eaebhcm: an extended attribute encryption based hidden credentials model | |
Ge Wei-Jin ; Hu Xiao-Hui | |
刊名 | Tongxin Xuebao/Journal on Communications |
2012 | |
卷号 | 33期号:12页码:85-92 |
关键词 | 属性 加密 隐藏证书 信任协商 共谋 |
ISSN号 | 1000-436X |
中文摘要 | 基于身份加密体系的隐藏证书原始模型存在无法实现一对多的信息传输、对身份信息不具备容错功能且密文容易被共谋破解等缺点。提出的基于属性加密的隐藏证书扩展模型通过引入属性集合证书技术、基于加解密精度阈值等特性,解决了上述三个问题。在分析国内外相关研究进展的基础上,对扩展模型在体系架构、系统构造、双方信任协商协议、多方信任协商协议以及扩展模型解决复杂逻辑访问策略的方法等进行了详细的阐述,并对扩展模型的安全性进行了分析。通过一个典型的应用场景,对比分析了新旧隐藏证书技术在性能和安全性上的区别,阐明了扩展模型的优点。 |
英文摘要 | The identity-based encryption based hidden credentials has three problems that it can not supports 1-N communication, endures no identity fuzzy and lefts open to conspiracy crack. An extended attribute encryption based hidden credentials model (EAEBHCM) was presented in to solve these three issued which making use of attribute-set certificates and decryption accuracy threshold characteristics. After analyzed the relevant research, the architecture, the system structure, the two sides trust negotiation protocol, multi-party trust negotiation protocols and how the model to solve complex logical access policies of the extended model were described in detail. And the security of extended model was also analyzed. Through a typical access control scenario, the difference between old and new hidden credentials technology on the performance and security were analyzed, which clarified the advantages of the extended model. |
收录类别 | EI ; CNKI |
资助信息 | 国家高新技术研究发展计划(“863”计划)基金资助项目(SS2012AA010106) |
语种 | 中文 |
公开日期 | 2013-09-17 |
内容类型 | 期刊论文 |
源URL | [http://ir.iscas.ac.cn/handle/311060/15151] |
专题 | 软件研究所_软件所图书馆_期刊论文 |
推荐引用方式 GB/T 7714 | Ge Wei-Jin,Hu Xiao-Hui. eaebhcm: an extended attribute encryption based hidden credentials model[J]. Tongxin Xuebao/Journal on Communications,2012,33(12):85-92. |
APA | Ge Wei-Jin,&Hu Xiao-Hui.(2012).eaebhcm: an extended attribute encryption based hidden credentials model.Tongxin Xuebao/Journal on Communications,33(12),85-92. |
MLA | Ge Wei-Jin,et al."eaebhcm: an extended attribute encryption based hidden credentials model".Tongxin Xuebao/Journal on Communications 33.12(2012):85-92. |
个性服务 |
查看访问统计 |
相关权益政策 |
暂无数据 |
收藏/分享 |
除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。
修改评论