浏览全部资源
扫码关注微信
1. 海军工程大学 信息安全系,湖北 武汉430033
2. 海军计算技术研究所,北京 100841
[ "郭威(1990-),男,安徽涡阳人,海军工程大学硕士生,主要研究方向为军事密码学。" ]
[ "周学广[通信作者](1966-),男,江苏高邮人,海军工程大学教授、博士生导师,主要研究方向为信息安全与密码学。E-mail:zxg196610@hotmail.com。" ]
[ "瞿成勤(1964-),男,安徽安庆人,海军工程大学高级工程师,主要研究方向为军事密码学。" ]
[ "罗芳(1984-),女,江西吉安人,海军工程大学讲师,主要研究方向为信息安全与密码学。" ]
[ "纪祥君(1990-),男,北京人,海军计算技术研究所工程师,主要研究方向为信息安全与密码学。" ]
网络出版日期:2015-11,
纸质出版日期:2015-11-25
移动端阅览
郭威, 周学广, 瞿成勤, 等. 基于CP-ABE的编队跨域通信方案研究[J]. 通信学报, 2015,36(Z1):250-258.
Wei GUO, Xue-guang ZHOU, Cheng-qin QU, et al. Naval fleet across-domain communication scheme based on CP-ABE[J]. Journal on communications, 2015, 36(Z1): 250-258.
郭威, 周学广, 瞿成勤, 等. 基于CP-ABE的编队跨域通信方案研究[J]. 通信学报, 2015,36(Z1):250-258. DOI: 10.11959/j.issn.1000-436x.2015306.
Wei GUO, Xue-guang ZHOU, Cheng-qin QU, et al. Naval fleet across-domain communication scheme based on CP-ABE[J]. Journal on communications, 2015, 36(Z1): 250-258. DOI: 10.11959/j.issn.1000-436x.2015306.
属性基加密机制(ABE
attribute-based encryption)能够细粒度地实现敏感数据的访问控制以及一对多保密通信。代理重加密技术能够实现跨域数据密文的转换。针对舰艇编队一对多跨域指挥和舰艇随遇接入的实际需求,在 ABE 机制和代理重加密技术的基础上,提出了一种基于密文策略(CP
cipher policy)的属性基加密机制(CP-ABE)的编队跨域通信方案
给出了具体案例,进行了安全性分析。分析表明该方案能够满足编队内一对多通信和舰艇跨域的通信安全需求,并同时满足了舰艇随遇接入的需求。
Attribute-based encryption (ABE) provides a fine-grained access control mechanism and it can realize one-to-many secure communication.Proxy re-encryption can transform an encrypted data to another kind encrypted between different domains.Aiming at the demand of secure communication of across-domain naval fleet
a scheme that based on CP-ABE was proposed.At last
a security analysis of this scheme and an example of the scheme were proposed.This scheme combining the technology of ABE and proxy re-encryption realizes a secure communication of across-domain naval fleet and one-to-many secure communication among the naval fleet.At the meantime
it meets the needs of meet and access of vessel.
SHAMIR A . Identity based cryptosystems and signature schemes [A ] . Advances in Cryptology-Crypto 1984,Lecture Notes in Computer Science [C ] . 1984 . 47 - 53 .
SAHAI A , WATERS B . Fuzzy identity-based encryption [A ] . Advances in Cryptology-EUROCRYPT 2005 [C ] . Berlin,Heidelberg : SpringerVerlag , 2005 . 457 - 473 .
冯登国 , 陈成 . 属性密码学研究 [J ] . 密码学报 , 2014 , 1 ( 1 ): 1 - 12 .
FENG D G , CHEN C . Research on attribute-based cryptography [J ] . Journal of Cryptologic Research , 2014 , 1 ( 1 ): 1 - 12 .
MATT B , GERRIT B , MARTIN S . Divertible protocols and atomic proxy cryptography [A ] . EUROCRYPT1998 [C ] . 1998 . 127 - 144 .
TABAN G A A C´ , GLIGOR V D . Towards a secure and interoperable DRM architecture [A ] . Proceedings of the 6th ACM Workshop on Digital Rights Management [C ] . 2006 . 69 - 78 .
闫玺玺 , 马兆丰 , 杨义先 , 等 . 多域环境下基于代理重加密的电子文档分发协议 [J ] . 北京邮电大学学报 , 2012 , 35 ( 5 ): 81 - 84 .
YAN X X , MA Z F , YANG Y X , et al . A distribution protocol based on proxy re-encryption in domain environment of E-document management [J ] . Journal of Beijing University of Posts and Telecommunications , 2012 , 35 ( 5 ): 81 - 84 .
MATTHEW P , PATRICK T , PATRICK M , BRENT W . Secure attribute-based systems [J ] . Journal of Computer Security , 2010 , 18 ( 5 ): 799 - 837 .
YU S C , WANG C , REN K . Attribute based data sharing with attribute revocation [A ] . Proc of the ASIAN ACM Conf on Computer and Communications Security (ASIACCS 2010) [C ] . New York , 2010 . 262 - 270 .
LIU Q , WANG G J , WU J . Time-based proxy re-encryption scheme for secure data sharing in a cloud environment [J ] . Information sciences , 2014 ,( 258 ): 355 - 370 .
李强 , 冯登国 , 张立武 , 等 . 标准模型下增强的基于属性的认证密钥协商协议 [J ] . 计算机学报 , 2013 , 36 ( 10 ): 2156 - 2166 .
LI Q , FENG D G , ZHANG L W , et al . Enhanced attribute-based authenticated key agreement protocol in the standard model [J ] . Chinese Journal of Computers , 2013 , 36 ( 10 ): 2156 - 2166 .
余敏达 . 基于属性的加密体制研究与实现 [D ] . 济南:山东大学 , 2013 .
YU M D . Research and Implementation on Attribute-Based Encryption [D ] . Jinan:Shandong University , 2013 .
苏金树 , 曹丹 , 王小峰 , 等 . 属性基加密机制 [J ] . 软件学报 , 2011 , 22 ( 6 ): 1299 - 1315 .
SU J S , CAO D , WANG X F , et al . Attribute based encryption schemes [J ] . Journal of Software , 2011 , 22 ( 6 ): 1299 - 1315 .
宋衍 , 韩臻 , 刘凤梅 , 等 . 基于访问树的策略隐藏属性加密方案 [J ] . 通信学报 , 2015 , 36 ( 9 ): 119 - 126 .
SONG Y , HAN Z , LIU F M , et al . Attribute-based encryption with hidden policies in the access tree [J ] . Journal on Communications , 2015 , 36 ( 9 ): 119 - 126 .
SHAMIR A . How to share a secret [J ] . Communications of the ACM , 1979 , 22 ( 11 ): 612 - 613 .
周德华 . 代理重加密体制的研究 [D ] . 上海:上海交通大学 , 2013 .
ZHOU D H . Studies on Proxy Re-Encryption Schemes [D ] . Shanghai:Shanghai Jiao Tong University , 2013 .
陈燕利 , 杜英杰 , 杨庚 . 一种高效的基于属性的认证密钥协商协议 [J ] . 计算机科学 , 2014 , 41 ( 4 ): 150 - 177 .
CHEN Y L , DU Y J , YANG G . Efficient attribute-based authenticated key agreement protocol [J ] . Computer Science , 2014 , 41 ( 4 ): 150 - 154 .
0
浏览量
957
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构