期刊文献+

一种基于标识的隐私资源保护方案 被引量:2

Identify based privacy preservation scheme
下载PDF
导出
摘要 隐私资源的保护是多域间互操作以及P2P等技术实施的关键性安全问题。已有的解决方案虽然解决部分问题,但仍然存在着隐私信息泄露的可能,并没有很好地保证隐私资源的机密性,或者会泄露其他的隐私信息。分析了隐私资源保护的安全目标,提出了一种基于标识的保护方案。该方案不仅满足了安全目标,而且一次通信就能完成隐私资源的交换。最后,该方案被证明具有IND-CCA2语义安全性。 Privacy preservation is a vital problem to interoperation among multi-domains. The existing schemes can not resolve those troubles in privacy preservation very well, such as confidentiality, or leaking additional privacy information. The target of security about privacy preservation was analyzed, and then an identify based privacy preservation scheme was proposed. The scheme not only satisfies the security target, but also need only once communication. Finally, the scheme was proved to be of IND-CCA2 semantic security.
出处 《计算机应用》 CSCD 北大核心 2008年第2期418-421,共4页 journal of Computer Applications
基金 国家自然科学基金资助项目(60403027)
关键词 访问控制 基于标识的加密 可证明安全 随机语言机 access control identify-based encryption provable security random oracle
  • 相关文献

参考文献7

  • 1PIRRETTI M,PATRICK T,PATRICK M.Security attribute based systems[C]// Proceedings of the 13th ACM Conference on Computer and Communications Security.NJ:ACM,2006:99-112.
  • 2LI N,DU W,BONEH D.Oblivious signature-based envelope[C]// Proceedings of the 22nd ACM Symposium on Principles of Distributed Computing.NJ:ACM Press,2003:182-189.
  • 3杨秋伟,洪帆,杨木祥,朱贤.基于角色访问控制管理模型的安全性分析[J].软件学报,2006,17(8):1804-1810. 被引量:38
  • 4SANDHU R,COYNE E J,FEINSTEIN H L,et al.Role-based access control models[J].IEEE Computer,1996,29(2):38-47.
  • 5FRIKKEN K,ATALLAH M,LI J.Hidden access control policies with hidden credentials[C]// Proceedings of the 3rd ACM Workshop on Privacy in the Electronic Society.NJ:ACM Press,2004:130-131.
  • 6SHAMIR A.Identity-based cryptography and signature schemes[C]// Advances in Cryptology,CRYPTO84.Berlin:Springer-Verlag,1985:47-53.
  • 7BONEH D,FRANKLIN M.Identity-based encryption from the Weil pairing[C]// Advances in Cryptology,CRYPTO 2001.Berlin:Springer-Verlag,2001:213-229.

二级参考文献10

  • 1Sandhu R,Bhamidipati V,Munawer Q.The ARBAC97 model for role-based administration of roles.ACM Trans.on Information and Systems Security (TISSEC),1999,2(1):105-135.
  • 2Oh S,Sandhu R.A model for role administration using organization structure.In:Sandhu R,Bertino E,eds.Proc.of the 6th ACM Symp.on Access Control Models and Technologies (SACMAT 2002).Monterey:ACM Press,2002.155-162.
  • 3Crampton J,Loizou G.Administrative scope:A foundation for role-based administrative models.ACM Trans.on Information and System Security (TISSEC),2003,6(2):201-231.
  • 4Sandhu R,Coyne EJ,Feinstein HL,Youman CE.Role-Based access control models.IEEE Computer,1996,29(2):38-47.
  • 5Sandhu R.Rationale for the RBAC96 family of access control models.In:Youman C,Sandhu R,Coyne E,eds.Proc.of the 1st ACM Workshop on Role-Based Access Control.New York:ACM Press,1996.38-47.
  • 6Hong F,He XB,Xu ZY.Role-Based access control.Mini-micro system,2000,21(2):198-200 (in Chinese with English abstract).
  • 7Harrison MA,Ruzzo WL,Ullman JD.Protection in operation systems.Communications of the ACM,1976,19(8):461-471.
  • 8Li NH,Tripunitara MV.Security analysis in role-based access control.In:Proc.of the 9th ACM Symp.on Access Control Models and Technologies (SACMAT 2004).2004.126-135.
  • 9Li NH,Winsborough WH,Mitchell JC.Beyond proof-of-compliance:Safety and availability analysis in trust management.In:Proc.of the IEEE Symp.on Security and Privacy.Oakland:IEEE Computer Society Press,2003.123-139.
  • 10Sipser M; Zhang LA,Wang HP,Huang X,Trans.Introduction to the Theory of Computation.Beijing:China Machine Press,2000,107-109.

共引文献37

同被引文献25

  • 1李建欣,怀进鹏,李先贤.自动信任协商研究[J].软件学报,2006,17(1):124-133. 被引量:52
  • 2杨秋伟,洪帆,杨木祥,朱贤.基于角色访问控制管理模型的安全性分析[J].软件学报,2006,17(8):1804-1810. 被引量:38
  • 3廖振松,金海,李赤松,邹德清.自动信任协商及其发展趋势[J].软件学报,2006,17(9):1933-1948. 被引量:52
  • 4Gong L, Qian X. Computational Issues in Secure Interoperatign [J].IEEE Transactions on Software Engineering, 1996,22 (1): 43-52.
  • 5Ajayi O, Sinnott R, Stell A. Trust Realisation in Multi-domain Collaborative Environments[C]//Proceedings of the 6th IEEE/ ACIS International Conference on Computer and Information Science (ICIS'07). Melbourne, Australia, 2007: 906-911.
  • 6Snyder L. Formal Models of Capability-based Protection Systems[J]. IEEE Transactions on Computers, 1981,30(3) : 172-181.
  • 7Winsborough W H, Seamons K E,Jones V E. Automate trust negotiation[C]//DARPA Information Survivability Conf. and Exposition 2000: 88-102.
  • 8Li Ninghui, Winsborough W H, Mitchell J C. Beyond Proof-of- Compliance:Safety and Availability Analysis in Trust Management[C]//Proceedings of IEEE Symposium on Security and Privacy. 2003 : 123-139.
  • 9Irwin K, Yu Ting. Preventing Attribute Information Leakage in Automated Trust Negotiation[C]//Proceedings of the 12th ACM Conference on Computer and Communications Security. 2005 : 36-45.
  • 10Li N,Du W,Boneh D. Oblivious signature-based envelope[C]// Proceedings of the 22nd ACM Symposium on Principles of Distributed Computing (PODC 2003). 2003:182-189.

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部