Research on the programming language for proxy re-encryption
Papers|更新时间:2024-06-05
|
Research on the programming language for proxy re-encryption
Journal on CommunicationsVol. 39, Issue 6, Pages: 89-97(2018)
作者机构:
1. 南京理工大学计算机科学与工程学院,江苏 南京 210094
2. 中国科学院信息工程研究所信息安全国家重点实验室,北京 100093
3. 中国科学院大学网络空间安全学院,北京 100049
作者简介:
基金信息:
The National Natural Science Foundation of China(61702266);The National Natural Science Foundation of China(U1536202);The National Natural Science Foundation of China(61572255);The Natural Science Foundation of Jiangsu Province(BK20150787);The Natural Science Foundation of Jiangsu Province(BK20141404);The Natural Science Foundation of Beijing(4152048);IIE’s Frontier Project(Y7Z0391102);SKLOIS Key Deployment Project(Y7D0061102);CAS Key Technology Talent Program
Mang SU, Yan YU, Bin WU, et al. Research on the programming language for proxy re-encryption[J]. Journal on Communications, 2018, 39(6): 89-97.
DOI:
Mang SU, Yan YU, Bin WU, et al. Research on the programming language for proxy re-encryption[J]. Journal on Communications, 2018, 39(6): 89-97. DOI: 10.11959/j.issn.1000-436x.2018106.
Research on the programming language for proxy re-encryption
The programming language for proxy re-encryption(PLPRE) based on domain specific language(DSL) was proposed
which was similar to the matical description and was adopt to describe the proxy re-encryption directly.The algorithm designer could describe the algorithm conveniently and quickly by PLPRE
and obtain the programming code for computer.Firstly
the grammar of PLPRE was presented
including the definitions of the keyword and programming logic
then the ACC-PRE algorithm was described by PLPRE as an example.Secondly
the PLPRE parser was realized by ANTLR.Finally
the comparisons between the PLPRE and the related work were made.By using the PLPRE
user does not need to pay attentions to data structure or memory allocation.It is suitable for the cryptography experts who is not familiar with the programming.Thus
PLPRE will decrease the deviation between the design and implement for PRE.
SU M , SHI G Z , XIE R N , et al . Multi-element based on proxy re-encryption scheme for mobile cloud computing [J ] . Journal on Communications , 2015 , 36 ( 11 ): 73 - 79 .
SIDOROV E , Breaking the Rabin-Williams digital signature system implementation in the Crypto++ library [J ] . Lecture Notes in Computer Science , 2015 , 2664 ( 4 ):956.
BENGER N , SCOTT M . Constructing tower extensions for the implementation of pairing-based cryptography [C ] // Springer Berlin Heidelberg . 2012 : 180 - 195 .
LYNN B . On the implementation of pairing-based cryptosystems [J ] . Dissertation Abstracts International , 2007 , 68 : 3903 - 3910 .
ATENIESE G , FU K , GREEN M , et al . Improved proxy re-encryption schemes with applications to secure distributed storage [J ] . ACM Transactions on Information & System Security , 2006 , 9 ( 1 ): 1 - 30 .
LEE P , MARK S , MATTHEWS J . A verifying core for a cryptographic language compiler [C ] // International Workshop on the ACL2 Theorem Prover and ITS Applications . 2006 : 1 - 10 .
LEVENT E , MATTHEWS J . High assurance programming in Cryptol [C ] // The 5th Annual Workshop on Cyber Security and Information Intelligence Research . 2009 : 60 - 61 .
AHMAD J J , LI S , SADEGHI A R , et al . CTL:a platform independent crypto tools library based on dataflow programming paradigm [C ] // International Conference on Financial Cryptography and Data Security . 2012 : 299 - 313 .
LI F H , YAN J Z , XIE R N , et al . Research on the programming lan-guage for the block cipher algorithm [J ] . Acta Electronica Sinica , 2009 , 37 ( 12 ): 2705 - 2710 .
BOVET J , PARR T . ANTLRWorks:an ANTLR grammar development environment [J ] . Software Practice & Experience , 2008 , 38 ( 12 ): 1305 - 1332 .
SU M , LI F H , SHI G Z , et al . A user-centric data secure creation scheme in cloud computing [J ] . Chinese Journal of Electronics , 2016 , 25 ( CJE-4 ): 753 - 760 .