期刊文献+

适用于云存储的并行无证书代理重加密方案 被引量:1

On Parallel Certificateless Proxy Re-Encryption Scheme for Secure Cloud Data Sharing
下载PDF
导出
摘要 为了保证云存储中数据的安全访问控制,并基于CPU已进入多核阶段的现状,将并行计算思想用于代理重加密算法中,提出了一个并行代理重加密方案(PCL-PRE).数据拥有者使用对称加密密钥(DEK)加密敏感数据,同时使用代理重加密算法加密该DEK,将这些加密内容存储于云存储中心.云存储中心作为半可信的代理节点,根据访问控制列表,将数据拥有者的DEK进行代理加密,转化为多个接收者可以用自己私钥解密的密文,而在整个过程中都无法获取任何明文信息.接收者收到密文后,即可解密.该方案使用随机数复用技术,对消息进行优化并行,并结合密文聚合,进一步提高了传输效率.实验表明,并行代理重加密方案具有明显的效率优势. Aimed to secure data access control in cloud storage, and based on the situation that C PU hasentered the reality of m ulti-core, parallel com puting idea into the proxy re-encryption has been introduced,and a parallel certificateless proxy re-encryption (P C L -PR E ) schem e proposed. T he data ow ner encrypts inparallel the sensitive data w ith his own public key and uploads the encrypted data to the sem i-trusted proxyin cloud. W hile according to the Access Control List (A C L ) , the proxy transform s the encrypted ciphertextinto a ciphertext of the sam e m essage that could be decrypted by receivers! secret key, but the proxycannot obtain any inform ation about the m essage. A fter receiving the the converted decrypted data, the receiverscan subsequently get the plain text. T he m essages are optim ized parallel w ith random ness reusingand cipher text aggregation, w hich will reduce the com putation and transm ission overheads further. E xperiment result show s that com pared w ith other existing CL-PRE schem es, the schem e is very efficient.
作者 柯钢
出处 《西南师范大学学报(自然科学版)》 CAS 北大核心 2016年第7期61-67,共7页 Journal of Southwest China Normal University(Natural Science Edition)
基金 广东省制造装备数字化重点实验建设项目(2011A060901026) 东莞市高等院校 科研机构科技计划一般项目(2014106101035)
关键词 云存储 无证书代理重加密 并行计算 cloud data sh arin g certificateless proxy re-encryption parallel com puting
  • 相关文献

参考文献17

  • 1BLAZE M, BLEUMER G, STRAUSS M. Divertible Protocols and Atomic Proxy Cryptography [J]. Lecture Notes inComputer Science,1998,1403: 127 - 144.
  • 2GIUSEPPE A, KEVIN F s M ATTHEW G, et al. Improved Proxy Re-Encryption Schemes with Applications to SecureDistributed Storage [J]. ACM Transactions on Information and System Security, 2006, 9(1) : 1 - 30.
  • 3GOLLE P, JAKOBSSON M , JUELS A, et al. Universal Re-Encryption for Mixnetg [C], Topics in Cryptology-CTRSA2004. Berlin: Springer, 2004;i 163-178.
  • 4CHU C K, TZENCx W G. Identity-Based Proxy Reencryption Without Random Oracles [J]. Lecture Mote- in ComputerScience. 2007. 4779: 189-202.
  • 5GREEN M, ATENIESE G. Identity-Based Proxy Reencryption [C]. Proceedings of the Sth International Conference onApplied Cryptography and Netword Security. Berlin: Springer-Verlag, 2007: 288 - 306,.
  • 6AL-RIYAMI S, PATERSON K. Certificateless Public Key Cryptography [C], ASIACRYPT 2003, Berlin: Springer,2003: 452-473.
  • 7SUR C, JUNG C D , PARK Y , et al. Chosen-Ciphertext Secure Gertificateless Proxy Re-Encryption [J]. Lecture Notesin Computer Science,2010,6109j 214 -232,.
  • 8XU L, WU X, ZHANG X. CL-PRE: A Certificateless Proxy Re-Encryption Scheme for Secure Data Sharing with PublicCloud [C]. Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security. NewY ork: ACM, 2012: 8 7 -8 8 .
  • 9蓝才会,王彩芬.一个新的基于秘密共享的条件代理重加密方案[J].计算机学报,2013,36(4):895-902. 被引量:10
  • 10SEO S H , NABEEL M , DING X , et al. An Efficient Certificateless Encryption for Secure Data Sharing in Public Clouds[J]. IEEE Transactions on Knowledge and Data Engineering, 2014, 26(9) : 2107 - 2119.

二级参考文献23

  • 1LAN MAN Standards Committee of EEE Computer Socie- ty. IEEE standard for wireless LAN medium access con-trol (MAC) and physical layer (PHY) specifications [S]. New York: [s.n.], 1999: 72-86.
  • 2Bensaou B, Wang Y, Ko C C. Fair medium access in 802.11 based wireless Ad hoc network [ C] JJMOBIHOC 2000. Massachusetts: IEEE Press, 2000: 99-106.
  • 3Jian Y, Chen S G. Can CSMA/CA networks be made fair? [ C] //MOBICOM 2008. California: IEEE Press, 2008 : 235-246.
  • 4Qian Z, Qin Z Y. Cross-layer design for QoS support in muhihop wireless networks [ J ]. Proceedings of the IEEE, 2008, 96(1) : 64-76.
  • 5Chen S, Zhang Z. Localized algorithm for aggregate fair- ness in wireless sensor networks [ C ] JJ MOBICOM 2006. California: IEEE Press, 2006: 274-285.
  • 6Wang X, Kar K. Throughput modeling and fairness issues in CSMA/CA based Ad hoc networks [ C ] //INFOCOM 2005. Miami: IEEE Press, 2005 : 23-34.
  • 7Koksal C M, Kassab H, Balakrishnan H. An analysis of short-term fairness in wireless media access protocols [ C ] //SIGMETRICS 2000. Santa Clara: IEEE Press, 2000: 118-119.
  • 8Bottigliengo M, Casetti C, Chiasserini C F, et al. Short-term faireness for TCP flows in 802. llb WLANs [C ] // INFOCOM 2004. Hong Kong: IEEE Press, 2004 : 1383-1392.
  • 9Lin K, Kushman N, Katabi D. ZipTx: harnessing par- tial packets in 802.11 networks [ C ]//MobiCom 2008. California: IEEE Press, 2008 : 351-362.
  • 10Hui P, Chaintreau A, Scott J, et al. Packet switched networks and human mobility in conference environments [ C 1 // S1GCOMM 2005. Philadelphia: IEEE Press, 2005 : 244-255.

共引文献10

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部