排序方式: 共有191条查询结果,搜索用时 15 毫秒
71.
可验证定时签名(VTS)方案允许在给定的时间内对已知消息上的签名进行锁定,在执行时间为T的顺序计算后,任何人都可从时间锁(time-lock)中提取出该签名.可验证性保证了在无需解开时间锁的情况下,任何人都可以公开地验证时间锁中是否包含已知消息上的合理签名,且可以在执行时间T的顺序计算后获得该签名.提出了可验证的属性基定时签名(verifiable attribute-based timed signatures,VABTS)概念,并给出了一个可撤销和可追溯的VABTS方案(RT-VABTS)的具体构造.RT-VABTS方案可同时支持签名者身份隐私保护、动态的用户撤销、可追溯性和定时性,并能解决属性基密码中的密钥托管问题.VABTS具有非常广阔的应用前景,特别列举了VABTS的两种应用场景:构建准入区块链中隐私保护的支付通道网络和实现公平的隐私多方计算.最后,通过形式化的安全性分析和性能评估证明实例化的RT-VABTS方案是安全且高效的. 相似文献
72.
Long LI Jianbo HUANG Liang CHANG Jian WENG Jia CHEN Jingjing LI 《Frontiers of Computer Science》2023,17(5):175814
Since smartphones embedded with positioning systems and digital maps are widely used, location-based services (LBSs) are rapidly growing in popularity and providing unprecedented convenience in people’s daily lives; however, they also cause great concern about privacy leakage. In particular, location queries can be used to infer users’ sensitive private information, such as home addresses, places of work and appointment locations. Hence, many schemes providing query anonymity have been proposed, but they typically ignore the fact that an adversary can infer real locations from the correlations between consecutive locations in a continuous LBS. To address this challenge, a novel dual privacy-preserving scheme (DPPS) is proposed that includes two privacy protection mechanisms. First, to prevent privacy disclosure caused by correlations between locations, a correlation model is proposed based on a hidden Markov model (HMM) to simulate users’ mobility and the adversary’s prediction probability. Second, to provide query probability anonymity of each single location, an advanced k-anonymity algorithm is proposed to construct cloaking regions, in which realistic and indistinguishable dummy locations are generated. To validate the effectiveness and efficiency of DPPS, theoretical analysis and experimental verification are further performed on a real-life dataset published by Microsoft, i.e., GeoLife dataset. 相似文献
73.
74.
为了解决传统广义指定验证者签名证明方案中强隐私保护性质对验证者不公平的问题,提出了可追溯的广义指定验证者签名证明(traceable universal designated verifier signature proof,TUDVSP)方案.在TUDVSP方案中,引入一个追溯中心,可将指定者的转换签名恢复为原始签名,从而防止签名者与指定者合谋欺骗验证者.基于现实应用考虑,从不可伪造性、抗仿冒攻击和可追溯性这3个方面定义了TUDVSP方案的安全模型.利用双线性映射构造具体的TUDVSP方案,并证明该方案具有不可伪造性、抗仿冒攻击和可追溯性.实验结果表明,完成一次签名追溯仅需21 ms左右的计算开销与120字节的通信开销. 相似文献
75.
随着云计算的不断普及,隐私安全问题逐渐显现,已成为制约云计算发展的重要障碍。受经济社会“问责制”的启发,从规范和约束云参与者隐私行为的角度,针对云参与者的隐私违约认定的问题,进行了基于审查对象隐私行为挖掘的研究。对隐私日志行为数据进行预处理,采用夹角余弦法来定义任意两个隐私会话之间的相似度并构建云隐私间的相似度矩阵,选择K-均值聚类算法对隐私会话基于设置的云隐私规则进行相似度聚类。实验测试结果表明所提出的隐私聚类挖掘技术能够精确地对云系统隐私行为及其相似度进行识别并聚类。 相似文献
76.
保密点积协议是许多安全多方计算问题中一个重要的协议,常被用在许多保密数据挖掘协议中,为这些协议提供了重要的安全保证。目前,一些已存在的保密点积协议至多在半诚实模型下是安全的。基于一些基本的密码学技术设计了一个恶意模型下安全的保密两方共享点积协议,这个协议比以往协议具有更高的安全性。该协议潜在的应用领域是广阔的,如计算Euclidean距离、保密计算几何、保密协作统计分析等。 相似文献
77.
78.
With the rapid development of cloud computing and Internet of Things (IoT) technology, massive data raises and shuttles on the network every day. To ensure the confidentiality and utilization of these data, industries and companies users encrypt their data and store them in an outsourced party. However, simple adoption of encryption scheme makes the original lose its flexibility and utilization. To address these problems, the searchable encryption scheme is proposed. Different from traditional encrypted data search scheme, this paper focuses on providing a solution to search the data from one or more IoT device by comparing their underlying numerical values. We present a multi-client comparable search scheme over encrypted numerical data which supports range queries. This scheme is mainly designed for keeping the confidentiality and searchability of numeric data, it enables authorized clients to fetch the data from different data owners by a generated token. Furthermore, to rich the scheme’s functionality, we exploit the idea of secret sharing to realize cross-domain search which improves the data’s utilization. The proposed scheme has also been proven to be secure through a series of security games. Moreover, we conduct experiments to demonstrate that our scheme is more practical than the existed similar schemes and achieves a balance between functionality and efficiency. 相似文献
79.
80.