期刊文献+

基于密文域敏感信息表征的隐私保护算法

Privacy Preserving Algorithm Based on Ciphertext Domain Sensitive Information Representation
下载PDF
导出
摘要 网络中提供身份信息的网络资源容易导致个人身份数据的泄露,为了保障身份信息安全,需要进行信息隐私保护设计,提出一种基于密文域敏感信息表征的隐私保护算法.采用双线性映射编码技术构建表征个人隐私信息的比特序列信息模型,提取比特序列信息的信息熵特征量,在密文域中对提取的特征量进行混沌加密设计.设计隐私保护敏感信息的密钥构造方案,运用到数字签名中,对每组信息进行分块加密和身份认证,实现隐私保护设计.仿真结果表明,采用该算法进行隐私保护,对用户敏感信息加密后的抗攻击性能较好,模型的可信度较高,具有较好的隐私保护能力. In the network to provide the identity information of cyber source may lead to leakage of personal identity data.In order to protect the identity of information security,it is necessary to design a privacy protection information,this study proposes a privacy protection algorithm based on cipher text domain sensitive information representation.The information bit sequence model of personal privacy information is characterized by bilinear mapping and encoding technology.The extraction of information entropy characteristic sequence of bits of information is carried out,in the domain of ciphertext the extracted characteristic quantity is designed for chaotic encryption.The design key construction programme for the privacy protection of sensitive information,is used in digital signatures,for each information block encryption and authentication,protecting the privacy.The simulation results show that by using the algorithm for protecting privacy,the anti attack performance of user sensitive information encrypted is great,and the model credibility is high.The algorithm has a good ability of privacy preserving.
作者 董冰 DONG Bing(Institute of Geogaphical Sciences,Henan Academy of Sciences,Zhengzhou 450052,China)
出处 《河南科学》 2024年第2期209-215,共7页 Henan Science
关键词 隐私保护 密文域 敏感信息 数据加密 密钥 privacy protection ciphertext domain sensitive information data encryption key
  • 相关文献

参考文献12

二级参考文献102

  • 1谭丽娟,陈运.模逆算法的分析、改进及测试[J].电子科技大学学报,2004,33(4):383-386. 被引量:10
  • 2张文芳,何大可,王小敏,郑宇.基于新型秘密共享方法的高效 RSA 门限签名方案[J].电子与信息学报,2005,27(11):1745-1749. 被引量:4
  • 3沈晴霓,卿斯汉,贺也平,李丽萍.一种支持动态调节的最小特权安全策略架构[J].电子学报,2006,34(10):1803-1808. 被引量:1
  • 4金晨辉,郑浩然,张少武,等.密码学[M].北京:高等教育出版社,2009. 被引量:17
  • 5Dong X,Halevy A.Indexing dataspaces[A].Proceedings ofthe 2007 ACM SIGMOD International Conference on Man-agement of Data[C].Beijing,China:ACM,2007.43-54. 被引量:1
  • 6Fletcher G H,Van B J,Van G D,et al.Towards a theory ofsearch queries[A].Proceedings of the 12th International Con-ference on Database Theory[C].Saint Petersburg,Russia:ACM,2009.201-211. 被引量:1
  • 7Salles M,Dittrich J,Blunschi L.Intensional associations indataspaces[A].Proceedings of the 26th International Confer-ence on Data Engineering[C].Long Beach,USA:IEEE,2010.984-987. 被引量:1
  • 8Franklin M,Halevy A,Maier D.From databases to dataspaces:a new abstraction for information management[J].ACM SIG-MOD Record,2005,34(4):27-33. 被引量:1
  • 9HalevyA,Franklin M,Maier D.Principles ofdataspace systems[A].Proceedings of 25th ACM SIGMOD-SIGACT-SIGARTSymposium on Principles of Database Systems[C].Chicago,IL,United States:Association for Computing Machinery,2006.1-9. 被引量:1
  • 10Jin L,Zhang Y,Ye X.An extensible data model with securitysupport for dataspace management[A].Proceedings of 10thIEEE International Conference onHigh Performance ComputingandCommunications[C].Dalian,China:IEEE,2008.556-563. 被引量:1

共引文献227

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部