期刊文献+

一个适合分布式网络的属性基加密方案 被引量:2

An Attribute-Based Encryption Scheme Suitable for Distributed Network
下载PDF
导出
摘要 阐述了分布式网络中用加密方法保护交换数据的必要性,结合Ganglia网络,提出了一个适合于分布式网络的基于属性的加密方案.与其他方案比较表明,本方案定长的密文、高效的加解密流程以及良好的灵活性等特点在实际部署引用中具有实用价值。 In this paper,the necessity of protecting the data exchanged between nodes was elaborated and a distributed attributed-based encryption scheme was proposed based on Ganglia Network.The advantages of this scheme was also discussed and compared with other existing schemes.Finally,the value of use in practice of this scheme,such as constant ciphertext length,high effiencies in encryption and decryption,and good flexibility was summarized.
作者 张磊 曹珍富
出处 《上海交通大学学报》 EI CAS CSCD 北大核心 2010年第11期1507-1512,共6页 Journal of Shanghai Jiaotong University
基金 国家自然科学基金资助项目(60972034)
关键词 网络安全 密码学 分布式网络 基于属性的加密 network security cryptography distributed network attribute-based encryption
  • 相关文献

参考文献8

  • 1Sahai A, Waters B. Fuzzy identity-based encryption[J]. Lecture Notes in Computer Science, 2005, 3494: 457-473.
  • 2Bethencourt J, Sahai A, Waters B. Ciphertext-policy attribute based eneryption [C]//Proceeding of the 2007 1EEE Symposium on Security and Privacy. Washington DC, USA: IEEE Computer Society, 2007:321- 334.
  • 3Goyal V, Pandey O, Sahai A, et al. Attribute-based encryption for fine grained access control of encrypted data [C]//Proceeding of the 13th ACM Conference on Computer and Communications Security. New York, USA: ACM, 2006:89 -98.
  • 4Emura K, Miyaji A, Nomura A, et al. A ciphertextpolicy attribute-based encryption scheme with constant ciphertext length [J].Lecture Notes in Computer Science, 2009, 5451:13-23.
  • 5Goyal V, Jain A, Pandey O, et al. Bounded ciphertext policy arttribute based encryption [J]. Lecture Notes in Computer Science, 2008, 5126 : 579-591.
  • 6Chase M. Multi-authority attribute based encryption [J]. Lecture Notes in Computer Science, 2007, 4392: 515-534.
  • 7Huang L, Zhenfu C, Xiaohui L, etal. Secure threshold multi-authority attribute based encryption without a eentral authority [J]. Lecture Notes in Computer Science, 2008, 5365: 426-436.
  • 8Sascha M, Stefan K, Claudia E. Distributed Attribute-Based Encryption [J].Lecture Notes in Computer Science, 2009, 5461:20-36.

同被引文献41

  • 1Hur J, Noh D K. Attribute-Based Access Control with Efficient Revocation in Data Outsourcing Systems[J]. IEEE Transactions on Parallel and Distributed Systems, 2011,22(7).
  • 2Yang Ming. An Efficient Attribute based Encryption Scheme with Revocation for Outsoureed Data Sharing Control[C]//2011 International Conference on Instrumentation, Measurement& Computer, Communication and Control. 2011.
  • 3Jia Hong-yong. Efficient and Scalable Multieast Key Manage- ment Using Attribute Based Eneryption[C] // 2010 International Conference on Information Theory and Information Security. 2010.
  • 4Subashini S, Kavitha V. A survey on security issues in service delivery models of cloud computing[J]. Journal of Network and Computer Applications, 2011,34.
  • 5Liu Yu-ehao. A Method for Trust Management in Cloud Com- putingData Coloring by Cloud Watermarking[J]. Intemational Journal of Automation and Computing, 2011,8(3).
  • 6Sakr S, Liu A. A Survey of Large Scale Data Management Ap- proaches in Cloud Enviromnents[J]. IEEE Communications Sur- veys Tutorials,2011,13(3).
  • 7Yu Shu-eheng, Wang Cong. Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing [C]// IEEE INFOCOM. 2010.
  • 8Zissis D, Lekkas D. Addressing cloud computing security issues [J]. Future Generation Computer Systems, 2012,28(3).
  • 9Hay B, Nanee K, Bishop M. Storm Clouds Rising: Security Chal- lenges for IaaS Cloud Computing[C]//'Proceedings of the 44th Hawaii International Conference on System Sciences. 2011.
  • 10Rodero-Merino L. Building safe PaaS elouds;A survey on securi- ty in multitenant software platforms[J]. Computers Security, 2012,31.

引证文献2

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部