期刊文献+

基于密文的代理安全两方计算协议

Ciphertext-Based Proxy Secure Two-Party Computation Protocol
原文传递
导出
摘要 提出了在共享数据平台下基于密文的代理安全两方计算协议(ciphertext-based proxy secure two-par-ty computation protocol,CPSTCP),给出该协议的定义、形式化模型.与传统的基于安全计算外包(secure computa-tion outsourcing,SCO)的安全协议相比,本文提出的协议因为不需要秘密共享而拥有更高的安全性和效率.在此基础上,利用基于属性的访问控制策略和已有的安全两方集合交协议,基于格中的困难问题,构造了一个半诚实模型下可证安全的基于密文的代理两方集合交协议. A ciphertext-based proxy secure two-party computation protocol (CPSTCP) which can be used in shared storage platform is proposed. We presented its conception and define its formal model. Campared with secure protocol based on secure computation outsourcing (SCO), CPSTCP is more secure and efficient because it need not share secret. Using attribute-based access control and secure two-party set intersection computation protocol which has been constructed, we construct a ciphertext-based proxy secure two-party set intersection computation protocol which is secure in the semi-honest model.
出处 《武汉大学学报(理学版)》 CAS CSCD 北大核心 2012年第6期477-482,共6页 Journal of Wuhan University:Natural Science Edition
基金 国家自然科学基金资助项目(61173164 60973134) 广东省自然科学基金(10351806001000000)
关键词 安全多方计算协议 代理 密文 secure multi-party computation proxy ciphertext lattice
  • 相关文献

参考文献15

  • 1Yao A C. Protocols for secure computations[C]//The 23rd IEEE Symposium on Foundations of Computer Science. Washington, D C: IEEE Computer Society, 1982:160-164.
  • 2Dean J,Ghemawat S. MapReduce:A flexible data processing tool[J]. Communications of the ACM , 2010, 53(1) :72-77.
  • 3Armbrust M, Fox A, Griffith R, et al. A view of cloud computing[J]. Communications of the ACM, 2010,53(4) : 50-58.
  • 4冯登国,张敏,张妍,徐震.云计算安全研究[J].软件学报,2011,22(1):71-83. 被引量:1066
  • 5Mambo M, Usuda K, Okamoto E. Proxy signatures for delegating signing operation[C]//Proc 3rd ACM Conference on Computer and Communications Security. New York:ACM,1996:48-57.
  • 6Dijk M, Clarke D, Gassend B. Speeding up exponentiation using an untrusted computational resource[J]. Designs, Codes and Cryptography, 2006,39 ( 2 ) : 253- 273.
  • 7Bonatti P, Samarati P. A uniform framework for regulating service access and information release on the web [J]. Journal of Computer Security, 2002,10(3) :241- 247.
  • 8夏峰,杨波,张明武,马莎,雷涛.基于LWE的集合相交和相等的两方保密计算[J].电子与信息学报,2012,34(2):462-467. 被引量:13
  • 9Regev O. On lattices, learning with errors, random linear codes, and cryptography [J]. Journal of the ACM, 2009,56 (6) : 1-40.
  • 10Shamir A. How to share a secret[J]. Communications of the ACM, 1979,24(11) :612-613.

二级参考文献43

  • 1罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 2Organization for the Advancement of Structured Information Standards (OASIS) http://www.oasis-open.org/.
  • 3Distributed Management Task Force (DMTF) http://www.dmtf.org/home.
  • 4Cloud Security Alliance http://www.cloudsecurityalliance.org.
  • 5Crampton J, Martin K, Wild P. On key assignment for hierarchical access control. In: Guttan J, ed, Proc. of the 19th IEEE Computer Security Foundations Workshop--CSFW 2006. Venice: IEEE Computer Society Press, 2006. 5-7.
  • 6Damiani E, De S, Vimercati C, Foresti S, Jajodia S, Paraboschi S, Samarati P. An experimental evaluation of multi-key strategies for data outsourcing. In: Venter HS, Eloff MM, Labuschagne L, Eloff JHP, Solms RV, eds. New Approaches for Security, Privacy and Trust in Complex Environments, Proc. of the IFIP TC-11 22nd Int'l Information Security Conf. Sandton: Springer-Verlag, 2007. 395-396.
  • 7Bethencourt J, Sahai A, Waters B. Ciphertext-Policy attribute-based encryption. In: Shands D, ed. Proc. of the 2007 IEEE Symp. on Security and Privacy. Oakland: IEEE Computer Society, 2007. 321-334. [doi: 10.1109/SP.2007.11].
  • 8Yu S, Ren K, Lou W, Li J. Defending against key abuse attacks in KP-ABE enabled broadcast systems. In: Bao F, ed. Proc. of the 5th Int'l Conf. on Security and Privacy in Communication Networks. Singapore: Springer-Verlag, http://www.linkpdf.com/ ebook-viewer.php?url=http://www.ualr.edu/sxyul/file/SecureCommO9_AFKP_ABE.pdf.
  • 9Ibraimi L, Petkovic M, Nikova S, Hartel P, Jonker W. Ciphertext-Policy attribute-based threshold decryption with flexible delegation and revocation of user attributes. Technical Report, Centre for Telematics and Information Technology, University of Twente, 2009.
  • 10Roy S, Chuah M. Secure data retrieval based on ciphertext policy attribute-based encryption (CP-ABE) system for the DTNs. Technical Report, 2009.

共引文献1077

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部