期刊文献+

隐藏认证的有条件不经意传输 被引量:1

Hidden authentication conditional oblivious transfer
下载PDF
导出
摘要 在不经意属性证书和隐藏证书的基础上提出了隐藏认证的有条件不经意传输,利用双线性对构造了一个具体方案,解决了不经意属性证书可能暴露接收者的某些敏感信息的问题.该方案有如下特点:只有持有特定属性证书的接收者才能打开与其属性值相对应的消息,而接收者不需要向发送者提供任何证书.发送者不能确定接收者是否能够打开消息也不能确定接受者打开的是哪个消息. Hidden authentication conditional oblivious transfer based on oblivious attribute credentials (OACerts) and hidden credentials is proposed and a scheme based on bilinear pairing for implementing the idea is constructed which solves the problem that OACerts may exposure some sensitive information of the receiver. The scheme proposed has the property that only the receiver who has the required attribute credentials can open the message corresponding to its attribute value and that the receiver need not provide to the sender any credentials. The sender can not decide whether or not the receiver can open the messages and which message he can open.
出处 《西安电子科技大学学报》 EI CAS CSCD 北大核心 2006年第6期849-852,共4页 Journal of Xidian University
基金 国家自然科学基金资助项目(60332030)
关键词 不经意属性证书 双线性对 有条件不经意传输 隐藏证书 oblivious attribute credentials bilinear pairing conditional oblivious transfer hidden credentials
  • 相关文献

参考文献1

二级参考文献1

共引文献3

同被引文献8

  • 1廖振松,金海,李赤松.一种基于隐藏证书的自动信任协商模型[J].计算机科学,2006,33(12):59-61. 被引量:4
  • 2Sandhu R S, Coyne E J, Feinstein H L, etal. You- man. Role-based access control models [J]. IEEE Computer,29(2) : 38--47.
  • 3Holt J E, Bradshaw R, Seamons K E, et al. Hidden crdentials[R]. Proceedings of 2nd ACM Workshop on Privacy in the Electronic Society. Maebashi: ACM Press, 2003:1--8.
  • 4Gura N, Eberle H, Shantz S C. Generic implementa- tions of elliptic curve cryptography using partial reduc- tion[R]. Proceeding of the 9th ACM Conference on Computer and Communications ecurity. Maebashi: ACM Press, 2002:90--177.
  • 5Bradshaw R W, Holt J E, Seamons K E. Concealing complex policies with hidden credentials[R]. Proceed- ings of the 4th ACM Conference on Computer and Communications Security. Seattle: ACM Press, 2004 : 245--253.
  • 6Frikken K, Atallah M, Li Jiangtao. Hidden access control policies with hidden credentials[R]. Proceed- ings of the 3th ACM Workshop on Privacy in the Elec- tronic Society. Maebashi: ACM Press, 2004: 130- 131.
  • 7Bonch D, Franklin M. Identity based encryption from the weil pairing, in: proceedings of crypto2001, ad- vances in cryptology, lecture notes in computer science [J]. Vol 2139,Springer-Verlag, 2001:213--229.
  • 8朱一群,李建华,张全海.面向多策略服务的一种基于属性角色访问控制模型[J].计算机应用与软件,2008,25(11):143-145. 被引量:4

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部