全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

多域环境下基于代理重加密的电子文档分发协议

DOI: 10.13190/jbupt.201205.81.yanxx, PP. 81-84

Keywords: 代理重加密,域分发,电子文档

Full-Text   Cite this paper   Add to My Lib

Abstract:

针对多域环境下电子文档安全管理,提出一种基于代理重加密机制的电子文档分发协议.该协议中引入代理服务器,由文档拥有者将数据加密后发送给半可信服务端,服务端对数据密文进行安全存储,同时对数据密文重加密后发送给用户.该方案避免了服务端对数据密文解密后进行二次加密,降低了服务端对电子文档管理的复杂度,同时采用密文方式存储,以防止服务器被恶意攻击后敏感数据泄露.与其他协议对比结果表明,新方案显著降低了代理重加密算法的计算复杂度,同时提高了加解密效率,保持了敏感数据机密性.

References

[1]  Matt B,Gerrit B,Martin S. Divertible protocols and atomic proxy cryptography//Advances in Cryptology-EUROCRYPT1998,International Conference on the Theory and Application of Cryptographic Techniques. Espoo: LNCS1403, 1998: 127-144.
[2]  Gelareh T, Alvaro A C, Virgil D G. Towards a secure and interoperable DRM architecture//Proceedings of the 6th ACM workshop on Digital Rights Management. New York: ACM Press, 2006: 69-78.
[3]  Do W N, Jung S L, Jeong H K. Interlock system for DRM interoperability of streaming contents//Proceedings of IEEE International Symposium on Consumer Electronics 2007 (ISCE 2007). Irving,TX: IEEE Press, 2007: 1-4.
[4]  Sangho L, Heejin P, Jong K. A secure and mutual-profitable DRM interoperability scheme//Computers and Communications (ISCC). Riccione: , 2010: 75-80.
[5]  Qiu Qin,Tang Zhi,Yu Yinyan.A decentralized authorization scheme for DRM in P2P file-sharing systems//Consumer Communications and Networking Conference(CCNC). Las Vegas:IEEE Press,2011:136-140.
[6]  Libert B, Vergnaud D. Unidirectional chosen-ciphertext secure proxy re-encryption [J]. IEEE Transactions on Information Theory, 2011, 57(3):1786-1802.
[7]  Shao Jun, Liu Peng, Zhou Yuan. Achieving key privacy without losing CCA security in proxy re-encryption [J]. Journal of Systems and Software,2012,85(3):655-665.
[8]  Chen Minrong, Zhang Xi. Comments on Shao-Caos unidirectional proxy re-encryption scheme from PKC 2009 [J].China Communications,2011,8(2):66-74.
[9]  邵俊.代理重加密的研究.上海: 上海交通大学, 2008.
[10]  Weng Jian, Chen Minrong, Yang Yanjiang. CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles [J]. Science China-Information Sciences, 2010, 53(3):593-606.

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133