浏览全部资源
扫码关注微信
1. 解放军信息工程大学数据与目标工程学院,河南 郑州 450001
2. 郑州大学软件与应用科技学院,河南 郑州 450001
2. 公安部第一研究所,北京 100048
[ "严新成(1991-),男,河南信阳人,解放军信息工程大学博士生,主要研究方向为应用密码学、云数据隐私保护、安全数据共享等。" ]
[ "陈越(1965-),男,河南开封人,博士,解放军信息工程大学教授、博士生导师,主要研究方向为网络与信息安全。" ]
[ "贾洪勇(1975-),男,河南西平人,博士,郑州大学讲师,主要研究方向为网络与信息安全、应用密码学、云数据访问控制。" ]
[ "陈彦如(1990-),女,河南三门峡人,公安部第一研究所助理工程师,主要研究方向为信息安全、等级保护等。" ]
[ "张馨月(1994-),女,满族,吉林通化人,解放军信息工程大学硕士生,主要研究方向为应用密码学、多级安全访问控制。" ]
网络出版日期:2018-05,
纸质出版日期:2018-05-25
移动端阅览
严新成, 陈越, 贾洪勇, 等. 支持高效密文密钥同步演化的安全数据共享方案[J]. 通信学报, 2018,39(5):123-133.
Xincheng YAN, Yue CHEN, Hongyong JIA, et al. Secure data sharing scheme supporting efficient synchronous evolution for ciphertext and key[J]. Journal on communications, 2018, 39(5): 123-133.
严新成, 陈越, 贾洪勇, 等. 支持高效密文密钥同步演化的安全数据共享方案[J]. 通信学报, 2018,39(5):123-133. DOI: 10.11959/j.issn.1000-436x.2018083.
Xincheng YAN, Yue CHEN, Hongyong JIA, et al. Secure data sharing scheme supporting efficient synchronous evolution for ciphertext and key[J]. Journal on communications, 2018, 39(5): 123-133. DOI: 10.11959/j.issn.1000-436x.2018083.
云存储密文的静态性增大了攻击者通过获取密钥破解密文的概率,而基于密钥分发和重加密的密文密钥更新则开销过大。针对此问题,提出一种支持高效密文密钥同步演化的安全数据共享方案(CKSE-SDS),通过在广播加密中引入密码学累加器构造支持时间周期性跳变的拟态变换因子,并基于密文及密钥的动态分割与融合实现高效的密文密钥同步演化,从而减少了加密过程和私钥分发的确定性,增大了攻击者利用安全漏洞获取密文密钥并破解密文的难度。理论分析及安全性证明表明,该方案在支持数据安全高效访问条件下,可有效降低攻击者攻击成功的概率,提升系统的主动安全防御能力。
The static property of stored ciphertext in cloud increases the probability that an attacker can crack the ciphertext by obtaining a key
while ciphertext and key updates based on key distribution and re-encryption are excessively expensive.For this problem
a secure data sharing scheme supporting efficient synchronous evolution for ciphertext and key (CKSE-SDS) was proposed.By introducing cryptography accumulator in broadcast encryption
mimicry transformation factor could be constructed supporting time-hopping periodically and efficient synchronous evolution for ciphertext and key could be achieved based on dynamic segmentation and fusion of ciphertext and key
which reduced certainty in the process of encryption and key distribution and increased the difficulty for attackers exploiting security vulnerabilities to obtain key to crack ciphertext as well.Theoretical analysis and security proofs show that the proposed scheme can support secure and efficient data access as well as reduce the probability of a successful attack effectively for an attacker
which can also enhance the system’s active security defense capability.
苏金树 , 曹丹 , 王小峰 , 等 . 属性基加密机制 [J ] . 软件学报 , 2011 , 22 ( 6 ): 1299 - 1315 .
SU J S , CAO D , WANG X F , et al . Attribute-based encryption schemes [J ] . Journal of Software , 2011 , 22 ( 6 ): 1299 - 1315 .
冯登国 , 张敏 , 张妍 , 等 . 云计算安全研究 [J ] . 软件学报 , 2011 , 22 ( 1 ): 71 - 83 .
FENG D G , ZHANG M , ZHANG Y , et al . Study on cloud computing security [J ] . Journal of Software , 2011 , 22 ( 1 ): 71 - 83 .
黄刘生 , 田苗苗 , 黄河 . 大数据隐私保护密码技术研究综述 [J ] . 软件学报 , 2015 , 26 ( 4 ): 945 - 959 .
HUANG L S , TIAN M M , HUANG H . Preserving privacy in big data:a survey from the cryptographic perspective [J ] . Journal of Software , 2015 , 26 ( 4 ): 945 - 959 .
DAN B , FRANKLIN M K . Identity-based encryption from the Weil pairing [C ] // International Cryptology Conference . 2001 : 213 - 229 .
SAHAI A , WATERS B . Fuzzy identity-based encryption [C ] // International Conference on Theory and Applications of Cryptographic Techniques . 2005 : 457 - 473 .
邬江兴 . 网络空间拟态安全防御 [J ] . 保密科学技术 , 2014 ( 10 ): 4 - 10 .
WU J X . Cyber minic security defense [J ] . Secrecy Science and Technology , 2014 ( 10 ): 4 - 10 .
邬江兴 . 拟态计算与拟态安全防御的原意和愿景 [J ] . 电信科学 , 2014 , 30 ( 7 ): 1 - 7 .
WU J X . Meaning and vision of mimic computing and mimic security defense [J ] . Telecommunications Science , 2014 , 30 ( 7 ): 1 - 7 .
刘杰 , 曾浩洋 , 田永春 , 等 . 动态弹性安全防御技术及发展趋势 [J ] . 通信技术 , 2015 ( 2 ): 117 - 124 .
LIU J , ZENG H Y , TIAN Y C , et al . Technology and development trend of dynamic resiliency for security defense [J ] . Communications Technology , 2015 ( 2 ): 117 - 124 .
JAJODIA S , JAJODIA S , JAJODIA S , et al . moving target defense [J ] . Advances in Information Security , 2011 , 54 : 99 - 108 .
蔡桂林 , 王宝生 , 王天佐 , 等 . 移动目标防御技术研究进展 [J ] . 计算机研究与发展 , 2016 , 53 ( 5 ): 968 - 987 .
CAI G L , WANG B S , WANG T Z , et al . Research and development of moving target defense technology [J ] . Journal of Computer Research and Development , 2016 , 53 ( 5 ): 968 - 987 .
JAJODIA S , GHOSH A K , SWARUP V , et al . Moving target defense:creating asymmetric uncertainty for cyber threats [J ] . Springer Ebooks , 2011 .
WANG H , JIA Q , Dan F , et al . A moving target DDoS defense mechanism [J ] . Computer Communications , 2014 , 46 ( 6 ): 10 - 21 .
雷程 , 马多贺 , 张红旗 , 等 . 基于最优路径跳变的网络移动目标防御技术 [J ] . 通信学报 , 2017 , 38 ( 3 ): 133 - 143 .
LEI C , MA D H , ZHANG H Q , et al . Network moving target defense technique based on optimal forwarding path migration [J ] . Journal on Communications , 2017 , 38 ( 3 ): 133 - 143 .
罗兴国 , 仝青 , 张铮 , 等 . 拟态防御技术 [J ] . 中国工程科学 , 2016 , 18 ( 6 ): 69 - 73 .
LUO X G , TONG Q , ZHANG Z , et al . Mimic defense technology [J ] . Engineering Sciences , 2016 , 18 ( 6 ): 69 - 73 .
仝青 , 张铮 , 张为华 , 等 . 拟态防御Web服务器设计与实现 [J ] . 软件学报 , 2017 , 28 ( 4 ): 883 - 897 .
TONG Q , ZHANG Z , ZHANG W H , et al . Design and implementation of mimic defense Web server [J ] . Journal of Software , 2017 , 28 ( 4 ): 883 - 897 .
YU S , WANG C , REN K , et al . Attribute based data sharing with attribute revocation [C ] // ACM Symposium on Information,Computer and Communications Security . 2010 : 261 - 270 .
HUR J , DONG K N . Attribute-based access control with efficient revocation in data outsourcing systems [J ] . IEEE Transactions on Parallel & Distributed Systems , 2011 , 22 ( 7 ): 1214 - 1221 .
ZU L , LIU Z , LI J . New ciphertext-policy attribute-based encryption with efficient revocation [C ] // IEEE International Conference on Computer and Information Technology . 2014 : 281 - 287 .
YANG K , JIA X , REN K . Attribute-based fine-grained access control with efficient revocation in cloud storage systems [C ] // ACM Sigsac Symposium on Information,Computer and Communications Security . 2013 : 523 - 528 .
XIA Z H , ZHANG L G , LIU D D , et al . Attribute-based access control scheme with efficient revocation in cloud computing [J ] . China Communications , 2016 , 13 ( 7 ): 92 - 99 .
FIAT A , NAOR M . Broadcast encryption [M ] // Advances in Cryptology— CRYPTO’ 93 . Springer Berlin Heidelberg , 1993 : 480 - 491 .
PHAN D H , POINTCHEVAL D , SHAHANDASHTI S F , et al . Adaptive CCA broadcast encryption with constant-size secret keys and ciphertexts [J ] . International Journal of Information Security , 2013 , 12 ( 4 ): 251 - 265 .
ZHOU Z , HUANG D , WANG Z . Efficient privacy-preserving ciphertext-policy attribute based encryption and broadcast encryption [J ] . IEEE Transactions on Computers , 2014 , 64 ( 1 ): 126 - 138 .
WU Q , QIN B , ZHANG L , et al . Contributory broadcast encryption with efficient encryption and short ciphertexts [J ] . IEEE Transactions on Computers , 2016 , 65 ( 2 ): 466 - 479 .
BONEH D , BOYEN X , GOH E J . Hierarchical identity based encryption with constant size ciphertext [C ] // International Conference on Theory and Applications of Cryptographic Techniques . 2005 : 440 - 456 .
0
浏览量
1226
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构