期刊文献+

面向云计算安全的无证书代理重加密方案 被引量:2

Certificateless Proxy Re-encryption Scheme for Cloud Computing Security
下载PDF
导出
摘要 在无证书公钥密码体制下研究代理重加密技术,给出无证书代理重加密系统的形式化定义与安全模型,构建一个新的无证书代理重加密方案,并在随机预言模型下证明其在适应性选择明文攻击下是安全的。基于该方案,云服务商可利用用户提供的代理钥,将待分享的加密数据转换为针对其他用户的密文,其他用户采用自身私钥进行解密并访问原始数据,达到共享数据的目的。分析结果表明,该方案能够有效保证云环境下数据存储与共享的安全性及可靠性。 This paper researches Proxy Re-encryption (PRE) technology under the Certificateless Public Key Cryptography ( CL-PKC), gives a formal definition and security model for certificateless PRE system and construct a new certificateless PRE scheme. The new scheme is proved secure against chosen plaintext attack in the Random Oracle Model (ROM). With the help of the proposed scheme, cloud service providers can transform cipbertexts encrypted under a user' s public key into different ciphertexts that can be decrypted by the other user' s secret key, and the other user also can access raw data to realize data sharing. Analysis result shows that the scheme can effectively ensure the safety and reliability of data under the environment of cloud computing.
出处 《计算机工程》 CAS CSCD 北大核心 2017年第8期8-14,共7页 Computer Engineering
基金 江苏省高校自然科学研究面上项目(16KJB520019 15KJB520017) 南京理工大学紫金学院2017年度科研项目(2017ZRK X0401001)
关键词 云计算安全 代理重加密 无证书公钥加密 双线性对 随机预言模型 cloud computing security Proxy Re-encryption ( PRE ) certificateless public key encryption bilinearpairings Random Oracle Model (ROM)
  • 相关文献

参考文献6

二级参考文献68

  • 1陈智罡,宋新霞,张延红.基于Binary-LWE噪音控制优化的全同态加密方案与安全参数分析[J].四川大学学报(工程科学版),2015,47(2):75-81. 被引量:8
  • 2BLAZE M, BLEUMER G; STRAUSS M. Divertible protocols and atomic proxy cryptography[A]. E:JROCRYPT'98, International Con- fe:'ence on the Theory and Application of Cryptographic Techniqtms[C]. Espoo, Finland, 1998.127-144.
  • 3ATENIESE G: FU K, GREEN M, et al. Improved proxy re-eneryption schemes with applications to secure dislributed storage[J]. ACM Transac- tions on Information System Security, 2006, (9): 1-30.
  • 4SHAO J, LIU P, ZHOU Y. Achieving key privacy without losing CCA security in proxy re-eneryption[J]. The Journal of Systems and Soil- ware, 2012, 85:655-665.
  • 5TABAN G, CARDENAS A A, GLIGOR V D. Towards a secure and interoperable DRM architecture[A]. Proceedings of the ACM Work- shop on Digital Rights Management[C]. New York, USA, 2006. 69-78.
  • 6LEE S, HEEJIN P, JONG K. A secure and mutual-profitable DRM interoperability scheme[A]. Proceedings of the IEEE Symposium on Computers and Communications[C]. Riccione, Italy, 2010. 75-80.
  • 7SHAO J, CAO Z, LIANG X H, et at'. Proxy re-encryption with key- word search[J]. Information Sciences, 2010, 180(4):2576-2587.
  • 8WANG X A, HUANG X Y, YANG X Y, et al. Further observation on proxy re-encryption with keyword search[J]. The Journal of Systems and Software, 2012, 85:643-654.
  • 9CANETT1 R, HOHENBERGER S. Chosen-ciphertext secure proxy re-encryption[A]. Proceedings of the 14th ACM Conference on Computer and Communications Security[C]. Alexandria, VA, USA, 2007. 185-194.
  • 10CANETTI R, HALEVI S, KATZ J. Chosen-ciphertext security from identity-based encryption[A]. EUROCRYPT'04[C]. Alexandria, VA, USA, 2007. 185-194.

共引文献96

同被引文献13

引证文献2

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部