您的位置: 专家智库 > >

国家自然科学基金(60873229)

作品数:7 被引量:25H指数:4
相关作者:刘胜利更多>>
相关机构:上海交通大学更多>>
发文基金:国家自然科学基金上海市青年科技启明星计划更多>>
相关领域:自动化与计算机技术电子电信更多>>

文献类型

  • 5篇期刊文章
  • 1篇会议论文

领域

  • 6篇自动化与计算...
  • 1篇电子电信

主题

  • 2篇签名
  • 2篇签名方案
  • 2篇密钥绝缘
  • 2篇IDENTI...
  • 2篇KEY-IN...
  • 1篇代理
  • 1篇代理签名
  • 1篇选择密文攻击
  • 1篇证书管理
  • 1篇私人密钥
  • 1篇签名者
  • 1篇去中心化
  • 1篇中心化
  • 1篇密文
  • 1篇密钥托管
  • 1篇密钥系统
  • 1篇加密
  • 1篇公开密钥
  • 1篇分布式
  • 1篇分布式存储

机构

  • 1篇上海交通大学

作者

  • 1篇刘胜利

传媒

  • 2篇Journa...
  • 1篇计算机工程
  • 1篇Journa...
  • 1篇Journa...

年份

  • 2篇2012
  • 1篇2010
  • 3篇2009
7 条 记 录,以下是 1-6
排序方式:
Dynamic Provable Data Possession with Batch-Update Verifiability
Cloud storage security has drawn more and more concerns in Cloud Computing literatures.The Provable Data Posse...
Wang Junxiang Department of Computer Science and Engineering Shanghai Jiao Tong University Shanghai
文献传递
An Identity-Based Encryption Scheme with Compact Ciphertexts
2009年
This paper proposes an identity-based encryption scheme with the help of bilinear pairings,where the identity information of a user functions as the user's public key.The advantage of an identity-based public key system is that it can avoid public key certificates and certificate management.Our identity-based encryption scheme enjoys short ciphertexts and provable security against chosen-ciohertext attack(CCA).
刘胜利郭宝安张庆胜
关键词:选择密文攻击公开密钥密钥系统证书管理
Certificateless key-insulated signature without random oracles被引量:5
2009年
Leakage of the private key has become a serious problem of menacing the cryptosystem security. To reduce the underlying danger induced by private key leakage, Dodis et al.(2003) proposed the first key-insulated signature scheme. To handle issues concerning the private key leakage in certificateless signature schemes, we devise the first certificateless key-insulated signature scheme. Our scheme applies the key-insulated mechanism to certificateless cryptography, one with neither certificate nor key escrow. We incorporate Waters (2005)’s signature scheme, Paterson and Schuldt (2006)’s identity-based signature scheme, and Liu et al.(2007)’s certificateless signature scheme to obtain a certificateless key-insulated signature scheme. Our scheme has two desirable properties. First, its security can be proved under the non-pairing-based generalized bilinear Diffie-Hellman (NGBDH) conjecture, without utilizing the random oracle model; second, it solves the key escrow problem in identity-based key-insulated signatures.
Zhong-mei WANXue-jia LAIJian WENGSheng-li LIUYu LONGXuan HONG
关键词:密钥绝缘签名方案密钥托管私人密钥
Strong Key-Insulated Signature in the Standard Model被引量:2
2010年
The only known construction of key-insulated signature(KIS) that can be proven secure in the standard model is based on the approach of using double signing. That is,the scheme requires two signatures:a signature with a master key and a signature with the signer's secret key. This folklore construction method leads to an ineffcient scheme. Therefore it is desirable to devise an effcient KIS scheme. We present the first scheme with such a construction. Our construction derives from some variations of the Waters' signature scheme. It is computationally effcient and the signatures are short. The scheme is provably secure based on the diffculty of computational Diffe-Hellman(CDH) problem in the standard model.
万中美来学嘉翁健刘胜利龙宇洪璇
关键词:KEY-INSULATEDKEYEXPOSUREBILINEARPAIRING
IDENTITY-BASED KEY-INSULATED PROXY SIGNATURE被引量:4
2009年
In proxy signature schemes,the proxy signer B is permitted to produce a signature on behalf of the original signer A. However,exposure of proxy signing keys can be the most devastating attack on a proxy signature scheme since any adversary can sign messages on behalf of the proxy signer. In this paper,we applied Dodis,et al.’s key-insulation mechanism and proposed an Identity-Based (ID-based) Key-Insulated Proxy Signature (IBKIPS) scheme with secure key-updates. The proposed scheme is strong key-insulated and perfectly key-insulated. Our scheme also supports unbounded period numbers and random-access key-updates.
Wan ZhongmeiLai XuejiaWeng JianLiu ShengliHong Xuan
关键词:代理签名密钥绝缘签名方案签名者
去中心化的安全分布式存储系统被引量:4
2012年
提出一种去中心化的安全分布式存储系统。通过公钥加密和单钥加密相结合的方法,提高存储数据的保密性。对每个数据源使用不同的对称密钥进行分布式加密,采用分布式纠删码对加密后的数据进行编码。使用RS多项式编码和List Decoding译码方法存储加密的对称密钥,以保证系统的鲁棒性。分析结果表明,该方案的计算复杂度较低。
贾亚茹刘向阳刘胜利
关键词:分布式存储加密
共1页<1>
聚类工具0