期刊文献+

无线体域网中具有生物特征的基于身份的访问控制方案 被引量:1

Biometric identity-based access control for wireless body area networks
下载PDF
导出
摘要 针对现有无线体域网(WBANs)中的安全和隐私性问题,为了充分利用生物特征的优势来确保WBANs内数据通信的安全性,首次提出了一种具有生物特征的基于身份的隐私保护技术,然后利用该技术在WBANs中提出了一种新的访问控制方法。在安全性方面,在随机预言机模型下是可证明安全的,并且具有机密性、认证性、完整性、不可否认性和匿名性;在性能方面,与现有方案相比,提出方案在计算开销和通信开销方面都具有优势。 Aiming at the problems of security and privacy in wireless body area networks(WBANs),in order to bring the advantages of biometric characteristics into full play to secure data communication within WBANs,this paper first proposed an identity-based privacy-preserving scheme based on biometrics,and then,presented a new access control approach for WBANs by the proposed design.From a security perspective,the proposed solution achieves confidentiality,authentication,integrity,non-repudiation and anonymity in the random oracle model.Performance analysis shows that the proposed scheme is the most efficient compared with other existing schemes in terms of computational cost and energy consumption.
作者 金春花 谢润 单劲松 强豪 Jin Chunhua;Xie Run;Shan Jinsong;Qiang Hao(Dept.of Artificial Intelligence&Big Data,Yibin University,Yibin Sichuan 644000,China;Faculty of Computer&Software Enginee-ring,Huaiyin Institute of Technology,Huai’an Jiangsu 233002,China)
出处 《计算机应用研究》 CSCD 北大核心 2022年第2期577-581,586,共6页 Application Research of Computers
基金 江苏省高等学校自然科学研究面上项目(19KJB510020) 淮安市自然科学研究计划资助项目(HABZ201916) 江苏省高等学校自然科学研究项目(18KJB416002)。
关键词 访问控制 生物特征 基于身份的密码系统 安全 WBANs access control biometrics identity-based cryptosystem security WBANs
  • 相关文献

参考文献3

二级参考文献17

  • 1Damgard I,Thorbek R.Non-interactive proofs for integer multiplication[].Proc Eurocrypt.2007
  • 2Damgard I,Holfheins D,Kiltz E et al.Public-key with non-interactive opening[].Proc CT-RSA.2008
  • 3Waters B.E-cient identity-based encryption without random oracles[].Proc Eurocrypt.2005
  • 4Boyen X,Mei Q X,Waters B.Direct chosen cipher- text security from identity-based techniques[].Proc ACM CCS.2005
  • 5Shamir A.Identity-based cryptosystems and signature schemes[].ProcCRYPTO.1984
  • 6Kiltz E.Direct chosen-ciphertext secure identity-based encryptionin the standard model with short ciphertext[].CryptologyePrint ArchiveReport/.2006
  • 7BONEH D,FRANKLIN M.Identity-based encryption from the Weil pairing[].SIAM Journal on Computing.2003
  • 8Cramer R,Shoup V.Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertextattack[].SIAM Journal on Computing.2003
  • 9SHI Jiaoli,HUANG Chuanhe,HE Kai,SHEN Xieyang.ACS-HCA:An Access Control Scheme Under Hierarchical Cryptography Architecture[J].Chinese Journal of Electronics,2019,28(1):52-61. 被引量:1
  • 10姚文斌,韩司,李小勇.云存储环境下的密文安全共享机制[J].通信学报,2015,36(10):1-8. 被引量:11

共引文献5

同被引文献14

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部