期刊文献+

适用于GlusterFS系统的多PKG广义签密方案

Multiple PKG Generalized Signcryption Scheme for GlusterFS
下载PDF
导出
摘要 当前的GlusterFS分布式存储系统中的文件共享方式由于信息机密性较低且不具备身份签名机制,因此提出利用多PKG广义签密方案生成的私钥不完全依赖于第三方,在完成GlusterFS分布式存储系统中文件加密的同时还提供有效的签名,可以有效防止私钥泄露.在解密过程中,客户端可以通过对应的私钥解密GlusterFS分布式存储系统中的对应资源,获取相应的明文信息,而非集群中全部资源,可实现有效访问.在本方案中,使用随机模型下的BDH假设证明了方案选取密文攻击的安全性,与基于身份广义签密方案在分布式系统中的应用相比,具有更高的安全性. The file sharing method in the current GlusterFS distributed storage system has low information confidentiality and does not have the identity signature mechanism.Therefore,the private key generated by the multi-PKG generalized signcryption scheme is not completely dependent on the third party.The file encryption in the GlusterFS distributed storage system also provides an effective signature,which can effectively prevent the leakage of the private key.In the decryption process,the client can decrypt the corresponding resources in the GlusterFS distributed storage system through the corresponding private key to obtain the corresponding plaintext information,rather than all the resources in the cluster,which can achieve effective access.In this scheme,the security of the chosen ciphertext attack is proved by using the BDH assumption in the random model.Compared with the application of identity-based generalized signcryption scheme in distributed systems,it has higher security.
作者 解则翠 陈红 XIE Ze-cui;CHEN Hong(School of Network and Information Security,Jiangsu College of Safety Technology,Xuzhou 221004,Jiangsu,China)
出处 《兰州文理学院学报(自然科学版)》 2023年第4期40-45,共6页 Journal of Lanzhou University of Arts and Science(Natural Sciences)
基金 江苏省基金项目(2023SJYB1198) 徐州市基金项目(22XSZ-59)。
关键词 广义签密 GlusterFS 分布式文件系统 多PKG generalized signcryption GlusterFS distributed file system multiple PKGs
  • 相关文献

参考文献12

二级参考文献72

  • 1李发根,胡予濮,李刚.一个高效的基于身份的签密方案[J].计算机学报,2006,29(9):1641-1647. 被引量:73
  • 2韩益亮,杨晓元.ECDSA可公开验证广义签密[J].计算机学报,2006,29(11):2003-2012. 被引量:29
  • 3Desmedt Y.. Some recent research aspects of threshold cryptography. In: Okamoto E., Davida G., Mambo M. eds.. Information Security. Lecture Notes in Computer Science 1396. Berlin: Springer-Verlag. 1997, 158~173. 被引量:1
  • 4Canetti R., Gennaro R., Jarecki S., Krawczyk H., Rabin T.. Adaptive security for threshold cryptosystems. In: Wiener M.ed..Proceedings of Advances in Cryptology-CRYPTO'99. Berlin: Springer-Verlag, 1999, 98~115. 被引量:1
  • 5Needham R., Schroeder M.. Using encryption for authentication in large networks of computers. Communications of the ACM, 1978, 21(12): 993~999. 被引量:1
  • 6Bellare M., Rogaway P.. Provably secure session key distribution--The three party case. In: Proceedings of the 27th Annual ACM Symposium on the Theory of Computing, Las Vegas, Nevada, USA, 1995, 57~66. 被引量:1
  • 7Naor M., Pinkas B., Reingold O.. Distributed pseudo-random functions and KDCs. In: Jacques ed.. Advances in Cryptology-Eurocrypt'99. Lecture Notes in Computer Science 1592. Berlin: Springer-Verlag, 1999, 327~346. 被引量:1
  • 8Daza V., Herranz J., Padro C., Saez G.. A distributed and computationally secure key distribution scheme. In: Chan A.H., Gliger V.eds.. Information Security. Lecture Notes in Computer Science 2433. Berlin: Springer, 2002, 342~356. 被引量:1
  • 9Zheng Y.. Digital signcryption or how to achieve cost(signature& encryption). 被引量:1
  • 10Zheng Y., Imai H.. Using signcryption to build compact and unforgeable key establishment over an ATM network. In: Proceedings of IEEE INFOCOM'98, San Francisco, CA, USA, 1998, 411~418. 被引量:1

共引文献338

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部