期刊文献+

基于属性加密的数据共享管理研究

Research on Data Sharing Management Based on Attributebased Encryption
下载PDF
导出
摘要 数据在共享和使用中面临着恶意攻击、供应链漏洞、安全产品缺陷、技术人员窃取等安全威胁.采用认证网关和密码机对用户身份进行认证,并对数据进行机密性完整性保护,能够增加安全性.但还存在内部威胁,如管理员被收买或内部终端被黑客控制,绕过安全防护机制.针对这些威胁,提出了基于SM9属性加密封装密钥,实现数据共享应用中不出现明文数据、有效应对系统管理员窃密等内部威胁. Data sharing and applications are faced with malicious attacks,supply chain vulnerabilities,security product defects,technical personnel theft and other security threats.It can improve security by deploying a security authentication gateway and cryptographic server to authenticate user identity and protect data confidentiality and integrity.However,there are also internal threats.For example,the administrator being bought or the internal terminal is controlled by hackers,which will bypass these security protection mechanisms.In view of these threats,this paper proposes an attributebased encryption strategy to encapsulate the key based on SM9,so as to avoid the plaintext data in data sharing applications and effectively deal with internal threats such as theft by system administrators.
作者 王森 许涛 李金贵 Wang Sen;Xu Tao;Li Jingui(Department of Information and Network Security,State Information Center,Beijing 100045;Department of Public Technical Service,State Information Center,Beijing 100045)
出处 《信息安全研究》 CSCD 2023年第11期1061-1066,共6页 Journal of Information Security Research
关键词 数据安全 商用密码 身份认证 访问控制 数据加密 属性加密 SM9 data security commercial cryptography identity authentication access control data encryption attributebased encryption SM9
  • 相关文献

参考文献5

二级参考文献123

  • 1姜传贤,孙星明,易叶青,杨恒伏.基于JADE算法的数据库公开水印算法的研究[J].系统仿真学报,2006,18(7):1781-1784. 被引量:9
  • 2Yun A, Shi C, Kim Y. On protecting integrity and confidentiality of cryptographic file system for outsourced storage [C] //Proc of ACM Workshop Cloud Computing Security (CCSW 2009). New York: ACM, 2009:67-76. 被引量:1
  • 3Rackspace. JungleDisk [EB/OL]. 2010 [ 2011-01-09 ]. http://www, jungledisk, com/. 被引量:1
  • 4Vrable M, Savage S, Voelker G M. Cumulus: Filesystem Backup to the cloud [J]. ACM Trans on Storage, 2009, 5 (4): 1-28. 被引量:1
  • 5Cramer R, Shoup V. Design and analysis of practical public- key eneryption schemes secure against adaptive chosen ciphertext attack [J]. SIAM Journal on Computing, 2004, 33(1) : 167-226. 被引量:1
  • 6Hofheinz D, Eike K. Secure hybrid encryption from weakened key encapsulation [G] //LNCS 4622: Proc of CRYPTO 2007. Berlin: Springer,2007: 553-571. 被引量:1
  • 7Blaze M, Bleumer G, Strauss M. Divertible protocols and atomic proxy cryptography [G] //LNCS 1403: Proc of EUROCRYPT 1998. Berlin.. Springer, 1998:127-144. 被引量:1
  • 8Ateniese G, Fu K, Green M, et al. Improved proxy re- encryption schemes with applications to secure distributed storage [J]. ACM Trans on Information and System Security, 2006, 9(1): 1-30. 被引量:1
  • 9Green M, Ateniese G. Identity-based proxy re-encryption[G] //LNCS 4521: Proc of the 5th Applied Cryptography and Network Security Conf. Berlin: Springer, 2007: 288- 306. 被引量:1
  • 10Hohenberger S, Rothblum G, Shelat A, et al. Securely obfuscating reencryption [C] //Proc of the 4th Theory of Cryptography Conf. Berlin: Springer, 2007:233-252. 被引量:1

共引文献823

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部