期刊文献+
共找到8篇文章
< 1 >
每页显示 20 50 100
Weighted Attribute Based Conditional Proxy Re-Encryption in the Cloud
1
作者 Xixi Yan Jing Zhang Pengyu Cheng 《Computers, Materials & Continua》 2025年第4期1399-1414,共16页
Conditional proxy re-encryption(CPRE)is an effective cryptographic primitive language that enhances the access control mechanism and makes the delegation of decryption permissions more granular,but most of the attribu... Conditional proxy re-encryption(CPRE)is an effective cryptographic primitive language that enhances the access control mechanism and makes the delegation of decryption permissions more granular,but most of the attribute-based conditional proxy re-encryption(AB-CPRE)schemes proposed so far do not take into account the importance of user attributes.A weighted attribute-based conditional proxy re-encryption(WAB-CPRE)scheme is thus designed to provide more precise decryption rights delegation.By introducing the concept of weight attributes,the quantity of system attributes managed by the server is reduced greatly.At the same time,a weighted tree structure is constructed to simplify the expression of access structure effectively.With conditional proxy re-encryption,large amounts of data and complex computations are outsourced to cloud servers,so the data owner(DO)can revoke the user’s decryption rights directly with minimal costs.The scheme proposed achieves security against chosen plaintext attacks(CPA).Experimental simulation results demonstrated that the decryption time is within 6–9 ms,and it has a significant reduction in communication and computation cost on the user side with better functionality compared to other related schemes,which enables users to access cloud data on devices with limited resources. 展开更多
关键词 Cloud service conditional proxy re-encryption user revocation weighted attribute
在线阅读 下载PDF
A Data Transmission Approach Based on Ant Colony Optimization and Threshold Proxy Re-encryption in WSNs 被引量:2
2
作者 Jing Liu Zenghui Liu +1 位作者 Chenyu Sun Junxi Zhuang 《Journal of Artificial Intelligence and Technology》 2022年第1期23-31,共9页
Wireless sensor networks(WSNs)have become increasingly popular due to the rapid growth of the Internet of Things.As open wireless transmission media are easy to attack,security is one of the primary design concerns fo... Wireless sensor networks(WSNs)have become increasingly popular due to the rapid growth of the Internet of Things.As open wireless transmission media are easy to attack,security is one of the primary design concerns for WSNs.Current solutions consider routing and data encryption as two isolated issues,providing incomplete security.Therefore,in this paper,we divide the WSN communication process into a data path selection phase and a data encryption phase.We propose an improved transmission method based on ant colony optimization(ACO)and threshold proxy re-encryption for WSNs,and we named it as ACOTPRE.The method resists internal and external attacks and ensures safe and efficient data transmission.In the data path selection stage,the ACO algorithm is used for network routing.The improvement of the pheromone concentration is proposed.In order to resist attacks from external attackers,proxy re-encryption is extended to WSN in the data encryption stage.The threshold secret sharing algorithm is introduced to generate a set of re-encryption key fragments composed of random numbers at the source node.We confirm the performance of our model via simulation studies. 展开更多
关键词 wireless sensors network ant colony optimization PHEROMONE proxy re-encryption threshold
在线阅读 下载PDF
基于SM9的条件代理重加密方案及其应用
3
作者 曾淑红 赖俊祚 +2 位作者 吴嘉和 杨潘 翁健 《密码学报(中英文)》 北大核心 2025年第5期1018-1030,共13页
条件代理重加密(conditional proxy re-encryption,CPRE)方案中,当授权者公钥加密的密文满足授权者设置的特定条件时,代理使用重加密密钥将其转换为可用被授权者私钥解密的密文.由于其支持细粒度访问控制的优点,条件代理重加密已广泛应... 条件代理重加密(conditional proxy re-encryption,CPRE)方案中,当授权者公钥加密的密文满足授权者设置的特定条件时,代理使用重加密密钥将其转换为可用被授权者私钥解密的密文.由于其支持细粒度访问控制的优点,条件代理重加密已广泛应用于云存储数据共享、加密电子邮件转发、基于区块链的数据共享等领域.然而,现有的条件代理重加密方案以国外设计为主,不符合网络空间安全自主可控的要求.本文提出了第一个基于国密SM9的条件代理重加密方案,并在随机预言机模型下证明该方案满足IND-CPRE-CPA安全性.同时,为了解决单点故障和代理权限过于集中的问题,本文结合门限技术,构造了基于SM9的门限条件代理重加密方案,提高了方案的可靠性和可扩展性.通过对比分析本文方案和其他相关方案,可以看到本文方案在性能方面有明显优势,且计算量较低.最后本文将门限条件代理重加密方案实例化,设计了一个数据共享系统.该系统可以实现不同加密体系之间的数据共享(跨域数据共享),更加符合现实应用的需要. 展开更多
关键词 条件代理重加密 SM9 门限密码 跨域数据共享
在线阅读 下载PDF
Identity-based threshold proxy re-encryption scheme from lattices and its applications 被引量:3
4
作者 Liqiang WU Yiliang HAN +1 位作者 Xiaoyuan YANG Minqing ZHANG 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2022年第2期258-277,共20页
Threshold proxy re-encryption(TPRE)can prevent collusion between a single proxy and a delegatee from converting arbitrary files against the wishes of the delegator through multiple proxies,and can also provide normal ... Threshold proxy re-encryption(TPRE)can prevent collusion between a single proxy and a delegatee from converting arbitrary files against the wishes of the delegator through multiple proxies,and can also provide normal services even when certain proxy servers are paralyzed or damaged.A non-interactive identity-based TPRE(IB-TPRE)scheme over lattices is proposed which removes the public key certificates.To accomplish this scheme,Shamir’s secret sharing is employed twice,which not only effectively hides the delegator’s private key information,but also decentralizes the proxy power by splitting the re-encryption key.Robustness means that a combiner can detect a misbehaving proxy server that has sent an invalid transformed ciphertext share.This property is achieved by lattice-based fully homomorphic signatures.As a result,the whole scheme is thoroughly capable of resisting quantum attacks even when they are available.The security of the proposed scheme is based on the decisional learning with error hardness assumption in the standard model.Two typical application scenarios,including a file-sharing system based on a blockchain network and a robust key escrow system with threshold cryptography,are presented. 展开更多
关键词 Post-quantum cryptography threshold proxy re-encryption LATTICES ROBUSTNESS DECENTRALIZATION
原文传递
一种改进条件广播代理重加密的数据共享方案 被引量:2
5
作者 翟社平 陆娴婧 +1 位作者 霍媛媛 杨锐 《西安电子科技大学学报》 EI CAS CSCD 北大核心 2024年第2期224-238,共15页
传统的条件广播代理重加密数据共享方式过度依赖不可信第三方代理商,存在效率低、数据安全和隐私泄露等问题。针对以上问题,提出了一种将条件广播代理重加密与区块链共识机制相结合的信息安全保障方案。首先,为解决单个代理商的单点故... 传统的条件广播代理重加密数据共享方式过度依赖不可信第三方代理商,存在效率低、数据安全和隐私泄露等问题。针对以上问题,提出了一种将条件广播代理重加密与区块链共识机制相结合的信息安全保障方案。首先,为解决单个代理商的单点故障以及合谋攻击问题,所提方案使用区块链节点轮流担任代理商节点,同时利用融合信誉机制的委托权益证明共识算法筛选出高信誉度的代理商节点参与重加密过程,大大降低了单点故障和合谋攻击的风险。其次,针对代理商节点对重加密密钥使用的高权限问题,引入门限密钥思想,将重加密密钥分割为多个片段,这些片段分布于不同的代理商节点上。通过这种方式,任何单个代理商节点都无法单独完成数据的解密,从而有效提高了重加密过程的安全性。最后,通过对方案的安全性、正确性和可信度进行分析,表明提出的方案能有效解决传统方案中的安全隐患。仿真实验结果证明,与现有数据共享方案相比,所提方案在保障数据安全方面具有明显优势,同时计算成本较低。 展开更多
关键词 条件广播代理重加密 门限密钥 区块链 共识机制
在线阅读 下载PDF
无双线性对的门限条件匿名代理重加密方案 被引量:3
6
作者 李兆斌 赵洪 魏占祯 《电子与信息学报》 EI CSCD 北大核心 2021年第11期3350-3358,共9页
条件代理重加密(CPRE)可以根据条件对密文进行细粒度的授权,现有的CPRE方案只检查原密文的条件,忽略了重加密密钥的条件符合性,也不对条件信息进行保护,容易造成隐私泄露。该文构造了基于门限的无双线性对条件匿名代理重加密方案(TB-CAP... 条件代理重加密(CPRE)可以根据条件对密文进行细粒度的授权,现有的CPRE方案只检查原密文的条件,忽略了重加密密钥的条件符合性,也不对条件信息进行保护,容易造成隐私泄露。该文构造了基于门限的无双线性对条件匿名代理重加密方案(TB-CAPRE),对密文和重加密密钥的条件同时进行验证,并将敏感的条件信息进行匿名化处理,利用门限将重加密分布到多个代理节点完成,能够抵御合谋攻击。理论分析证明了该方案在随机预言模型下满足适应性选择密文攻击下的不可区分安全性(IND-CCA)。效率和计算量分析表明TBCAPRE在增加安全性和相关功能后并没有引入过大的开销,可以应用到分布式环境中。 展开更多
关键词 条件代理重加密 门限 条件匿名 无双线性对
在线阅读 下载PDF
Server-aided access control for cloud computing 被引量:1
7
作者 WENG Jian WENG Jia-si +1 位作者 LIU Jia-nan HOU Lin 《网络与信息安全学报》 2016年第10期58-76,共19页
With the massive diffusion of cloud computing, more and more sensitive data is being centralized into the cloud for sharing, which brings forth new challenges for the security and privacy of outsourced data. To addres... With the massive diffusion of cloud computing, more and more sensitive data is being centralized into the cloud for sharing, which brings forth new challenges for the security and privacy of outsourced data. To address these challenges, the server-aided access control(SAAC) system was proposed. The SAAC system builds upon a variant of conditional proxy re-encryption(CPRE) named threshold conditional proxy re-encryption(TCPRE). In TCPRE, t out of n proxies can re-encrypt ciphertexts(satisfying some specified conditions) for the delegator(while up to t-1 proxies cannot), and the correctness of the re-encrypted ciphertexts can be publicly verified. Both features guarantee the trust and reliability on the proxies deployed in the SAAC system. The security models for TCPRE were formalized, several TCPRE constructions were proposed and that our final scheme was secure against chosen-ciphertext attacks was proved. 展开更多
关键词 计算机网络 网络管理 应用程序 信息安全
在线阅读 下载PDF
Privacy-preserving pathological data sharing among multiple remote parties
8
作者 Wei Wu Fulong Chen +7 位作者 Pinghai Yuan Taochun Wang Dong Xie Chuanxin Zhao Chao Wang Detao Tang Jingtao Li Ji Zhang 《Blockchain(Research and Applications)》 EI 2024年第3期67-77,共11页
The sharing of pathological data is highly important in various applications,such as remote diagnosis,graded diagnosis,illness treatment,and specialist system development.However,ensuring reliable,secure,privacy-prese... The sharing of pathological data is highly important in various applications,such as remote diagnosis,graded diagnosis,illness treatment,and specialist system development.However,ensuring reliable,secure,privacy-preserving,and efficient sharing of pathological data poses significant challenges.This paper presents a novel solution that leverages blockchain technology to ensure reliability in pathological data sharing.Additionally,it employs conditional proxy re-encryption(C-PRE)and public key encryption with equality test technology to control the scope and preserve the privacy of shared data.To assess the practicality of our solution,we implemented a prototype system using Hyperledger Fabric and conducted evaluations with various metrics.We also compared the solution with relevant schemes.The results demonstrate that the proposed solution effectively meets the requirements for pathological data sharing and is practical in production scenarios. 展开更多
关键词 Digital remote pathology conditional proxy re-encryption Blockchain Data storage Data sharing
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部