期刊文献+

大数据环境下密码技术的研究 被引量:1

Research on Cryptography Technology in Big Data Environment
下载PDF
导出
摘要 随着整个社会信息化进程的持续发展,越来越多的智能终端被人们使用,与之而来产生的数据量愈发庞大,促进了大数据时代的到来。大数据对整个国家、社会的各个行业具有巨大的推动作用,但是也带来了严峻的问题——用户个人隐私泄露问题,而个人的隐私安全涉及到国家的社会安全、政治安全和军事安全等。因此,针对大数据隐私保护问题,分析大数据环境下的安全风险,结合可搜索加密、全同态加密、安全多方计算等技术,对大数据环境下的密码领域进行总结分析和应用前景探讨。 With the continuous development of while social information process,more and more intelligent terminals are used by people,and the amount of data generated therefrom is becoming more and more huge,which promotes the arrival of the era of big data.Big data has a huge role in promoting the whole country and all sectors of society,but it also brings serious problems:the leakage of users’personal privacy,which involves the social security,political security and military security of the country.Therefore,in view of the privacy protection of big data,this paper analyzes the security risks in the big data environment and discusses its application prospects by combining with searchable encryption,fully homomorphic encryption,secure multi-party computing and other technologies.
作者 黄益盛 刘贺 杨竞 王小骥 刘星江 HUANG Yi-sheng;LIU He;YANG Jing;WANG Xiao-ji;LIU Xing-jiang(No.30 Institute of CETC,Chengdu Sichuan 611041,China)
出处 《通信技术》 2020年第8期2040-2044,共5页 Communications Technology
关键词 大数据 可搜索加密 全同态加密 安全多方计算 big data searchable encryption fully homomorphic encryption secure multiparty computation
  • 相关文献

参考文献2

二级参考文献49

  • 1Song XD,Wagner D,Perrig A.Practical techniques for searches on encrypted data.In:Proc.of the IEEE Symp.on Security and Privacy.IEEE Press,2000.44-55.[doi:10.1109/SECPRI.2000.84B445]. 被引量:1
  • 2Boneh D,Di Crescenzo G,Ostrovsky R,Persiano G.Public key encryption with keyword search.In:Camenisch LJ,Cachin C,eds.Proc.of the Advances in Cryptology-EUROCRYPT 2004.LNCS 3027,Berlin:Springer-Verlag,2004.506-522.[doi:10.1007/978-3-540-24676-3J0]. 被引量:1
  • 3Feng DG,Zhang M,Zhang Y,Xu Z.Study on cloud computing security.Ruan Jian Xue Bao/Joumal of Softwase,2011,22(1):71-83(in Chinese with English abstract).http://www.jos.org.cn/1000-9B25/3958.htxn[doi:10.3724/SP.J.1001.2011.03958]. 被引量:1
  • 4Goh E.Secure indexes.Technical Report,20037216,IACR ePrint Cryptography Archive,2003.http://eprinUacr.org/2003/216. 被引量:1
  • 5Chang Y,Mitzenmacher M.Privacy preserving keyword searches on remote encrypted data.In:Ioannidis J,Keromytis A,Yung M,eds.Proc.of the Applied Cryptography and Network Security.LNCS 3531,Berlin:Springer-Verlag,2004.391-421.[doi:10.1007/11496137一30]. 被引量:1
  • 6Curtmola R,Garay J,Kamara S,Ostrovsky R.Searchable symmetric encryption:Improved definitions and efficient constructions.In:Proc.of the 13th ACM Conf.on Computer and Communications Security (CCS 2006).New York:ACM Press,2006.79-88. 被引量:1
  • 7Van Liesdonk P,Sedghi S,Doumen J,Hartel P,Jonker W.Computationally efficient searchable symmetric encryption.In:Jonker W,Petkovic M,eds.Proc.of the Secure Data Management.LNCS 6358,Berlin;Springer-Verlag,2010,87-100.[doi:10.1007/978-3-642-15546-8-7]. 被引量:1
  • 8Kamara S,Papamanthou C,Roeder T.Dynamic searchable symmetric encryption.In:Proc.of the 19th ACM Conf.on Computer and Communications Security (CCS 2012).New York:ACM Press,2012.965-976.[doi;10.1145/2382196.2382298]. 被引量:1
  • 9Kamara S,Papamanthou C.Parallel and dynamic searchable symmetric encryption.In:Sadeghi AR,ed.Proc.of the Financial Cryptography and Data Security.LNCS 7859,Berlin:Springer-Verlag,2013.258-274.[doi:10.1007/978-3-642-39884-122]. 被引量:1
  • 10Golle P,Staddon J,Waters B.Secure conjunctive keyword search over encrypted data.In:Jakobsson Mj Yung M,Zhou J,eds.Proc.of the Applied Cryptography and Network Security.LNCS 3089,Berlin:Springer-Verlag,2004.31-45.[doi:10.1007/978-3-540-24852-1一3]. 被引量:1

共引文献79

同被引文献70

引证文献1

二级引证文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部