期刊文献+

外包数据完整性审计方案

下载PDF
导出
摘要 在本次论文中,主要在文献的基础上,针对的场景是群组里面的成员分享数据、群组中有可能有群组的成员离开群组,所以该成员的签名并不再生效,如果把数据重新下载下来再重新签名这样并不适用,所以在这次的论文中,利用第三方审计端的代理重签名思想,来解决群组成员以后重新签名的问题。
作者 王鑫龙
出处 《科技创新与应用》 2016年第5期85-85,共1页 Technology Innovation and Application
  • 相关文献

参考文献2

二级参考文献110

  • 1Yun A, Shi C, Kim Y. On protecting integrity and confidentiality of cryptographic file system for outsourced storage [C] //Proc of ACM Workshop Cloud Computing Security (CCSW 2009). New York: ACM, 2009:67-76.
  • 2Rackspace. JungleDisk [EB/OL]. 2010 [ 2011-01-09 ]. http://www, jungledisk, com/.
  • 3Vrable M, Savage S, Voelker G M. Cumulus: Filesystem Backup to the cloud [J]. ACM Trans on Storage, 2009, 5 (4): 1-28.
  • 4Cramer R, Shoup V. Design and analysis of practical public- key eneryption schemes secure against adaptive chosen ciphertext attack [J]. SIAM Journal on Computing, 2004, 33(1) : 167-226.
  • 5Hofheinz D, Eike K. Secure hybrid encryption from weakened key encapsulation [G] //LNCS 4622: Proc of CRYPTO 2007. Berlin: Springer,2007: 553-571.
  • 6Blaze M, Bleumer G, Strauss M. Divertible protocols and atomic proxy cryptography [G] //LNCS 1403: Proc of EUROCRYPT 1998. Berlin.. Springer, 1998:127-144.
  • 7Ateniese G, Fu K, Green M, et al. Improved proxy re- encryption schemes with applications to secure distributed storage [J]. ACM Trans on Information and System Security, 2006, 9(1): 1-30.
  • 8Green M, Ateniese G. Identity-based proxy re-encryption[G] //LNCS 4521: Proc of the 5th Applied Cryptography and Network Security Conf. Berlin: Springer, 2007: 288- 306.
  • 9Hohenberger S, Rothblum G, Shelat A, et al. Securely obfuscating reencryption [C] //Proc of the 4th Theory of Cryptography Conf. Berlin: Springer, 2007:233-252.
  • 10Canetti R, Hohenherger S. Chosen-ciphertext secure proxy re-encryption [C] //Proc of ACM CCS 2007. New York: ACM, 2007:185-194.

共引文献251

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部