期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
新型计算机信息传输安全机
1
作者 罗俊扬 郑松南 《电脑》 1996年第8期33-35,共3页
计算机信息传输,除满足传输信息的完整性、真实性和可仲裁性的要求外,在很多场合还有保密性的要求.国外的信息传输多采用美国的对称密码(DES)或非对称密码(RSA)所构成的公开密钥体制.但这两种体制都不尽人意.我们采用混合型密码的加密... 计算机信息传输,除满足传输信息的完整性、真实性和可仲裁性的要求外,在很多场合还有保密性的要求.国外的信息传输多采用美国的对称密码(DES)或非对称密码(RSA)所构成的公开密钥体制.但这两种体制都不尽人意.我们采用混合型密码的加密算法理论,开发研究成功一种新型信息传输安全识别机.它具有以下几个特点:1.安全性强.新型信息传输安全机,采用的个人识别码PIN可达到十进制数的16位,同时产生最少144位的加密密钥. 展开更多
关键词 计算 信息传输安全机 信息传输
下载PDF
Multi-Owner Keyword Search over Shared Data without Secure Channels in the Cloud
2
作者 Yilun Wu Xicheng Lu +3 位作者 Jinshu Su Peixin Chen Xiaofeng Wang Bofeng Zhang 《China Communications》 SCIE CSCD 2017年第5期124-133,共10页
Searchable encryption allows cloud users to outsource the massive encrypted data to the remote cloud and to search over the data without revealing the sensitive information. Many schemes have been proposed to support ... Searchable encryption allows cloud users to outsource the massive encrypted data to the remote cloud and to search over the data without revealing the sensitive information. Many schemes have been proposed to support the keyword search in a public cloud. However,they have some potential limitations. First,most of the existing schemes only consider the scenario with the single data owner. Second,they need secure channels to guarantee the secure transmission of secret keys from the data owner to data users. Third,in some schemes,the data owner should be online to help data users when data users intend to perform the search,which is inconvenient.In this paper,we propose a novel searchable scheme which supports the multi-owner keyword search without secure channels. More than that,our scheme is a non-interactive solution,in which all the users only need to communicate with the cloud server. Furthermore,the analysis proves that our scheme can guarantee the security even without secure channels. Unlike most existing public key encryption based searchable schemes,we evaluate the performance of our scheme,which shows that our scheme is practical. 展开更多
关键词 keyword search cloud security secure channels proxy re-encryption
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部