期刊文献+

多域环境下基于代理重加密的电子文档分发协议 被引量:4

A Distribution Protocol Based on Proxy Re-Encryption in Domain Environment of E-Document Management
原文传递
导出
摘要 针对多域环境下电子文档安全管理,提出一种基于代理重加密机制的电子文档分发协议.该协议中引入代理服务器,由文档拥有者将数据加密后发送给半可信服务端,服务端对数据密文进行安全存储,同时对数据密文重加密后发送给用户.该方案避免了服务端对数据密文解密后进行二次加密,降低了服务端对电子文档管理的复杂度,同时采用密文方式存储,以防止服务器被恶意攻击后敏感数据泄露.与其他协议对比结果表明,新方案显著降低了代理重加密算法的计算复杂度,同时提高了加解密效率,保持了敏感数据机密性. In view of the domain environment in E-documents management,an interoperable cross-domain distribution protocol for E-document is proposed.Based on proxy re-encryption,the scheme uses a semi-trusted entity called proxy server to re-encrypt the document ciphertext without decrypting the ciphertext,such that only users can decrypt the data with his private key.Compared with the existing system,the scheme relieves the server from intense encryption/decryption processing,and achieves reliable decentralized encryption/decryption with good scalability and efficiency.
出处 《北京邮电大学学报》 EI CAS CSCD 北大核心 2012年第5期81-84,共4页 Journal of Beijing University of Posts and Telecommunications
基金 国家重点基础研究发展计划项目(2007CB311203) 国家自然科学基金项目(60803157 90812001)
关键词 代理重加密 域分发 电子文档 re-encryption multi-domain E-documents distribution
  • 相关文献

参考文献9

  • 1Matt B, Gerrit B, Martin S. Divertible protocols and a-tomic proxy cryptography [ C ] //Advances in Cryptology-EUROCRYPT1998 , International Conference on the The-ory and Application of Cryptographic Techniques. Es-poo: LNCS1403, 1998: 127-144.
  • 2Gelareh T, Alvaro A C, Virgil D G. Towards a secureand interoperable DRM architecture [ C ]//Proceedingsof the 6th ACM workshop on Digital Rights Management.New York: ACM Press, 2006: 69-78.
  • 3Do W N, Jung S L, Jeong H K. Interlock system forDRM interoperability of streaming contents [ C ]//Proceedings of IEEE International Symposium onConsumer Electronics 2007 ( ISCE 2007 ). Irving, TX :IEEE Press, 2007: 1-4.
  • 4Sangho L, Heejin P, Jong K. A secure and mutual-profitable DRM interoperability scheme [ C ] //Computersand Communications ( ISCC ). Riccione: [s. n.],2010: 75-80.
  • 5Qiu Qin, Tang Zhi, Yu Yinyan. A decentralizedauthorization scheme for DRM in P2P file-sharing sys-tems [C ] //Consumer Communications and NetworkingConference ( CCNC ) . Las Vegas : IEEE Press, 2011 :136-140.
  • 6Libert B,Vergnaud D. Unidirectional chosen-ciphertextsecure proxy re-encryption [ J ]. IEEE Transactions onInformation Theory, 2011,57(3) :1786-1802.
  • 7Shao Jun, Liu Peng, Zhou Yuan. Achieving key privacywithout losing CCA security in proxy re-encryption [ J].Journal of Systems and Software ,2012 ,85 (3) : 655-665.
  • 8Chen Minrong, Zhang Xi. Comments on Shao-Cao,sunidirectional proxy re-encryption scheme from PKC2009 [ J] . China Communications,2011,8(2) :66-74.
  • 9WENG Jian,CHEN MinRong,ANG YanJiang,DENG Robert,CHEN KeFei,BAO Feng.CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles[J].Science China(Information Sciences),2010,53(3):593-606. 被引量:12

二级参考文献22

  • 1Blaze M, Bleumer G, Strauss M. Divertible protocols and atomic proxy cryptography. In: Nyberg K, ed. Eurocrypt. Lecture Notes in Computer Science, Vol. 1403. Berlin: Springer-Verlag, 1998. 127-144.
  • 2Ateniese G, Fu K, Green M, et al. Improved proxy re-encryption schemes with applications to secure distributed storage. In: proceedings of NDSS'05, The Internet Society. San Diego, California, USA, 2005.
  • 3Ateniese G, Fu K, Green M, et al. Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans Inf Syst Secur, 2006, 9:1-30.
  • 4Canetti R, Hohenberger S. Chosen-ciphertext secure proxy re-encryption. In: Ning P, di Vimercati S D C, Syverson P F, eds. ACM Conference on Computer and Communications Security. New York: ACM, 2007. 185-194.
  • 5Libert B, Vergnaud D. Unidirectional chosen-ciphertext secure proxy re-encryption. In: Cramer R, ed. Public Key Cryptography. Lecture Notes in Computer Science, Vol. 4939. Berlin: Springer-Verlag, 2008. 360-379 (full paper available at http://hal.inria.fr/inria-00339530/en/).
  • 6Canetti R, Krawczyk H, Nielsen J B. Relaxing chosenciphertext security. In: Boneh D, ed. CRYPTO. Lecture Notes in Computer Science, Vol. 2729. Berlin: Springer-Verlag, 2003. 565-582.
  • 7Shao J. Proxy re-cryptography revisited (in Chinese). PhD thesis. Shanghai: Shanghai Jiao Tong University. China Academic Journal Online Publication Integrated Database. 2008.
  • 8Deng R H, Weng J, Liu S, et al. Chosen-ciphertext secure proxy re-encryption without pairings. In: Franklin M K, Hui L C K, Wong D S, eds. CANS. Lecture Notes in Computer Science, Vol. 5339. Berlin: Springer-Verlag, 2008. 1-17.
  • 9Shao J, Cao Z. CCA-secure proxy re-encryption without pairings. In: Jarecki S, Tsudik G, eds. Public Key Cryptography. Lecture Notes in Computer Science, Vol. 5443. Berlin: Springer-Verlag, 2009. 357-376.
  • 10Tang Q. Type-based proxy re-encryption and its construction. In: Chowdhury D R, Rijmen V, Das A, eds. INDOCRYPT. Lecture Notes in Computer Science, Vol. 5365. Berlin: Springer-Verlag, 2008. 130-144.

共引文献11

同被引文献28

  • 1张兴,张晓菲.可信计算:我们研究什么[J].计算机安全,2006(6):5-7. 被引量:2
  • 2Adi Shamir.How to share a secret[J].Communications of the ACM.1979(11)
  • 3Sahai A,Waters B.Fuzzy identity-based encryption. Advances in Cryptology-EUROCRYPT 2005 . 2005
  • 4Shamir A.Identity-based cryptosystems and signature schemes. Proceedings of International Conference on Advances in Cryptology CRYPTO’84 . 1984
  • 5YU S C,WANG C,REN K.Attribute based data sharing with attribute revocation. Proc of the ASIAN ACM Conf on Computer and Communications Security (ASIACCS 2010) . 2010
  • 6MATT B,GERRIT B,MARTIN S.Divertible protocols and atomic proxy cryptography. EUROCRYPT 1998 . 1998
  • 7Gelareh Taban,Alvaro A C′ardenas,Virgil D.Gligor.Towards a Secure and Interoperable DRM Architecture. DRM’’’’’’’’06 . 2006
  • 8Matthew Pirretti,Patrick Traynor,Patrick McDaniel,Brent Waters.??Secure attribute-based systems(J)Journal of Computer Security . 2010 (5)
  • 9Qin Liu,Guojun Wang,Jie Wu.??Time-based proxy re-encryption scheme for secure data sharing in a cloud environment(J)Information Sciences . 2012
  • 10李亚楠,刘连忠,贾燚星.数据交换研究[J].计算机技术与发展,2008,18(2):5-8. 被引量:12

引证文献4

二级引证文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部