期刊文献+

面向推荐系统数据安全的无证书门限解密方案

Certificateless Threshold Decryption Scheme for Data Security of Recommendation System
下载PDF
导出
摘要 推荐系统是解决信息过载问题和满足用户个性化需求的有效途径之一。然而,由于推荐系统需要用户提供不同程度的个性化信息来提升推荐的准确度,因此各种数据的安全问题成为阻碍其发展的重要因素。在基于分布式体系结构的推荐系统中,门限解密技术是抵抗数据安全攻击、保护推荐系统用户隐私的有效方法之一。在无证书公钥密码体制下研究门限解密技术,既避免了传统公钥密码体制中昂贵的证书管理问题,又解决了基于身份密钥体制中固有的密钥托管问题。给出了无证书门限解密系统的形式化定义与安全模型,构建了一个新的无证书门限解密方案,并在随机预言模型下证明了该方案在适应性选择密文攻击下是安全的。与已有的方案相比,该方案的计算代价更小,传输速率更高,主密钥和公钥长度更短,用户之间需要传播的信息量更小。所提方案既能提高推荐系统的信息传输效率,又能有效地保证分布式推荐系统中用户隐私的安全性和可靠性。 Recommendation system is an effective way to solve the problem of information overloading and meanwhile satisfy user's personalized needs.Nevertheless the data security issues involved from the recommendation procedure are definitely hindering the healthy development of recommendation system.In distributed recommendation systems,threshold decryption is one of the useful methods to resist security attack and protect user's privacy.Regarding aforementioned techniques,we studied threshold decryption in the context of certificateless public key cryptography,aiming to avoid costly management of certificate in public key infrastructure and settle the matter of key escrow in identity-based cryptography.This paper introduced a new construction for certificateless threshold decryption scheme and the corresponding security model.The scheme was proved secure against chosen-ciphertext attack in the random oracle model and the security proof was presented under the condition of hard computation of a problem in relation to bilinear diffiehellman problem.Compared with other existing schemes,our scheme has lower computational overhead,faster transmission rate and shorter master secret key and public key.The scheme can not only improve the efficiency of recommendation system but also effectively ensure the safety of user's privacy.
出处 《计算机科学》 CSCD 北大核心 2017年第11期253-263,共11页 Computer Science
基金 江苏省高校自然科学研究面上项目(16KJB520019) 江苏省自然科学基金资助项目(BK20141053) 南京理工大学紫金学院2017年度重点科研项目(2017ZRKX0401001) 安徽省高等学校自然科学研究项目(KJ2017B016)资助
关键词 推荐系统 数据安全 无证书公钥加密 门限解密 随机预言模型 Recommendation system, Data security, Certificateless public key encryption, Threshold decryption, Random oracle model
  • 相关文献

参考文献8

二级参考文献80

  • 1张锋,常会友.基于分布式数据的隐私保持协同过滤推荐研究[J].计算机学报,2006,29(8):1487-1495. 被引量:17
  • 2张振峰.基于身份的可验证加密签名协议的安全性分析[J].计算机学报,2006,29(9):1688-1693. 被引量:8
  • 3余力,董斯维,郭斌.电子商务推荐攻击研究[J].计算机科学,2007,34(5):134-138. 被引量:11
  • 4Rivest R L,Shamir A,Adleman L. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 1978,21: 120-126.
  • 5Shamir A. Identity based cryptosystems and signature schemes [C] // Proceedings of the Advances in Cryptology-Cryipto' 84.Lecture Note in Computer Science: 196. Springer-Verlag, 1984: 47-53.
  • 6Boneh D, Franklin M. Identity - base encryption from the Well pairing[C]//Proceedings of the Advances in Cryptology-Crypto 2001. Lecture Note in Computer Science: 2139. Springer-Verlag, 2001 : 213-229.
  • 7AI-Riyami S S, Paterson K. Certificateless Public Key Cryptography[C]//Proc, of Asiacrypt'03. [S. l.]:Springer-Verlag, 2003.
  • 8Boneh D,Gentry C, Lynn B, et al. Aggregate and verifiably encrypted signatures from bilinear maps[C]// Proceedings of the EUROCRYPT' 03. LNCS, vol. 2656. Berlin: Springer, 2003: 416-432.
  • 9Hess F . Efficient identity based signature schemes based on pairings[C]//Proceedings of the 9th Annual International Workshop on Selected Areas in Cryptography. Lecture notes in Computer Science : 2595. Springer-Verlag, 2003 : 310-324.
  • 10Gu C X, Zhu Y F. An ID-based verifiable encrypted signature scheme based on Hess's scheme[C]//Proceedings of the 1^st SKLOIS Conference on Information Security and Cryptology. Lecture Notes in Computer Science: 3822. Springer-Verlag, 2005: 42-52.

共引文献41

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部