您的位置: 专家智库 > >

国家自然科学基金(60972034)

作品数:9 被引量:14H指数:3
相关作者:曹珍富董晓蕾张磊曹锋张海更多>>
相关机构:上海交通大学上海立信会计学院更多>>
发文基金:国家自然科学基金国家重点基础研究发展计划上海市教育委员会重点学科基金更多>>
相关领域:自动化与计算机技术理学轻工技术与工程文化科学更多>>

文献类型

  • 6篇中文期刊文章

领域

  • 6篇自动化与计算...

主题

  • 2篇随机预言模型
  • 2篇签名
  • 2篇签名方案
  • 1篇大整数
  • 1篇大整数分解
  • 1篇代理
  • 1篇整数分解
  • 1篇身份签名
  • 1篇属性基加密
  • 1篇数字签名
  • 1篇双线性
  • 1篇双线性对
  • 1篇网络
  • 1篇网络安全
  • 1篇门限
  • 1篇门限代理
  • 1篇密码
  • 1篇密码学
  • 1篇可证安全
  • 1篇环签名

机构

  • 3篇上海交通大学
  • 1篇上海立信会计...

作者

  • 3篇曹珍富
  • 2篇董晓蕾
  • 1篇张海
  • 1篇曹锋
  • 1篇郭浩
  • 1篇张磊

传媒

  • 3篇Journa...
  • 2篇上海交通大学...
  • 1篇计算机工程

年份

  • 1篇2013
  • 1篇2011
  • 4篇2010
9 条 记 录,以下是 1-6
排序方式:
一个适合分布式网络的属性基加密方案被引量:2
2010年
阐述了分布式网络中用加密方法保护交换数据的必要性,结合Ganglia网络,提出了一个适合于分布式网络的基于属性的加密方案.与其他方案比较表明,本方案定长的密文、高效的加解密流程以及良好的灵活性等特点在实际部署引用中具有实用价值。
张磊曹珍富
关键词:网络安全密码学分布式网络
Fully Secure Revocable Attribute-Based Encryption被引量:3
2011年
Distributed information systems require complex access control which depends upon attributes of protected data and access policies.Traditionally,to enforce the access control,a file server is used to store all data and act as a reference to check the user.Apparently,the drawback of this system is that the security is based on the file server and the data are stored in plaintext.Attribute-based encryption(ABE) is introduced first by Sahai and Waters and can enable an access control mechanism over encrypted data by specifying the users’ attributes. According to this mechanism,even though the file server is compromised,we can still keep the security of the data. Besides the access control,user may be deprived of the ability in some situation,for example paying TV.More previous ABE constructions are proven secure in the selective model of security that attacker must announce the target he intends to attack before seeing the public parameters.And few of previous ABE constructions realize revocation of the users’ key.This paper presents an ABE scheme that supports revocation and has full security in adaptive model.We adapt the dual system encryption technique recently introduced by Waters to ABE to realize full security.
钱俊磊董晓蕾
关键词:REVOCATION
利用三次剩余构造的基于身份环签名方案
2013年
传统的基于身份环签名方案大多采用双线性配对实现,但配对方法的运算复杂度较高,会大幅降低签名方案的效率。为此,提出一种非配对的环签名方案。给出用于有效计算三次剩余3l次根的算法,在该算法的基础上生成签名密钥,并结合三次剩余理论构造基于身份的环签名方案。分析结果表明,在大整数分解困难问题的假设前提下,该方案在随机预言模型下被证明是选择消息和身份安全的。同时,该方案也满足签名者无条件匿名性。
郭浩董晓蕾曹珍富
关键词:基于身份签名环签名大整数分解随机预言模型可证安全
Analysis and Enhancement of a Watermarking Protocol Suitable for Web Context被引量:1
2010年
A buyer-seller watermarking protocol is a combination of traditional watermarking and fingerprinting techniques. Recently, Frattolillo proposed such a watermarking protocol suitable for web context. Frattolillo’s scheme has two problems which would make it hard to implement practically. Several possible solutions to the two problems are presented in this paper.
曾鹏曹珍富林煌
A New Buyer-Seller Watermarking Protocol Without Double Embedding
2010年
Copy deterrence is a digital watermarking application which enables a seller to identify the buyers who obtain digital content legally but illegally redistribute it. However, in many buyer-seller watermarking protocols proposed for copy deterrence, the seller has to embed two watermarks into each copy of the digital content before it is sold. In this paper, we propose a new buyer-seller watermarking protocol in which the seller can reduce the number of the embedded watermarks from two to one. The proposed protocol also provides a more efficient solution to the unbinding problem than that of Lei et al’s scheme.
曾鹏曹珍富林煌
无随机预言模型的(t,k,l)-门限代理签名方案被引量:1
2010年
推广了(t,l)-门限代理签名概念,提出了(t,k,l)-门限代理签名.在一个(t,k,l)-门限代理签名中,由指定的l个代理签名者构成的群体必须要求有至少k个人的合作才能生成代理签名,同时方案中最多允许参与的t-1个人合谋.给出了第1个门限代理签名方案存在性不可伪造的安全性模型,提出了一个基于CDH问题的(t+1,2t+1,l)-门限代理签名方案,并且在无随机预言机的模型下证明了该方案是存在性不可伪造的,同时还具有可区分性和代理保护等性质.
张海董晓蕾曹珍富曹锋
关键词:数字签名门限代理双线性对
共1页<1>
聚类工具0