期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
基于经验模态分解的企业等值连接共享数据加密方法
1
作者 姜震 张勇 王莉 《信息技术》 2023年第11期120-125,共6页
为降低网络带来的企业等值连接共享数据泄露风险,研究基于经验模态分解的企业等值连接共享数据加密方法。依据哈希算法完成企业多路数据等值连接共享;使用经验模态分解将共享数据分解成多个IMF分量;通过基于同态加密和密钥共享的企业等... 为降低网络带来的企业等值连接共享数据泄露风险,研究基于经验模态分解的企业等值连接共享数据加密方法。依据哈希算法完成企业多路数据等值连接共享;使用经验模态分解将共享数据分解成多个IMF分量;通过基于同态加密和密钥共享的企业等值连接共享数据加密方法,使用公钥对第二个至最后一个IMF分量进行同态加密;利用私钥将加密结果解密后与第一个IMF分量相加,实现企业等值连接共享数据加密。实验结果表明:等值连接响应时间均在15~25s内,发生恶意攻击时,窃取密钥和正确密钥间的相关系数始终低于0.003。 展开更多
关键词 经验模态分解 企业等值连接 共享数据加密 IMF分量 同态加密
下载PDF
CDMA移动通信中的用户鉴权算法分析及研究 被引量:5
2
作者 严粤锋 《湖南科技学院学报》 2005年第5期178-180,共3页
CDMA移动通信的鉴权过程是通过交换移动台和基站之间的信息达到确认移动台身份的目的。本文主要介绍了应用鉴权的场合,并深入分析了鉴权算法,包括密钥生成技术和鉴权AUTHR计算。
关键词 共享加密数据 AUTHR CDMA 移动通信 用户 鉴权 密钥生成技术 算法分析
下载PDF
CDMA移动通信系统中用户鉴权算法的研究
3
作者 张勇 马争 《移动通信》 2004年第z1期122-125,共4页
本文介绍了CDMA移动通信系统中用户鉴权的原理、鉴权流程以及所涉及到的相关参数;分析了基于分组DES密钥的原理及设计原则;提出了对第二代移动通信系统鉴权算法中计算AUTHR值的改进新算法。同时分析了该算法的性能,并与目前第二代移动... 本文介绍了CDMA移动通信系统中用户鉴权的原理、鉴权流程以及所涉及到的相关参数;分析了基于分组DES密钥的原理及设计原则;提出了对第二代移动通信系统鉴权算法中计算AUTHR值的改进新算法。同时分析了该算法的性能,并与目前第二代移动通信系统的鉴权算法作了比较,说明了该算法的优越性。 展开更多
关键词 CDMA HASH函数 DES密钥 共享加密数据(SSD) 鉴权
下载PDF
Multi-Owner Keyword Search over Shared Data without Secure Channels in the Cloud
4
作者 Yilun Wu Xicheng Lu +3 位作者 Jinshu Su Peixin Chen Xiaofeng Wang Bofeng Zhang 《China Communications》 SCIE CSCD 2017年第5期124-133,共10页
Searchable encryption allows cloud users to outsource the massive encrypted data to the remote cloud and to search over the data without revealing the sensitive information. Many schemes have been proposed to support ... Searchable encryption allows cloud users to outsource the massive encrypted data to the remote cloud and to search over the data without revealing the sensitive information. Many schemes have been proposed to support the keyword search in a public cloud. However,they have some potential limitations. First,most of the existing schemes only consider the scenario with the single data owner. Second,they need secure channels to guarantee the secure transmission of secret keys from the data owner to data users. Third,in some schemes,the data owner should be online to help data users when data users intend to perform the search,which is inconvenient.In this paper,we propose a novel searchable scheme which supports the multi-owner keyword search without secure channels. More than that,our scheme is a non-interactive solution,in which all the users only need to communicate with the cloud server. Furthermore,the analysis proves that our scheme can guarantee the security even without secure channels. Unlike most existing public key encryption based searchable schemes,we evaluate the performance of our scheme,which shows that our scheme is practical. 展开更多
关键词 keyword search cloud security secure channels proxy re-encryption
下载PDF
A Practical Group Key Management Algorithm for Cloud Data Sharing with Dynamic Group
5
作者 Wei Song Hua Zou +1 位作者 Haowen Liu Jun Chen 《China Communications》 SCIE CSCD 2016年第6期205-216,共12页
Cloud data sharing service, which allows a group of people to work together to access and modify the shared data, is one of the most popular and efficient working styles in the enterprises. However, the cloud server i... Cloud data sharing service, which allows a group of people to work together to access and modify the shared data, is one of the most popular and efficient working styles in the enterprises. However, the cloud server is not completely trusted, and its security could be compromised by monetary reasons or caused by hacking and hardware errors. Therefore, despite of having advantages of scalability and flexibility, cloud storage service comes with privacy and the security concerns. A straightforward method to protect the user's privacy is to encrypt the data stored at the cloud. To enable the authenticated users to access the encrypted cloud data, a practical group key management algorithm for the cloud data sharing application is highly desired. The existing group key management mechanisms presume that the server is trusted. But, the cloud data service mode does not always meet this condition. How to manage the group keys to support the scenario of the cloud storage with a semi-trusted cloud server is still a challenging task. Moreover, the cloud storage system is a large-scale and open application, in which the user group is dynamic. To address this problem, we propose a practical group key management algorithm based on a proxy re-encryption mechanism in this paper. We use the cloud server to act as a proxy tore-encrypt the group key to allow authorized users to decrypt and get the group key by their private key. To achieve the hierarchical access control policy, our scheme enables the cloud server to convert the encrypted group key of the lower group to the upper group. The numerical analysis and experimental results further validate the high efficiency and security of the proposed scheme. 展开更多
关键词 proxy re-encryption group key management bilinear map encrypted cloud storage
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部