期刊文献+
共找到198篇文章
< 1 2 10 >
每页显示 20 50 100
Multi-authority proxy re-encryption based on CPABE for cloud storage systems 被引量:7
1
作者 Xiaolong Xu Jinglan Zhou +1 位作者 Xinheng Wang Yun Zhang 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2016年第1期211-223,共13页
The dissociation between data management and data ownership makes it difficult to protect data security and privacy in cloud storage systems.Traditional encryption technologies are not suitable for data protection in ... The dissociation between data management and data ownership makes it difficult to protect data security and privacy in cloud storage systems.Traditional encryption technologies are not suitable for data protection in cloud storage systems.A novel multi-authority proxy re-encryption mechanism based on ciphertext-policy attribute-based encryption(MPRE-CPABE) is proposed for cloud storage systems.MPRE-CPABE requires data owner to split each file into two blocks,one big block and one small block.The small block is used to encrypt the big one as the private key,and then the encrypted big block will be uploaded to the cloud storage system.Even if the uploaded big block of file is stolen,illegal users cannot get the complete information of the file easily.Ciphertext-policy attribute-based encryption(CPABE)is always criticized for its heavy overload and insecure issues when distributing keys or revoking user's access right.MPRE-CPABE applies CPABE to the multi-authority cloud storage system,and solves the above issues.The weighted access structure(WAS) is proposed to support a variety of fine-grained threshold access control policy in multi-authority environments,and reduce the computational cost of key distribution.Meanwhile,MPRE-CPABE uses proxy re-encryption to reduce the computational cost of access revocation.Experiments are implemented on platforms of Ubuntu and CloudSim.Experimental results show that MPRE-CPABE can greatly reduce the computational cost of the generation of key components and the revocation of user's access right.MPRE-CPABE is also proved secure under the security model of decisional bilinear Diffie-Hellman(DBDH). 展开更多
关键词 cloud storage data partition multi-authority security proxy re-encryption attribute-based encryption(ABE).
在线阅读 下载PDF
Efficient Multi-Authority Attribute-Based Searchable Encryption Scheme with Blockchain Assistance for Cloud-Edge Coordination
2
作者 Peng Liu Qian He +2 位作者 Baokang Zhao Biao Guo Zhongyi Zhai 《Computers, Materials & Continua》 SCIE EI 2023年第9期3325-3343,共19页
Cloud storage and edge computing are utilized to address the storage and computational challenges arising from the exponential data growth in IoT.However,data privacy is potentially risky when data is outsourced to cl... Cloud storage and edge computing are utilized to address the storage and computational challenges arising from the exponential data growth in IoT.However,data privacy is potentially risky when data is outsourced to cloud servers or edge services.While data encryption ensures data confidentiality,it can impede data sharing and retrieval.Attribute-based searchable encryption(ABSE)is proposed as an effective technique for enhancing data security and privacy.Nevertheless,ABSE has its limitations,such as single attribute authorization failure,privacy leakage during the search process,and high decryption overhead.This paper presents a novel approach called the blockchain-assisted efficientmulti-authority attribute-based searchable encryption scheme(BEM-ABSE)for cloudedge collaboration scenarios to address these issues.BEM-ABSE leverages a consortium blockchain to replace the central authentication center for global public parameter management.It incorporates smart contracts to facilitate reliable and fair ciphertext keyword search and decryption result verification.To minimize the computing burden on resource-constrained devices,BEM-ABSE adopts an online/offline hybrid mechanism during the encryption process and a verifiable edge-assisted decryption mechanism.This ensures both low computation cost and reliable ciphertext.Security analysis conducted under the random oracle model demonstrates that BEM-ABSE is resistant to indistinguishable chosen keyword attacks(IND-CKA)and indistinguishable chosen plaintext attacks(INDCPA).Theoretical analysis and simulation results confirm that BEM-ABSE significantly improves computational efficiency compared to existing solutions. 展开更多
关键词 Attribute-based encryption search encryption blockchain multi-authority cloud-edge
在线阅读 下载PDF
Dynamic Broadcast Encryption Scheme with Revoking User 被引量:2
3
作者 ZOU Xiubin XIANG Jinhai 《Wuhan University Journal of Natural Sciences》 CAS 2013年第6期499-503,共5页
Currently, there still lacks an efficient methodology to revoke user's ability to decrypt ciphertext in broadcast encryption with the uncertain number of ciphertext recipients. To solve this problem, here, we present... Currently, there still lacks an efficient methodology to revoke user's ability to decrypt ciphertext in broadcast encryption with the uncertain number of ciphertext recipients. To solve this problem, here, we present a dynamic broadcast encryption scheme with the following properties: First, the length of the ciphertext has a linear relationship with the number of revocable users, but it has no association with the total number of ciphertext recipients. Sec- ond, the scheme also works when users dynamically join. Espe- cially, compared with methods published up to date, our scheme is more efficient with a large number of ciphertext recipients. Third, the broadcaster can revoke user's ability to decrypt ciphertext if necessary. Fourth, the private key of users is composed of three elements in Elliptic curve group of prime order. Last, if q-Deci- sional Multi-Exponent Bilinear Diffie-Hellman assumption holds, our scheme is secure in the standard model when a polynomial time adversary selectively attacks it. 展开更多
关键词 dynamic broadcast encryption revoking user bilin-ear map public key encryption
原文传递
Encryption with User Authentication Model for Internet of Medical Things Environment
4
作者 K.S.Riya R.Surendran +1 位作者 Carlos Andrés Tavera Romero M.Sadish Sendil 《Intelligent Automation & Soft Computing》 SCIE 2023年第1期507-520,共14页
Internet of Medical Things(IoMT)enabled e-healthcare has the potential to greately improve conventional healthcare services significantly.However,security and privacy become major issues of IoMT because of the restric... Internet of Medical Things(IoMT)enabled e-healthcare has the potential to greately improve conventional healthcare services significantly.However,security and privacy become major issues of IoMT because of the restricted processing abilities,storage,and energy constraints of the sensors.Therefore,it leads to infeasibility of developing traditional cryptographic solutions to the IoMT sensors.In order to ensure security on sensitive medical data,effective encryption and authentication techniques need to be designed to assure security of the patients and healthcare service providers.In this view,this study designs an effective metaheuristic optimization based encryption with user authentication(EMOE-UA)technique for IoMT environment.This work proposes an EMOE-UA technique aims to accomplish mutual authentication for addressing the security issues and reducing the computational complexity.Moreover,the EMOE-UA technique employs optimal multikey homomorphic encryption(OMKHE)technique to encrypt the IoMT data.Furthermore,the improved social spider optimization algorithm(ISSOA)was employed for the optimal multikey generation of the MKHE technique.The experimental result analysis of the EMOE-UA technique takes place using benchmark data and the results are examined under various aspects.The simulation results reported the considerably better performance of the EMOE-UA technique over the existing techniques. 展开更多
关键词 user authentication SECURITY PRIVACY internet of medical things homomorphic encryption optimal key generation
在线阅读 下载PDF
Optical encryption scheme based on ghost imaging with disordered speckles 被引量:4
5
作者 张玉东 赵生妹 《Chinese Physics B》 SCIE EI CAS CSCD 2017年第5期160-164,共5页
An optical encryption scheme based on a ghost imaging system with disordered speckles is proposed to obtain a higher security with a small key. In the scheme, Alice produces the random speckle patterns and obtains the... An optical encryption scheme based on a ghost imaging system with disordered speckles is proposed to obtain a higher security with a small key. In the scheme, Alice produces the random speckle patterns and obtains the detection results with the help of a computational ghost imaging(CGI) system. Then Alice permutes the order of the random speckle patterns and shares the permutation sequence as a secure key to the authorized users. With the secure key, Bob could recover the object with the principle of the CGI system, whereas, the unauthorized users could not obtain any information of the object. The numerical simulations and experimental results show that the proposed scheme is feasible with a small key, simultaneously,it has a higher security. When the eavesdropping ratio(ER) is less than 40%, the eavesdropper cannot acquire any useful information. Meanwhile, the authorized users could recover completely with the secure key. 展开更多
关键词 ghost encryption secure speckle recover authorized disordered users reconstructed PSNR
原文传递
3-Multi ranked encryption with enhanced security in cloud computing 被引量:1
6
作者 YeEun Kim Junggab Son +2 位作者 Reza M.Parizi Gautam Srivastava Heekuck Oh 《Digital Communications and Networks》 SCIE CSCD 2023年第2期313-326,共14页
Searchable Encryption(SE)enables data owners to search remotely stored ciphertexts selectively.A practical model that is closest to real life should be able to handle search queries with multiple keywords and multiple... Searchable Encryption(SE)enables data owners to search remotely stored ciphertexts selectively.A practical model that is closest to real life should be able to handle search queries with multiple keywords and multiple data owners/users,and even return the top-k most relevant search results when requested.We refer to a model that satisfies all of the conditions a 3-multi ranked search model.However,SE schemes that have been proposed to date use fully trusted trapdoor generation centers,and several methods assume a secure connection between the data users and a trapdoor generation center.That is,they assume the trapdoor generation center is the only entity that can learn the information regarding queried keywords,but it will never attempt to use it in any other manner than that requested,which is impractical in real life.In this study,to enhance the security,we propose a new 3-multi ranked SE scheme that satisfies all conditions without these security assumptions.The proposed scheme uses randomized keywords to protect the interested keywords of users from both outside adversaries and the honest-but-curious trapdoor generation center,thereby preventing attackers from determining whether two different queries include the same keyword.Moreover,we develop a method for managing multiple encrypted keywords from every data owner,each encrypted with a different key.Our evaluation demonstrates that,despite the trade-off overhead that results from the weaker security assumption,the proposed scheme achieves reasonable performance compared to extant schemes,which implies that our scheme is practical and closest to real life. 展开更多
关键词 Searchable encryption Multi-keyword search Multiple data owners/users Ranked search Enhanced security
在线阅读 下载PDF
BDAE: A Blockchain-Based and Decentralized Attribute-Based Encryption Scheme for Secure Data Sharing
7
作者 YANG Shuangxi 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2024年第3期228-238,共11页
Ciphertext-policy attribute-based encryption(CP-ABE) is widely employed for secure data sharing and access control. However, its dependence on a single authority introduces security and performance challenges. Despite... Ciphertext-policy attribute-based encryption(CP-ABE) is widely employed for secure data sharing and access control. However, its dependence on a single authority introduces security and performance challenges. Despite the existence of multi-authority CPABE approaches, persistent issues such as single points of failure and high computation cost on the user side remain. This study proposes a novel solution named blockchain-based and decentralized attribute-based encryption(BDAE) for data sharing. BDAE enhances traditional scheme by integrating blockchain and distributed key generation technology. The scheme employs an(n, t) threshold secret sharing algorithm, coupled with the Pedersen verifiable secret sharing method, for attribute key generation. This combination ensures key credibility,facilitates joint attribute management, and addresses single bottleneck and key verification issues. Integrated into a blockchain system, the scheme utilizes smart contracts for fine-grained access control and outsourced computing. Blockchain's decentralization and access logs make data sharing tamper-resistant and auditable. Moreover, simulation comparisons demonstrate that the scheme effectively reduces decryption overhead on the user side, meeting practical application requirements. 展开更多
关键词 blockchain attribute-based encryption multi-authority verifiable secret sharing access control
原文传递
Novel dynamic anti-collusion ciphertext policy attribute-based encryption scheme in 5G D2D environment
8
作者 Xu Xiangjie Jiang Rui 《Journal of Southeast University(English Edition)》 EI CAS 2021年第3期251-257,共7页
To share data securely with secure attribute revocation,anti-collusion,and dynamic user management in the 5G device-to-device(D2D)environment,a novel dynamic anti-collusion ciphertext policy attribute-based encryption... To share data securely with secure attribute revocation,anti-collusion,and dynamic user management in the 5G device-to-device(D2D)environment,a novel dynamic anti-collusion ciphertext policy attribute-based encryption(NDA-CP-ABE)scheme in the 5G D2D environment is proposed.On the basis of the ciphertext policy attribute-based encryption algorithm,fine-grained access control and secure attribute revocation are realized,and the confidentiality of data is guaranteed.A polynomial function is adopted in the ciphertext generation phase to realize dynamic user management.A random number is used to prevent a collusion attack among the legitimate user equipment(UE),revoked UE,and external network attackers.Finally,on the basis of the Diffie-Hellman problem,the NDA-CP-ABE scheme is formally proved,and the simulation performances are compared with those of similar schemes.The results show that data can be securely shared through a D2D channel with secure attribute revocation,anti-collusion,and dynamic user management.Moreover,compared with similar schemes,the NDA-CP-ABE scheme has higher efficiency in encryption,decryption,and storage. 展开更多
关键词 device-to-device(D2D) attribute revocation user management dynamic anti-collusion ciphertext policy attribute-based encryption(NDA-CP-ABE) access control
在线阅读 下载PDF
同态加密下用户隐私数据传输的安全保护方法 被引量:4
9
作者 付爱英 熊宇峰 曾勍炜 《吉林大学学报(理学版)》 北大核心 2025年第2期573-579,共7页
为满足用户隐私数据传输的安全性需求,提出一种同态加密下用户隐私数据传输安全保护方法.首先,通过特征空间重组技术进行数据重构,利用语义相关性融合方法在捕获用户隐私数据特征的同时进行自适应调度,并对捕获的特征量进行模糊聚类,确... 为满足用户隐私数据传输的安全性需求,提出一种同态加密下用户隐私数据传输安全保护方法.首先,通过特征空间重组技术进行数据重构,利用语义相关性融合方法在捕获用户隐私数据特征的同时进行自适应调度,并对捕获的特征量进行模糊聚类,确定用户隐私数据属性;其次,结合用户隐私数据属性,采用同态加密算法和深度学习相结合的方法对用户隐私数据进行点对点加密传输,最终实现用户隐私数据传输安全保护.仿真实验结果表明,该方法的数据加密效果较好,通信开销较低,可以更好地确保用户隐私数据传输的安全性和可靠性. 展开更多
关键词 同态加密 用户隐私数据 传输安全保护 特征空间重组
在线阅读 下载PDF
Blockchain Access Control Scheme Based on Multi-authority Attribute-Based Encryption
10
作者 Yang Li Baoyue Qi +2 位作者 Mengmeng Wang Jianming Zhu Xiuli Wang 《国际计算机前沿大会会议论文集》 2022年第2期105-124,共20页
Blockchain has been widely used in many fields because it can solve the problem of information asymmetry and enable users who do not trust each other to collaborate without the participation of third-party intermediar... Blockchain has been widely used in many fields because it can solve the problem of information asymmetry and enable users who do not trust each other to collaborate without the participation of third-party intermediaries.Existing blockchain access control schemes usually use attribute-based encryption,but most of them adopt traditional single-attribute authority for attribute authorization,which has the problem that the authority is overburdened and must be fully credible.This paper proposes a blockchain access control scheme based on multiauthority attribute-based encryption by improving the existing blockchain privacy protection method.Autonomous identity management is performed through the blockchain to complete the initialization of user identity and the issuance of attribute certificates.Attribute authorities are selected using the reputation proof consensusmechanism.The distributed key generation protocol is used to generate keys,and the linear secret sharing scheme is improved.The hierarchical relationship of the access structure is used to encrypt and access control the private data that need to be uploaded to the blockchain.According to the comparison with other blockchain access control schemes,the scheme proposed in this paper has been improved in terms of security and efficiency. 展开更多
关键词 Access control Blockchain Attribute-based encryption multi-authority
原文传递
Enable Excel-Based Basic Cybersecurity Features for End Users by Using Python-Excel Integration
11
作者 Mohamed Breik Osama Magdy +2 位作者 Essam Amin Tarek Aly Mervat Gheith 《Journal of Software Engineering and Applications》 2024年第6期522-529,共8页
In the digital age, the global character of the Internet has significantly improved our daily lives by providing access to large amounts of knowledge and allowing for seamless connections. However, this enormously int... In the digital age, the global character of the Internet has significantly improved our daily lives by providing access to large amounts of knowledge and allowing for seamless connections. However, this enormously interconnected world is not without its risks. Malicious URLs are a powerful menace, masquerading as legitimate links while holding the intent to hack computer systems or steal sensitive personal information. As the sophistication and frequency of cyberattacks increase, identifying bad URLs has emerged as a critical aspect of cybersecurity. This study presents a new approach that enables the average end-user to check URL safety using Microsoft Excel. Using the powerful VirusTotal API for URL inspections, this study creates an Excel add-in that integrates Python and Excel to deliver a seamless, user-friendly interface. Furthermore, the study improves Excel’s capabilities by allowing users to encrypt and decrypt text communications directly in the spreadsheet. Users may easily encrypt their conversations by simply typing a key and the required text into predefined cells, enhancing their personal cybersecurity with a layer of cryptographic secrecy. This strategy democratizes access to advanced cybersecurity solutions, making attentive digital integrity a feature rather than a daunting burden. 展开更多
关键词 Python End-user Approach EXCEL Excel Add-In CYBERSECURITY URL Check API Virustotal API encryption Decryption Vigenère Cipher Python-Excel Integration
在线阅读 下载PDF
一种具有多级安全目标的动态对称可搜索加密方案 被引量:1
12
作者 李功丽 李露 +1 位作者 黄昱晨 陈晓迪 《计算机应用研究》 北大核心 2025年第7期2168-2175,共8页
可搜索加密是将数据文件加密后存储到云端,然后对密文进行检索的一种技术。动态可搜索加密允许对云端的文件进行动态更新,然而现有动态可搜索加密方案都着重解决前向和后向安全问题且大多仅支持单用户搜索,无法同时保护搜索模式和访问... 可搜索加密是将数据文件加密后存储到云端,然后对密文进行检索的一种技术。动态可搜索加密允许对云端的文件进行动态更新,然而现有动态可搜索加密方案都着重解决前向和后向安全问题且大多仅支持单用户搜索,无法同时保护搜索模式和访问模式。针对上述问题,基于不经意键值对存储技术,设计了一种满足前向安全、隐藏搜索模式和访问模式、具有三级安全目标的动态对称可搜索加密方案TS-MDSSE。并在此基础上,进一步在更新算法中利用随机值替换技术,满足了后向安全,实现了具有四级安全目标的FS-MDSSE方案。安全分析与实验表明,所提方案不仅满足多等级安全目标,而且支持多用户查询,完成一次搜索仅需0.022 ms。 展开更多
关键词 动态对称可搜索加密 多用户 搜索模式隐藏 访问模式隐藏 前后向安全 多级安全目标
在线阅读 下载PDF
格上具有多功能的属性基加密
13
作者 郭丽峰 杨杰莹 +1 位作者 马添军 张夏蕾 《计算机科学》 北大核心 2025年第10期412-422,共11页
格上属性基加密具有抗量子攻击的特性,并且将访问控制策略嵌入密文或者密钥,可实现属性的细粒度访问控制。但是由于属性基加密固有的弱点,相同属性的用户可能会泄露密钥。为避免密钥泄露,属性基加密方案需实现追踪并撤销特定用户解密权... 格上属性基加密具有抗量子攻击的特性,并且将访问控制策略嵌入密文或者密钥,可实现属性的细粒度访问控制。但是由于属性基加密固有的弱点,相同属性的用户可能会泄露密钥。为避免密钥泄露,属性基加密方案需实现追踪并撤销特定用户解密权限的功能。然而,非法用户仍可能通过收集大量密文数据,试图恢复过去会话的密钥。为有效抵御这种攻击,方案必须实现前向安全。针对当前格密码领域的需求与挑战,提出基于判定性误差学习问题(Decisional Learning with Error,DLWE)可证明安全的格上具有多功能的属性基加密(Multi-functional Attribute based Encryption from Lattices)方案。使用完全二叉树追踪解密密钥中与用户相关的身份矩阵(即完全二叉树叶子节点的值),以便追踪恶意用户;引入用户撤销机制,允许属性权威在不重新为用户生成密钥的情况下,及时且有效地撤销用户的权限;采用标签穿刺的方法,确保即使当前密钥泄漏,过去密文仍然保持安全,实现前向安全。此外,由于格上采样算法的不确定性,目前格上的属性基加密实验难以实现,因此通过理论分析验证所提方案的安全性和正确性。该方案不仅优化了空间存储效率,还弥补了格密码中属性基加密方案功能单一导致的不足。 展开更多
关键词 格密码 属性基加密 可追踪 前向安全 用户撤销
在线阅读 下载PDF
基于云环境可撤销用户属性的外包解密方案
14
作者 胡声洲 王幸福 +1 位作者 钟婷婷 李文浩 《计算机应用与软件》 北大核心 2025年第6期380-386,共7页
为解决云环境数据资源共享中用户缺乏灵活管理及解密计算开销大的问题,提出一种基于云环境可撤销用户属性的外包解密方案。方案公共参数由固定数量的群元素构成,对用于加密的属性集没有限制。用户撤销可以在每个属性级别而不是在系统级... 为解决云环境数据资源共享中用户缺乏灵活管理及解密计算开销大的问题,提出一种基于云环境可撤销用户属性的外包解密方案。方案公共参数由固定数量的群元素构成,对用于加密的属性集没有限制。用户撤销可以在每个属性级别而不是在系统级别执行,实现更细粒度的用户访问控制。并且不会在判断用户是否被撤销及外包解密时泄露用户信息。该方案在合数阶群的复杂性假设下被证明是安全的。通过对类似方案的性能作对比分析,结果表明在云环境中用户管理的场景下该方案是更高效的、更灵活的。 展开更多
关键词 撤销用户属性 属性加密 外包解密 LSSS
在线阅读 下载PDF
基于改进Blowfish的用户隐私信息存储加密方法
15
作者 刘忠铁 《电子设计工程》 2025年第4期6-9,16,共5页
在用户信息的管理中,由于涉及大量敏感和隐私数据,未经授权的访问将严重威胁用户数据的安全。为此,提出基于改进Blowfish算法的用户隐私信息存储与加密方法。遵循Blowfish算法的改进和优化原则,深入挖掘用户数据中的隐私信息,并设计相... 在用户信息的管理中,由于涉及大量敏感和隐私数据,未经授权的访问将严重威胁用户数据的安全。为此,提出基于改进Blowfish算法的用户隐私信息存储与加密方法。遵循Blowfish算法的改进和优化原则,深入挖掘用户数据中的隐私信息,并设计相应的隐私信息密钥模板。利用这一密钥模板,规划隐私信息的加密策略,构建隐私信息存储机制,确保用户数据的访问和操作受到严格限制。实验结果表明,该方法实现了对特定隐私信息的精细化控制,确保只有授权的数据主机能够访问这些信息,从而有效防止了未授权访问的风险。 展开更多
关键词 改进Blowfish算法 用户隐私信息 存储加密 密钥模板 数据授权
在线阅读 下载PDF
基于区块链的动态多用户可搜索加密方案 被引量:1
16
作者 刘欢 邓伦治 李滨瀚 《计算机应用研究》 北大核心 2025年第3期693-699,共7页
单用户可搜索加密方案无法满足多用户环境下的数据分享需求,且存在密钥泄露风险。为此,利用(t,N)秘密共享结构和区块链技术构造了一个基于身份的多用户可搜索加密方案。该方案解决了多用户环境下的数据分享和机密性问题,实现了用户的动... 单用户可搜索加密方案无法满足多用户环境下的数据分享需求,且存在密钥泄露风险。为此,利用(t,N)秘密共享结构和区块链技术构造了一个基于身份的多用户可搜索加密方案。该方案解决了多用户环境下的数据分享和机密性问题,实现了用户的动态更新功能,防止了密钥泄露,并在标准模型下被证明能够抵御关键字猜测攻击。与五个现存的相关方案相比较,该方案在计算成本上表现出效率优势,适用于云储存环境下的数据分享。 展开更多
关键词 区块链 可搜索加密 基于身份加密 多用户 用户的动态更新 标准模型
在线阅读 下载PDF
格上高效且可撤销的密文策略属性基加密方案 被引量:1
17
作者 姜美羡 高军涛 裴焘 《系统工程与电子技术》 北大核心 2025年第4期1364-1373,共10页
针对格上属性基加密方案中存在的运算效率低、访问策略表达能力不够灵活、不具备撤销功能的问题,提出一种格上高效表达且可撤销的密文策略属性基加密方案。在环上带误差学习困难问题下,采用小策略矩阵和更高基数的采样算法降低了方案的... 针对格上属性基加密方案中存在的运算效率低、访问策略表达能力不够灵活、不具备撤销功能的问题,提出一种格上高效表达且可撤销的密文策略属性基加密方案。在环上带误差学习困难问题下,采用小策略矩阵和更高基数的采样算法降低了方案的累计误差,提升了运算效率。将线性秘密共享技术和环上带误差学习困难问题结合,实现了访问策略的高效灵活表达;此外,在该访问策略下加入直接撤销,使方案在具有高效表达性的同时,也具备了用户撤销功能。所提方案在环上带误差学习困难问题下可以抵抗选择性明文攻击。实验仿真比较结果表明了所提方案的有效性和实用性。 展开更多
关键词 属性基加密 线性秘密共享 用户撤销 环上带误差学习 小策略矩阵
在线阅读 下载PDF
基于物联网的5G电力业务用户身份加密认证系统
18
作者 曹扬 苏扬 +2 位作者 陶文伟 张富川 张国翊 《太赫兹科学与电子信息学报》 2025年第4期423-428,共6页
针对传统加密认证系统认证效果差的问题,提出并设计一种基于物联网(IoT)的5G电力业务用户身份加密认证系统。硬件上,设计了加密芯片、通信器和身份识别器;软件上,利用物联网的信息传输模型,对电力业务用户的身份信息进行录入,保证身份... 针对传统加密认证系统认证效果差的问题,提出并设计一种基于物联网(IoT)的5G电力业务用户身份加密认证系统。硬件上,设计了加密芯片、通信器和身份识别器;软件上,利用物联网的信息传输模型,对电力业务用户的身份信息进行录入,保证身份信息的完整性;通过密码杂凑函数,计算不同数据信息的杂凑值,实现对用户身份信息的加密处理;通过终端设备生成的认证码,完成对用户身份加密的认证。通过上述软硬件的设计,完成5G电力业务用户身份加密认证系统的设计。在仿真实验中,与以往的5G电力业务用户身份加密认证系统相比,设计的基于物联网的5G电力业务用户身份加密认证系统内存泄露平均值为32 MB,认证效果更好,具有更大的应用价值。 展开更多
关键词 物联网 5G电力业务 用户身份加密 加密认证系统
在线阅读 下载PDF
基于区块链的众包平台访问控制方案
19
作者 程哲凡 王峥 周雄 《计算机工程与设计》 北大核心 2025年第9期2554-2561,共8页
针对众包平台中存在的隐私泄露和平台欺诈等问题,提出基于区块链的众包访问控制方案。将区块链技术与属性基加密算法相结合,基于IPFS(inter planetary file system)对数据进行安全可靠的分布式存储,同时缓解区块链的存储负担;设计了一... 针对众包平台中存在的隐私泄露和平台欺诈等问题,提出基于区块链的众包访问控制方案。将区块链技术与属性基加密算法相结合,基于IPFS(inter planetary file system)对数据进行安全可靠的分布式存储,同时缓解区块链的存储负担;设计了一种基于区块链的可验证、可追溯访问控制方案,编写智能合约算法对密钥进行验证和分发,利用牛顿插值定理的数学特性实现恶意用户追溯。安全性分析和实验结果表明,方案实现了抵抗选择明文攻击、抗共谋攻击和恶意用户追踪等目标,且将重构多项式的时间开销降低至O(n)。 展开更多
关键词 众包平台 属性加密 区块链 星际文件系统 可验证 恶意用户追踪 多授权
在线阅读 下载PDF
基于加密技术的用户管理信息化安全体系构建研究 被引量:2
20
作者 孙丹凤 《中国高新科技》 2025年第2期23-24,27,共3页
信息技术的快速发展,用户管理信息化已成为安全管理的重要环节。但所存在的信息安全问题也显得尤为关键,尤其是用户数据模式和管理体系需要规范。文章旨在探究如何构建基于加密技术的用户管理信息化安全体系,进而确定用户信息安全性与... 信息技术的快速发展,用户管理信息化已成为安全管理的重要环节。但所存在的信息安全问题也显得尤为关键,尤其是用户数据模式和管理体系需要规范。文章旨在探究如何构建基于加密技术的用户管理信息化安全体系,进而确定用户信息安全性与完整性。基于此,分析目前用户管理信息化所面临的安全问题,提出综合性的加密处理技术解决方案,并对具体的实施策略和处理效果进行针对性的评估,期望能够为同领域技术人员提供理论支持。 展开更多
关键词 用户管理 信息化安全 加密技术 数据保护 安全体系
暂未订购
上一页 1 2 10 下一页 到第
使用帮助 返回顶部