphertext security. The time cost of encryption/decryption of proposed scheme is similar to OAEP and the bandwidth of message recovery is 92% for standard security parameter, while RSA-OAEP is 84%. The scheme is also provably secure against adaptively chosen ciphertext attacks in the random oracle model. We conclude that the approach is practical in more extensive application. 展开更多
关键词 public-key encryption chosen ciphertext security random oracle model bandwidth of message recovery
在线阅读 下载PDF
An Identity-Based Encryption Scheme with Compact Ciphertexts
18
作者 刘胜利 郭宝安 张庆胜 《Journal of Shanghai Jiaotong university(Science)》 EI 2009年第1期86-89,共4页
This paper proposes an identity-based encryption scheme with the help of bilinear pairings, where the identity information of a user functions as the user's public key. The advantage of an identity-based public key s... This paper proposes an identity-based encryption scheme with the help of bilinear pairings, where the identity information of a user functions as the user's public key. The advantage of an identity-based public key system is that it can avoid public key certificates and certificate management. Our identity-based encryption scheme enjoys short ciphertexts and provable security against chosen-ciphertext attack (CCA). 展开更多
关键词 identity-based encryption compact ciphertext ehosen-ciphertext attack (CCA)
原文传递
Chosen-Ciphertext Attack Secure Public-Key Encryption with Keyword Search
19
作者 Hyun Sook Rhee 《Computers, Materials & Continua》 SCIE EI 2022年第10期69-85,共17页
As the use of cloud storage for various services increases,the amount of private personal information along with data stored in the cloud storage is also increasing.To remotely use the data stored on the cloud storage... As the use of cloud storage for various services increases,the amount of private personal information along with data stored in the cloud storage is also increasing.To remotely use the data stored on the cloud storage,the data to be stored needs to be encrypted for this reason.Since“searchable encryption”is enable to search on the encrypted data without any decryption,it is one of convenient solutions for secure data management.A public key encryption with keyword search(for short,PEKS)is one of searchable encryptions.Abdalla et al.firstly defined IND-CCA security for PEKS to enhance it’s security and proposed consistent IND-CCA secure PEKS based on the“robust”ANO-CCA secure identity-based encryption(IBE).In this paper,we propose two generic constructions of consistent IND-CCA secure PEKS combining(1)a hierarchical identity based encryption(for short,HIBE)and a signature scheme or(2)a HIBE,an encapsulation,and a message authentication code(for short,MAC)scheme.Our generic constructions identify that HIBE requires the security of a signature or a MAC as well as the weaker“ANO-CPA security(resp.,IND-CPA security)”of HIBE than“ANOCCA security(resp.,IND-CCA security)”of IBE required in for achieving IND-CCA secure(resp.,consistent)PEKS.Finally,we prove that our generic constructions satisfy IND-CCA security and consistency under the security models. 展开更多
关键词 Searchable encryption public-key encryption with keyword search chosen ciphertext security data privacy
在线阅读 下载PDF
Secured Access Policy in Ciphertext-Policy Attribute-Based Encryption for Cloud Environment
20
作者 P.Prathap Nayudu Krovi Raja Sekhar 《Computer Systems Science & Engineering》 SCIE EI 2023年第7期1079-1092,共14页
The cloud allows clients to store and share data.Depending on the user’s needs,it is imperative to design an effective access control plan to share the information only with approved users.The user loses control of t... The cloud allows clients to store and share data.Depending on the user’s needs,it is imperative to design an effective access control plan to share the information only with approved users.The user loses control of their data when the data is outsourced to the cloud.Therefore,access control mechanisms will become a significant challenging problem.The Ciphertext-Policy Attribute-Based Encryption(CP-ABE)is an essential solution in which the user can control data access.CP-ABE encrypts the data under a limited access policy after the user sets some access policies.The user can decrypt the data if they satisfy the limited access policy.Although CP-ABE is an effective access control program,the privacy of the policy might be compromised by the attackers.Namely,the attackers can gather important information from plain text policy.To address this issue,the SHA-512 algorithm is presented to create a hash code for the user’s attributes in this paper.Depending on the created hash codes,an access policy will be formed.It leads to protecting the access policy against attacks.The effectiveness of the proposed scheme is assessed based on decryption time,private key generation time,ciphertext generation time,and data verification time. 展开更多
关键词 Cloud computing access policy CP-ABE hash code SHA-512 ATTRIBUTE ciphertext encryption DECRYPTION
在线阅读 下载PDF
上一页 1 2 33 下一页 到第
使用帮助 返回顶部