期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
New Identity Based Proxy Re-Encryption Scheme from Lattices 被引量:2
1
作者 Liqiang Wu Xiaoyuan Yang +1 位作者 Minqing Zhang Longfei Liu 《China Communications》 SCIE CSCD 2019年第10期174-190,共17页
Identity-Based Proxy Re-Encryption (IB-PRE) allows a semi-trusted proxy to convert the ciphertext encrypted under Alice’s identity into Bob’s ciphertext of the same message without leaking plaintext. Lattice-based c... Identity-Based Proxy Re-Encryption (IB-PRE) allows a semi-trusted proxy to convert the ciphertext encrypted under Alice’s identity into Bob’s ciphertext of the same message without leaking plaintext. Lattice-based cryptography enjoys potential resistance to quantum analysis and low computational complexity. A multi-hop and unidirectional IB-PRE from lattices is presented. We split the functions of decryption and ciphertext transformation separately, and design the double private keys mechanism, where two keys are generated for each user, one key is used to decrypt the ciphertext by Pre-Image Sampling technique, and the other is used to generate the re-encryption key by Bonsai Trees technique. The generation of the re-encryption key is non-interactive and collusion resistant. Moreover, its IND-sID-CPA security over the decisional Learning With Errors (LWE) assumption under the standard model is proved. Compared with some previous IBPRE schemes from Bilinear Pairings, the format of transformed ciphertext in our scheme remains unchanged, furthermore, it can also resist quantum analysis. Compared with some existing IB-PRE schemes from lattices with similar properties, the space of the message in our scheme is a vector of length l and the encryption process remains a lower encryption blowup factor. At last, a proof-of-concept implementation is provided. 展开更多
关键词 IB-PRE LATTICES BONSAI trees COLLUSION resistance
下载PDF
Blockchain-Based Secure Authentication Scheme for Medical Data Sharing
2
作者 Xu Cheng Fulong Chen +3 位作者 Dong Xie Hui Sun Cheng Huang Zhuyun Qi 《国际计算机前沿大会会议论文集》 2019年第1期409-411,共3页
Data security is vital for medical cyber physical system (MCPS). The decentralization feature of blockchain is helpful to solve the problem that the secure authentication process is highly dependent on the trusted thi... Data security is vital for medical cyber physical system (MCPS). The decentralization feature of blockchain is helpful to solve the problem that the secure authentication process is highly dependent on the trusted third party and implement data security transmission. In this paper, the blockchain technology is used to describe the security requirements in authentication process. A network model of MCPS based on blockchain is proposed. Through analysis of medical data storage architecture, data was ensured not to be tampered and trackable. The security threat was eliminated by bilinear mapping in the authentication process of medical data providers and users. The credibility problem of the trusted third party was avoided and the two-way authentication was realized between the hospital and blockchain node. The security analysis and performance test were carried out to verify the security and related performance of the authentication protocol. The results show that the MCPS based on blockchain realizes medical treatment data sharing, and meets safety requirements in the security authentication phase. 展开更多
关键词 CYBER Physical Systems Data SECURITY SHARING Blockchain DECENTRALIZATION feature SECURITY AUTHENTICATION
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部