期刊文献+

基于分层身份加密的教务系统信息安全解决方案 被引量:2

The solution for information security of educational administration system based on hierarchical identify-based encryption
下载PDF
导出
摘要 具有层次结构的身份加密(HIBE)机制,是为了解决传统的身份加密(IBE)机制的密钥托管和效率低下问题,在原有机制基础上,通过使用分层密钥服务器来进行身份认证、数据加密、数字签名。针对教务系统中的网络安全问题,将HIBE机制应用到该系统中,提出了基于分层身份加密的教务系统信息安全解决方案,以HIBE为核心,利用表示用户身份的任意字符串为公钥、椭圆曲线困难问题加密和设置分层密钥服务器等方法,来简化用户认证、防止数据泄漏被篡改和提高系统的整体效率。用PBC代码库及C语言实现的分层模型进行实验,结果表明该方案可行有效。 To solve the key escrow and low performance in traditional Identity-Based Encryption(IBE),hierarchical identify-based encryption(HIBE) with hiberarchy use the Private Key Generator to figure-identity,data encryption and digital-underwriting. Aiming at the network security in educational administration, the scheme based on hiberarchy Identity-Based Encryption is adopted in the system,which take the HIBE as core,using the methods such as treating the random character string as general code, elliptic curve difficulty encryption and setting hierarchical encryption server ,etc. , to simplify the consumer-attestation ,prevent data from leaking and improve the system efficiency. PBC eodebase and C program are used to realize the hiberarchy model and the results show that the scheme is available and effective.
作者 梁潘 冯朝胜
出处 《桂林电子科技大学学报》 2010年第3期230-233,共4页 Journal of Guilin University of Electronic Technology
基金 国家自然科学基金(60970113) 四川师范大学重点项目(08KYL03)
关键词 信息安全 基于身份加密 层次结构 教务管理 information security hierarchical identify-based encryption hierarchical structure educational administration system
  • 相关文献

参考文献7

  • 1William Stallings.密码编码学与网络安全[M].4版,北京:电子工业出版社,2007.
  • 2孙飞显,徐明洁,杨进,王铁方,刘孙俊.基于Web的教务管理系统安全方案设计[J].计算机应用,2006,26(5):1198-1201. 被引量:14
  • 3SHAMIR A.Identity based Cryptosystem and Signature Schemes[C] //Proc of the Advance in Crypto'84.New York:IEEE Press,1984:47-53.
  • 4胡亮,初剑峰,林海群,袁巍,赵阔.IBE体系的密钥管理机制[J].计算机学报,2009,32(3):543-551. 被引量:13
  • 5DODIS Y,YUNG M.Exposure-resilience for Free:The Hierarchical ID-based Encryption Case[C] //Proc of the IEEE Security in Storage Workshop.Springer-Verlag:IEEE Press,2002:45-52.
  • 6Boneh D,Franklin M.Identity-based encryption from the Weil pairing[C] //Proc of the Advances in Crypto'2001.Springer-Verlag:IEEE Press,2001:213-229.
  • 7BONEH D,FRANKLINM.Stanford IBE Library[EB/OL].(2002-04-21)http://crypto.stanford.edu/ibe /download/ibe-0.7.2.tgz.

二级参考文献37

  • 1林闯,彭雪海.可信网络研究[J].计算机学报,2005,28(5):751-758. 被引量:252
  • 2冯登国.可证明安全性理论与方法研究[J].软件学报,2005,16(10):1743-1756. 被引量:100
  • 3林闯,雷蕾.下一代互联网体系结构研究[J].计算机学报,2007,30(5):693-711. 被引量:64
  • 4Hankerson Darrel, Menezes Alfred J, Vanstone Scott. Guide to Elliptic Curve Cryptography. Berlin: Springer-verlag Publishers, 2004.
  • 5Enge Andreas. Elliptic Curves and Their Applications to Cryptography. Holland: Kluwer Academic Publishers, 1999.
  • 6William Stallings. Cryptography and Network Security Principles and Practices. 4th edition. USA: Prentice Hall, 2005.
  • 7Paterson K G. ID-based signatures from pairings on elliptic curves. Electronics Letters, 2002, 38(18): 1025-1026.
  • 8Accredited Standards Committee X9. Public key cryptography for the financial services industry. The Elliptic Curve Digital Signature Algorithm (ECDSA). American National Standard xg. 62-2005. November 16, 2005.
  • 9Lowe G. An attack on the needham-schroeder public key authentication protocol. Information Processing Letters, 1995, 56(3) : 131-136.
  • 10Bellare M, Rogaway P. Random oracles are practical: A paradigm for designing efficient protocols//Proceedings of the 1st Conference on Computer and Communications Security. Fairfax, Virginia, United States, 1993:62-73.

共引文献25

同被引文献20

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部