首页 | 官方网站   微博 | 高级检索  
     

可信数据库环境下无证书认证的可信密钥共享
引用本文:程芳权,彭智勇,宋伟,任毅.可信数据库环境下无证书认证的可信密钥共享[J].计算机科学与探索,2010,4(9):791-802.
作者姓名:程芳权  彭智勇  宋伟  任毅
作者单位:1. 武汉大学,计算机学院,武汉,430072
2. 通信指挥学院,网络管理中心,武汉,430010
基金项目:The National Natural Science Foundation of China under Grant No.90718027,the China Postdoctoral Science Foundation under Grant No.20100471145,the Fundamental Research Funds for the Central Universities under Grant No.6082011;6082024,the Open Research Foundation of State Key Laboratory of Ministry of Education of China(国家教育部重点实验室开放基金):the Natural Science Foundation of Hubei Province of China under Grand No.2008CDA007,the Self-Research Program for Doctoral Candidate(including Mphil-Ph.D.)of Wuhan University under Grant No.20082110101000038 
摘    要:基于DAS模型的可信数据库环境下,数据拥有者将数据加密以后存储于第三方数据库服务提供商,数据拥有者与被授权用户间的可信数据共享本质上是数据密钥的可信共享。现有的DAS模型中密钥管理方法的安全落脚点都是假设数据拥有者与各用户能事先分别安全共享一个用户密钥,而在可信数据库环境下如何进行数据拥有者与用户间的可信用户密钥共享却是一个未解决的问题。基于无证书签名认证机制,提出了一种可信数据库环境下的可信用户密钥共享协议,并对该协议的有效性和安全性进行了分析。该协议完全无需安全传输通道和可信第三方作为支撑,且有较好的执行效率;同时基于DL问题、Inv-CDH问题、q-StrongDH问题等数学难题,该协议被证明能有效抵御无证书安全模型下的各种攻击。

关 键 词:可信数据库  数据库外包服务  可信密钥共享  无证书  可信数据共享
修稿时间: 

Certificateless Authentication for Trusted Key Sharing in Trusted Database
CHENG Fangquan,PENG Zhiyong,SONG Wei,REN Yi.Certificateless Authentication for Trusted Key Sharing in Trusted Database[J].Journal of Frontier of Computer Science and Technology,2010,4(9):791-802.
Authors:CHENG Fangquan  PENG Zhiyong  SONG Wei  REN Yi
Affiliation:1. Computer School, Wuhan University, Wuhan 430072, China 2. Network Management Center, Communication and Commanding Academy, Wuhan 430010, China
Abstract:Trusted database based on database as a service(DAS), in which data owner(DO) stores the cryptographic data in the database service provider, and the key factor is trusted sharing key in trusted sharing data between DO and authorized users. The security of the existing key management approach depends on beforehand securely sha- ring the user key between DO and authorized users in DAS, however, which is an unsolved problem in trusted database yet. This paper proposes a trusted key distribution protocol which provides trusted sharing data between DO and authorized users based on certificateless authentication schema, and gives the analysis of validity and security. The protocol is independent to the security transmission channels and trusted third party, and is proved to be security based on discrete logarithm (DL) problem, inverse Diffie-Hellman (Inv-CDH) problem and q-Strong DH problem.
Keywords:trusted database  database as a service (DAS)  trusted key sharing  certificateless  trusted data sharing
本文献已被 CNKI 维普 万方数据 等数据库收录!
点击此处可从《计算机科学与探索》浏览原始摘要信息
点击此处可从《计算机科学与探索》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号