期刊文献+

量子密码学结合Grover搜索的大数据安全认证方案 被引量:3

A Big Data Security Authentication Scheme Based on Quantum Cryptography and Grover Search
下载PDF
导出
摘要 随着云计算和大数据技术的不断发展,大数据中心的安全性变得尤为重要,基于此提出一种基于量子密码和Grover搜索的数据中心安全认证方案.首先,构建一个多层安全管理模型,在用户读取数据时,将数据进行分组加密.然后,基于量子密码构建一种用户和数据中心之间的安全认证协议,保证两者之间的通信安全.利用量子Grover搜索算法来寻找密钥处理过程的最优参数,以最小化整个密钥管理的计算复杂度.分析表明,提出的安全认证方案具有较低的计算复杂度和较高的安全性能. With the continuous development of cloud computing and big data technology,the security of big data center becomes more and more important,so a data center security authentication scheme based on quantum cryptography and Grover search is proposed.Firstly,a multi layer security management model is constructed,and the data is encrypted when the user reads the data.Then,a security authentication protocol between the user and the data center is constructed based on the quantum cryptography,to ensure the communication security between the two.At the same time,the quantum Grover search algorithm is used to find the optimal parameters of the key processing procedure to minimize the computational complexity of the whole key management.The analysis shows that the security authentication scheme has low computational complexity and high security performance.
出处 《湘潭大学自然科学学报》 CAS 北大核心 2016年第4期76-79,共4页 Natural Science Journal of Xiangtan University
基金 河南省教师教育课程改革研究项目(2015-JSJYYB-139)
关键词 大数据安全 量子密码学 Grover搜索 安全认证 密钥管理 big data security quantum cryptography Grover search security authentication key management
  • 相关文献

参考文献5

二级参考文献70

  • 1罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 2Organization for the Advancement of Structured Information Standards (OASIS) http://www.oasis-open.org/.
  • 3Distributed Management Task Force (DMTF) http://www.dmtf.org/home.
  • 4Cloud Security Alliance http://www.cloudsecurityalliance.org.
  • 5Crampton J, Martin K, Wild P. On key assignment for hierarchical access control. In: Guttan J, ed, Proc. of the 19th IEEE Computer Security Foundations Workshop--CSFW 2006. Venice: IEEE Computer Society Press, 2006. 5-7.
  • 6Damiani E, De S, Vimercati C, Foresti S, Jajodia S, Paraboschi S, Samarati P. An experimental evaluation of multi-key strategies for data outsourcing. In: Venter HS, Eloff MM, Labuschagne L, Eloff JHP, Solms RV, eds. New Approaches for Security, Privacy and Trust in Complex Environments, Proc. of the IFIP TC-11 22nd Int'l Information Security Conf. Sandton: Springer-Verlag, 2007. 395-396.
  • 7Bethencourt J, Sahai A, Waters B. Ciphertext-Policy attribute-based encryption. In: Shands D, ed. Proc. of the 2007 IEEE Symp. on Security and Privacy. Oakland: IEEE Computer Society, 2007. 321-334. [doi: 10.1109/SP.2007.11].
  • 8Yu S, Ren K, Lou W, Li J. Defending against key abuse attacks in KP-ABE enabled broadcast systems. In: Bao F, ed. Proc. of the 5th Int'l Conf. on Security and Privacy in Communication Networks. Singapore: Springer-Verlag, http://www.linkpdf.com/ ebook-viewer.php?url=http://www.ualr.edu/sxyul/file/SecureCommO9_AFKP_ABE.pdf.
  • 9Ibraimi L, Petkovic M, Nikova S, Hartel P, Jonker W. Ciphertext-Policy attribute-based threshold decryption with flexible delegation and revocation of user attributes. Technical Report, Centre for Telematics and Information Technology, University of Twente, 2009.
  • 10Roy S, Chuah M. Secure data retrieval based on ciphertext policy attribute-based encryption (CP-ABE) system for the DTNs. Technical Report, 2009.

共引文献1083

同被引文献41

引证文献3

二级引证文献28

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部