期刊文献+
共找到6篇文章
< 1 >
每页显示 20 50 100
公有云中身份基多源IoT终端数据PDP方案 被引量:3
1
作者 王化群 刘哲 +1 位作者 何德彪 李继国 《通信学报》 EI CSCD 北大核心 2021年第7期52-60,共9页
针对公有云中多源物联网(IoT)数据完整性验证问题,提出了一种身份基多源IoT终端数据可证明数据持有(ID-MPDP)方案。首先,给出了ID-MPDP方案的系统模型和安全模型的形式化定义。然后,使用RSA设计了具体的ID-MPDP方案。最后,给出了该方案... 针对公有云中多源物联网(IoT)数据完整性验证问题,提出了一种身份基多源IoT终端数据可证明数据持有(ID-MPDP)方案。首先,给出了ID-MPDP方案的系统模型和安全模型的形式化定义。然后,使用RSA设计了具体的ID-MPDP方案。最后,给出了该方案的性能分析和安全性分析。性能分析和安全性分析结果表明,该方案是可证安全的、高效和可转换的,并具有以下优势:可用于多源IoT终端的数据完整性检测;具有较低的块扩展率;使用身份基公钥密码技术,消除了证书管理;满足可转换性。 展开更多
关键词 云计算 身份公钥密码体制 可证数据持有 物联网
下载PDF
电力移动作业PDA安全接入系统设计与实现 被引量:20
2
作者 秦超 张涛 林为民 《电力系统自动化》 EI CSCD 北大核心 2012年第11期82-85,共4页
分析了传统电力移动作业个人数字助理(PDA)接入系统可能存在的安全风险,设计和实现了更为安全的接入系统,对其总体架构及功能进行了详细分析。该系统可进行双向证书认证、数据保密传输、安全访问控制、网络隔离与安全数据过滤、实时监... 分析了传统电力移动作业个人数字助理(PDA)接入系统可能存在的安全风险,设计和实现了更为安全的接入系统,对其总体架构及功能进行了详细分析。该系统可进行双向证书认证、数据保密传输、安全访问控制、网络隔离与安全数据过滤、实时监控管理,可有效解决电力移动作业应用的安全防护问题。 展开更多
关键词 信息网络安全 电力移动作业 个人数字助理 安全接入系统 安全数码加密卡 公钥基 础设施 双因子认证 安全隔离过滤
下载PDF
A Smooth Expansion Model for PKI 被引量:1
3
作者 龚俭 刘建航 《Journal of Southeast University(English Edition)》 EI CAS 2000年第1期1-5,共5页
The expansibility of PKI is expected to have the features that when the amount of user exceeds the system capacity, the users’ requirement can still be met by simply expanding the number of PKI entities and managemen... The expansibility of PKI is expected to have the features that when the amount of user exceeds the system capacity, the users’ requirement can still be met by simply expanding the number of PKI entities and management levels, and this expansion should be achieved smoothly from the original system. The upward, downward, and horizontal expansions of PKI are discussed in this paper. A path discovery method is suggested to reduce the effect of PKI expansion to the end entities, so as to enhance the availbility of PKI services. 展开更多
关键词 network security key certificate CA PKI path discovery
下载PDF
Certificateless Public Key Encryption with Keyword Search 被引量:23
4
作者 PENG Yanguo CUI Jiangtao +1 位作者 PENG Changgen YING Zuobin 《China Communications》 SCIE CSCD 2014年第11期100-113,共14页
Public Key Encryption with Keyword Search (PEKS), an indispensable part of searchable encryption, is stock-in- trade for both protecting data and providing operability of encrypted data. So far most of PEKS schemes ... Public Key Encryption with Keyword Search (PEKS), an indispensable part of searchable encryption, is stock-in- trade for both protecting data and providing operability of encrypted data. So far most of PEKS schemes have been established on Identity-Based Cryptography (IBC) with key escrow problem inherently. Such problem severely restricts the promotion of IBC-based Public Key Infrastructure including PEKS component. Hence, Certificateless Public Key Cryptography (CLPKC) is efficient to remove such problem. CLPKC is introduced into PEKS, and a general model of Certificateless PEKS (CLPEKS) is formalized. In addition, a practical CLPEKS scheme is constructed with security and efficiency analyses. The proposal is secure channel free, and semantically secure against adaptive chosen keyword attack and keyword guessing attack. To illustrate the superiority, massive experiments are conducted on Enron Email dataset which is famous in information retrieval field. Compared with existed constructions, CLPEKS improves the efficiency in theory and removes the key escrow problem. 展开更多
关键词 provable secure certificateless public key encryption keyword search
下载PDF
Enhanced biometric encryption algorithm for private key protection in BioPKI system
5
作者 Cheol-Joo Chae Kwang-Nam Choi +2 位作者 Kiseok Choi Jae-Soo Kim Yong Ju Shin 《Journal of Central South University》 SCIE EI CAS 2014年第11期4286-4290,共5页
Protection of private key is the most critical part in public key infrastructure(PKI) system since it depends on the confidentiality of private key. Thread of password detection has been known as the vulnerability in ... Protection of private key is the most critical part in public key infrastructure(PKI) system since it depends on the confidentiality of private key. Thread of password detection has been known as the vulnerability in this PKI system. Recently, studies have been conducted on Bio PKI system that uses the biometric information of users in order to replace the password type of private key protection in PKI system. However, Bio PKI system also has vulnerability in that biometric information used for protection of private key cannot be reused once it is stolen or lost. So, we propose the method to protect the private key using FIDSEQi which binds sequence to biometric information. The proposed method enhances reusability of biometric information and presents higher attack complexity than the method of authentication by cross matching single biometric information. 展开更多
关键词 BioPKI system fingerprint biometric encryption secret share
下载PDF
Efficient hierarchical identity based encryption scheme in the standard model over lattices 被引量:2
6
作者 Feng-he WANG Chun-xiao WANG Zhen-hua LIU 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2016年第8期781-791,共11页
Using lattice basis delegation in a fixed dimension, we propose an efficient lattice-based hierarchical identity based encryption(HIBE) scheme in the standard model whose public key size is only(dm^2+ mn) log q b... Using lattice basis delegation in a fixed dimension, we propose an efficient lattice-based hierarchical identity based encryption(HIBE) scheme in the standard model whose public key size is only(dm^2+ mn) log q bits and whose message-ciphertext expansion factor is only log q, where d is the maximum hierarchical depth and(n, m, q)are public parameters. In our construction, a novel public key assignment rule is used to averagely assign one random and public matrix to two identity bits, which implies that d random public matrices are enough to build the proposed HIBE scheme in the standard model, compared with the case in which 2d such public matrices are needed in the scheme proposed at Crypto 2010 whose public key size is(2dm^2+ mn + m) log q. To reduce the message-ciphertext expansion factor of the proposed scheme to log q, the encryption algorithm of this scheme is built based on Gentry's encryption scheme, by which m^2 bits of plaintext are encrypted into m^2 log q bits of ciphertext by a one time encryption operation. Hence, the presented scheme has some advantages with respect to not only the public key size but also the message-ciphertext expansion factor. Based on the hardness of the learning with errors problem, we demonstrate that the scheme is secure under selective identity and chosen plaintext attacks. 展开更多
关键词 Hierarchical identity based encryption scheme Lattice-based cryptography Standard model Learning with errors problem GAUSSIAN
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部