期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
全多方排序协议在电子投票中的应用
1
作者 高笑枫 《中国宽带》 2021年第2期79-79,共1页
在电子投票协议中,多选举人多候选人的场景较为普遍,所以此处讨论多选多的投票场景。安全多方排序算法应用的阶段是在每位候选人都获得自己得到的票数总和之后,进行排序得到最终的选举结果。在此之前,可以利用拆分选票进行传输的方法保... 在电子投票协议中,多选举人多候选人的场景较为普遍,所以此处讨论多选多的投票场景。安全多方排序算法应用的阶段是在每位候选人都获得自己得到的票数总和之后,进行排序得到最终的选举结果。在此之前,可以利用拆分选票进行传输的方法保证各个候选人获得票数的过程具有全隐私性。 展开更多
关键词 电子投票 多方排序 全隐私性
下载PDF
Big Data Security and Privacy: A Review 被引量:3
2
作者 MATTURDI Bardi ZHOU Xianwei +1 位作者 LI Shuai LIN Fuhong 《China Communications》 SCIE CSCD 2014年第A02期135-145,共11页
While Big Data gradually become a hot topic of research and business and has been everywhere used in many industries, Big Data security and privacy has been increasingly concerned. However, there is an obvious contrad... While Big Data gradually become a hot topic of research and business and has been everywhere used in many industries, Big Data security and privacy has been increasingly concerned. However, there is an obvious contradiction between Big Data security and privacy and the widespread use of Big Data. In this paper, we firstly reviewed the enormous benefits and challenges of security and privacy in Big Data. Then, we present some possible methods and techniques to ensure Big Data security and privacy. 展开更多
关键词 big data value of big data security and privacy
下载PDF
The Cloud Storage Ciphertext Retrieval Scheme Based on ORAM 被引量:1
3
作者 SONG Ningning SUN Yan 《China Communications》 SCIE CSCD 2014年第A02期156-165,共10页
Due to its characteristics distribution and virtualization, cloud storage also brings new security problems. User's data is stored in the cloud, which separated the ownership from management. How to ensure the securi... Due to its characteristics distribution and virtualization, cloud storage also brings new security problems. User's data is stored in the cloud, which separated the ownership from management. How to ensure the security of cloud data, how to increase data availability and how to improve user privacy perception are the key issues of cloud storage research, especially when the cloud service provider is not completely trusted. In this paper, a cloud storage ciphertext retrieval scheme based on AES and homomorphic encryption is presented. This ciphertext retrieval scheme will not only conceal the user retrieval information, but also prevent the cloud from obtaining user access pattern such as read-write mode, and access frequency, thereby ensuring the safety of the ciphertext retrieval and user privacy. The results of simulation analysis show that the performance of this ciphertext retrieval scheme requires less overhead than other schemes on the same security level. 展开更多
关键词 cloud storage ciphertext retrieval scheme ORAM index map
下载PDF
A lightweight authentication scheme with user untraceability 被引量:2
4
作者 Kuo-Hui YEH 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2015年第4期259-271,共13页
With the rapid growth of electronic commerce and associated demands on variants of Internet based applications,application systems providing network resources and business services are in high demand around the world.... With the rapid growth of electronic commerce and associated demands on variants of Internet based applications,application systems providing network resources and business services are in high demand around the world.To guarantee robust security and computational efficiency for service retrieval,a variety of authentication schemes have been proposed.However,most of these schemes have been found to be lacking when subject to a formal security analysis.Recently,Chang et al.(2014) introduced a formally provable secure authentication protocol with the property of user-untraceability.Unfortunately,based on our analysis,the proposed scheme fails to provide the property of user-untraceability as claimed,and is insecure against user impersonation attack,server counterfeit attack,and man-in-the-middle attack.In this paper,we demonstrate the details of these malicious attacks.A security enhanced authentication scheme is proposed to eliminate all identified weaknesses. 展开更多
关键词 AUTHENTICATION PRIVACY Security Smart card UNTRACEABILITY
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部