期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
A practical and dynamic key management scheme for a user hierarchy 被引量:2
1
作者 JENG Fuh-gwo WANG Chung-ming 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2006年第3期296-301,共6页
In this paper, we propose a practical and dynamic key management scheme based on the Rabin public key system and a set of matrices with canonical matrix multiplication to solve the access control problem in an arbitra... In this paper, we propose a practical and dynamic key management scheme based on the Rabin public key system and a set of matrices with canonical matrix multiplication to solve the access control problem in an arbitrary partially ordered user hierarchy. The advantage is in ensuring that the security class in the higher level can derive any of its successor’s secret keys directly and efficiently and show it is dynamic while a new security class is added into or a class is removed from the hierarchy. Even the ex-member problem can be solved efficiently. Moreover, any user can freely change its own key for some security reasons. 展开更多
关键词 User hierarchy Key management Rabin public key Matrix multiplication
下载PDF
Novel Hyper-Combined Public Key Based Cloud Storage Key Management Scheme
2
作者 SONG Ningning CHEN Yucyun 《China Communications》 SCIE CSCD 2014年第A02期185-194,共10页
In order to ensure the security of cloud storage, on the basis of the analysis of cloud storage security requirements, this paper puts forward a kind of" hidden mapping hyper-combined public key management scheme... In order to ensure the security of cloud storage, on the basis of the analysis of cloud storage security requirements, this paper puts forward a kind of" hidden mapping hyper-combined public key management scheme based on the hyperelliptic curve crypto system, which is applicable to the distributed cloud storage. A series of operation processes of the key management are elaborated, including key distribution, key updating and key agreement, etc. Analysis shows that the scheme can solve the problem of large-scale key management and storage issues in cloud storage effectively. The scheme feathers high efficiency and good scalability. It is able to resist collusion attack and ensure safe and reliable service provided by the cloud storaee system 展开更多
关键词 cloud storage hyperelliptic curve combined public key key management hiddenmapping
下载PDF
拟议中的PKI
3
作者 南相浩 陈钟 《网络安全技术与应用》 2001年第7期6-11,共6页
PKI公钥构架(Public Key Infrastructure)的主要任务是在开放环境中为开放性业务提供数字签名服务.数字签名必然涉及到密钥管理,可以说PKI是公钥动态管理的一种标准化技术.当然,随着PKI的进展,其定义域也在扩展.PKI主要由两部分协议构成... PKI公钥构架(Public Key Infrastructure)的主要任务是在开放环境中为开放性业务提供数字签名服务.数字签名必然涉及到密钥管理,可以说PKI是公钥动态管理的一种标准化技术.当然,随着PKI的进展,其定义域也在扩展.PKI主要由两部分协议构成:制作协议和运行协议,二者都受策略支配.PKI的核心是证书,但其主体是运行协议.无论官方的密钥管理还是民间的密钥管理,动态分发的密钥管理机制都需要解决密钥的动态分发问题.因此,标准化的PKI,对官方或民间(企业)来说都是可接受的.其核心策略的差异主要体现在CA证书上. 展开更多
关键词 PKI 公钥密钥管理 数字签名 网络安全 计算机网络
原文传递
An Identity-Based Encryption Scheme with Compact Ciphertexts
4
作者 刘胜利 郭宝安 张庆胜 《Journal of Shanghai Jiaotong university(Science)》 EI 2009年第1期86-89,共4页
This paper proposes an identity-based encryption scheme with the help of bilinear pairings, where the identity information of a user functions as the user's public key. The advantage of an identity-based public key s... This paper proposes an identity-based encryption scheme with the help of bilinear pairings, where the identity information of a user functions as the user's public key. The advantage of an identity-based public key system is that it can avoid public key certificates and certificate management. Our identity-based encryption scheme enjoys short ciphertexts and provable security against chosen-ciphertext attack (CCA). 展开更多
关键词 identity-based encryption compact ciphertext ehosen-ciphertext attack (CCA)
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部