期刊文献+

匿名验证隐藏证书及其应用 被引量:1

Anonymously verifiable hidden credentials and their applications
下载PDF
导出
摘要 在结合Holt等人的隐藏证书、IBE算法以及秘密共享这些方案的基础上,设计了一种新的匿名验证隐藏证书方案,在认证过程中可以保护用户的身份信息以及证书中的敏感信息,并且最后给出了一个医学方面的应用场景。分析证明:本方案能够避免攻击者通过收集用户的网络行为信息、利用数据分析等手段获取用户的敏感信息,因此该方案是安全有效的,能够更好地保护用户的隐私。 Basing on hidden credentials scheme designed by Holt et al,IBE scheme,and secret sharing scheme,this paper constructed a new anonymously verifiable hidden credentials scheme,which could protect the user' s identity information and sensitive information in the process of verification.Finally,it gave a medical application scenario.Analysis shows this scheme can resist an attacker who gets the user' s sensitive information by collecting the user' s network behavior information,utilizing data analysis,etc.So,this scheme is secure and effective,and can better protect the privacy of users.
出处 《计算机应用研究》 CSCD 北大核心 2014年第6期1846-1851,共6页 Application Research of Computers
基金 国家自然科学基金资助项目(61070189 61170032 61272435) 陕西师范大学研究生培养创新基金资助项目(2013CXS043) 中央高校基本科研经费资助项目(GK201304008)
关键词 身份 隐藏证书 匿名验证 隐私 identity hidden credentials anonymous verification privacy
  • 相关文献

参考文献2

二级参考文献89

  • 1WANG Xiaoming,ZHAO Zongtao.A Service Oriented Voting Authorization Model[J].Chinese Journal of Electronics,2006,15(1):37-40. 被引量:2
  • 2罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 3M LeMay,O Fatemieh,C A Gunter.PolicyMorph:interactive policy transformations for a logical attribute-based access control framework[A].Proceedings of the 12th ACM Symposium on Access Control Models and Technologies[C].New York:ACM,2008.205-214.
  • 4V Kolovski,J Hendler,B Parsia.Analyzing web access control policies[A].Proceedings of the 16th International Conference on World Wide Web[C].New York:ACM,2007.677-686.
  • 5E Yuan,J Tong.Attributed based access control (ABAC) for web services[A].Proceedings of the IEEE International Conference on Web Services[C].Washington:IEEE Computer Society,2005.561-569.
  • 6C Ye,Z Wu,Y Fu.An attribute-based delegation model and its extension[J].Journal of Research and Practice in Information Technology,2006,38 (1):3-17.
  • 7J Michael,R Manoj.A contextual attribute-based access control model[A].Proceedings of 2006 Workshops on the Move to Meaningful Internet Systems[C].Berlin:Springer,2006.1996-2006.
  • 8J Park,R Sandhu.The UCONABC usage control model[J].ACM Transactions on Information and System Security,2004,7(1):128-174.
  • 9D Q Zou,L G He,H Jin,et al.CRBAC:imposing multigrained constraints on the RBAC model in the multi-application environment[J].Journal of Network and Computer Applications,2009,32(2):402-411.
  • 10R Yang,C Lin,F Feng.A time and mutable attribute-based access control model[J].Journal of Computers,2009,4(6):510-518.

共引文献1148

同被引文献6

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部