期刊文献+

基于向量承诺与代理重加密的数据外包及分享方案

Data Outsourcing and Sharing Scheme Based on Vector Commitment and Proxy Re-encryption
下载PDF
导出
摘要 为保障外包数据的完整性、机密性以及可访问性,在向量承诺原语基础上,结合代理重加密技术,提出一种安全的数据外包及分享方案。通过引入对承诺值的数字签名,使得任意第三方可以在数据拥有者和服务提供商均不完全可信的情况下,对外包数据的完整性进行校验,数据拥有者可以对外包数据执行高效的添加、删除、修改和访问授权操作。性能及安全性分析结果表明了该方案的可行性。 In order to guarantee the integrity,confidentiality and accessibility of outsourcing data,a secure data outsourcing and sharing scheme is proposed based on the vector commitment primitive and the proxy re-encryption technology.By introducing a digital signature of the commitment value,any third party can verify the integrity of the outsourcing data without the data owner and service provider being fully trusted,and the data owner can perform efficient execution of the outsourcing data adding,deleting,modifing,and accessing authorization actions.Performance and safety analysis results show the feasibility of the scheme.
作者 吴兴华 张爱新 李建华 WU Xinghua;ZHANG Aixin;LI Jianhua(School of Cyber Security,Shanghai Jiaotong University,Shanghai 200240,China)
出处 《计算机工程》 CAS CSCD 北大核心 2018年第10期1-5,共5页 Computer Engineering
基金 国家重点研发计划"网络空间安全"重点专项(2017YFB0802100)
关键词 数据外包 数据分享 双线性映射 向量承诺 代理重加密 data outsourcing data sharing bilinear mapping vector commitment proxy re-encryption
  • 相关文献

参考文献3

二级参考文献34

  • 1Hacigumus H, Mehrotra S, Iyer B, et al. Providing Database as a Service[C]//Proc. of the 18th International Conference on Data Engineering. San Jose, CA, USA: IEEE Computer Society, 2002.
  • 2Merkle R C. Protocols for Public Key Cryptosystems[C]//Proc. of IEEE Symposium on Research in Security and Privacy. [S. l.]: IEEE Press, 1980.
  • 3Devanbu P, Gertz M, Martel C, et al. Authentic Third-party Data Publication[C]//Proc. of the 14th IFIP TCll/WGI1.3 Annual Working Conference on Database Security. Schood, Netherlands: [s. n.], 2000.
  • 4Mykletun E, Narasimha M, Tsudik G DSAC: Integrity for Outsoumed Databases with Signature Aggregation and Chaining[C]//Proc. of ACM CIKM'05. New York, USA: ACM Press, 2005.
  • 5Li Feifei, Marios H, George K, et al. Dynamic Authenticated Index Structures for Outsourced Database[C]//Proc. ofACM SIGMOD'06 Chicago, Illinois, USA: ACM Press, 2006.
  • 6Kyriakos M, Dimitris S, HweeHwa Pang. Partially Materialized Digest Scheme: An Efficient Verification Method for Outsourced Databases[J]. VLDB, 2009, 18(1): 345-362.
  • 7Niroshinie F,Seng W L,Wenny R.Mobile Cloud Computing:A Survey[J].Future Generation Computer Systems,2013,29(1):84-106.
  • 8Sriram N P,Zygmunt J H.A Practical,Secure,and Verifiable Cloud Computing for Mobile Systems[J].Procedia Computer Science,2014,34:474-483.
  • 9Khan A N,Mat K M,Khan S U,et al.Towards Secure Mobile Cloud Computing:A Survey[J].Future Generation Computer Systems,2013,29(5):1278-1299.
  • 10Sahai A,Waters B.Fuzzy Identity-based Encryption[M]//Cramer R.Advances in Cryptology-EUROCRYPT 2005.Berlin,Germany:Springer-Verlag,2005:457-473.

共引文献150

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部