期刊文献+

从云邮件安全看加密技术的发展

The Development of Encryption Techniques for Cloud Email Security
下载PDF
导出
摘要 随着云计算的快速发展,与云邮件系统相关的安全问题越来越受到人们的关注。传统公钥加密技术虽然可以满足云邮件系统的安全性需求,但是在易用性方面却存在严重不足。通过分析传统加密技术存在的不足,探讨前沿的代理重加密和可搜索公钥加密技术在解决云邮件系统的安全性与易用性方面的优势与存在的科学问题。 Along with the rapid development of cloud computing system, the security problems of cloud mail system has attracted many attentions. These problems can be solved by the traditional public-key encryption techniques, but they make the resulted cloud email system inconvenient for users. This paper analyzes the limitations of the tradition encryption techniques, introduces the advantages of some advanced encryption techniques, like proxy re-encryption and searchable public key encryption, and discusses the still existing problems of these techniques.
作者 徐鹏 陈天阳 金海 XU Peng;CHEN Tianyang;JIN Hai(Services Computing Technology and System Lab, Cluster and Grid Computing Lab, School of Computer, HuaZhong University of Science and Technology, Wuhan 430074, China;Shenzhen Huazhong University of Science and Technology Research Institute, Shenzhen 518057, China)
出处 《信息安全学报》 CSCD 2018年第1期95-110,共16页 Journal of Cyber Security
基金 国家自然科学面上基金(No.61472156) 国家重点基础研究发展计划(973项目 No.2014CB340600) 深圳市基础研究(学科布局)项目(No.JCYJ20170413114215614)资助
关键词 云邮件 安全 基于身份加密 代理重加密 广播加密 可搜索加密 Cloud mail security Identity-Based Encryption Proxy Re-Encryption Broadcast Encryption Searchable Encryption
  • 相关文献

参考文献1

二级参考文献30

  • 1Kaufman LM (2009) Data security in the world of cloud computing.IEEE Secur Priv 7:61-64.
  • 2Almorsy M, Grundy J, Müller I (2010) An analysis of the cloudcomputing security problem. In: The Proceedings of the 2010Asia Pacific cloud workshop co-located with APSEC2010, IEEE,pp 1-6.
  • 3Blaze M, Bleumer G, Strauss M (1998) Divertible protocols andatomic proxy cryptography. In: Nyberg K (ed) EUROCRYPT 1998, LNCS, Springer, Heidelberg, 1403, pp 127-144.
  • 4Ibraimi L, Tang Q, Hartel P et al (2008) A type-and-identitybasedproxy re-encryption scheme and its application in healthcare.In: Secure Data Management 2008, LNCS, Springer, Heidelberg,5159, pp 185-198.
  • 5Boneh D, Franklin M (2001) Identity-based encryption from theweil pairing. In: Joe K (ed) CRYPTO 2001, LNCS, Springer,Heidelberg, 2139, pp 213-229.
  • 6Boldyreva A, Marc F, Palacio A et al (2007) A closer look atPKI: security and efficiency. In: Okamoto T, Wang X (eds) PKC 2007, LNCS, Springer, Heidelberg, 4450, pp 458-475.
  • 7Fujisaki E, Pointcheval D, Stern J (2004) RSA-OAEP is secureunder the RSA assumption. J Cryptol 17:81-104.
  • 8Zhou L, Marsh MA, Schneider FB et al (2005) Distributedblinding for ElGamal re-encryption. In: ICDCS 2005, IEEE,pp 824-824.
  • 9Wang XY, Hui LCK, Chow KP et al (2000) The differentialcryptanalysis of an AES finalist-serpent. Technical Report, HKUCSIS Technical Report TR-2000-04.
  • 10Kurosawa K, Desmedt Y (2004) A new paradigm of hybridencryption scheme. In: Franklin M (ed) CRYPTO 2004, LNCS,Springer, Heidelberg, 3152, pp 345-359.

共引文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部