首页 | 本学科首页   官方微博 | 高级检索  
     

基于属性加密的隐藏证书扩展模型
引用本文:葛维进,程 权,胡晓惠,詹芊芊.基于属性加密的隐藏证书扩展模型[J].计算机科学,2011,38(7):55-57.
作者姓名:葛维进  程 权  胡晓惠  詹芊芊
作者单位:中国科学院软件研究所,北京,100190
基金项目:本文受闰防预研项目“网络互操作技术体制与平台研究”资助。
摘    要:当前基于身份加密体系的隐藏证书无法实现一对多的信息传输,对身份信息不具备容错功能,且密文容易被共谋破解,这些缺点导致其在实际应用中受到诸多限制.提出了基于属性加密的隐藏证书扩展模型,解决了原隐藏证书技术存在的上述问题,并在信任协商过程中保留了隐藏证书技术对于证书、资源和策略的隐藏和保护功能.在扩展模型中加密和解密都是基...

关 键 词:基于属性加密  隐藏证书  信任协商  共谋破解

Attribute Encryption Based Hidden Credentials Extended Model
GE Wei-jin,CHENG Quan,HU Xiao-hui,Zhan Qian-qian.Attribute Encryption Based Hidden Credentials Extended Model[J].Computer Science,2011,38(7):55-57.
Authors:GE Wei-jin  CHENG Quan  HU Xiao-hui  Zhan Qian-qian
Affiliation:(Institute of Software,Chinese Academy of Sciences,Beijing 100190,China)
Abstract:The current identity-based encryption based hidden credential can not support 1-N communication, endures no identity fuzzy and lefts open to conspiracy crack, which brings great limitation to its availability. In this paper, an attributcbased encryption based hidden credentials extended model was presented which solves those dilemmas of basic hidden credential system, meanwhile, the extended model keeps the advantages in protecting all the certificates, resources and strategics safe in trust negotiation. Since in AI3E system, each participant has and only has one attributcset certificate, the extended model significantly improves the efficiency of decryption process. On the other hand, through the random control in certificate issue process, the possibility of conspiracy crack is also eliminated. In addition, we described their performance, security and applications in detail. Finally, the farther research directions were suggested.
Keywords:Attributcbased encryption  Hidden credentials  hrust negotiation  Conspiracy crack
本文献已被 万方数据 等数据库收录!
点击此处可从《计算机科学》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号