天堂国产午夜亚洲专区-少妇人妻综合久久蜜臀-国产成人户外露出视频在线-国产91传媒一区二区三区

面向云計算的基于身份/屬性加密體制的研究

發(fā)布時間:2022-04-25 20:59
  云計算是一種基于互聯(lián)網的分布式計算模式,可以為企業(yè)和用戶提供大規(guī)模數(shù)據(jù)存儲與計算能力。然而,當用戶將數(shù)據(jù)上傳到云服務器后,數(shù)據(jù)的機密性和隱私性將面臨新的挑戰(zhàn)。通常,數(shù)據(jù)擁有者會將數(shù)據(jù)加密后再存儲到云服務器上,以保證數(shù)據(jù)的機密性。然而,數(shù)據(jù)加密后,傳統(tǒng)的明文數(shù)據(jù)訪問控制、搜索和分享等技術不再適用。因此,本文對密文域上數(shù)據(jù)的搜索與分享操作進行了研究,設計了一些密碼方案解決了上述挑戰(zhàn)問題。這些方案能夠在保證云存儲數(shù)據(jù)機密性的前提下,實現(xiàn)對加密數(shù)據(jù)匿名的訪問控制、細粒度的訪問控制以及布爾關鍵字搜索。在廣播加密系統(tǒng)中,廣播者廣播的加密消息只有指定接收者集合中的用戶能夠解密,接收者集合之外的用戶則無法正確解密。基于身份的廣播加密系統(tǒng)是傳統(tǒng)廣播加密方案的擴展,在該系統(tǒng)中,每個用戶使用一個能夠唯一標識用戶身份的信息作為用戶的公鑰;谏矸莸膹V播加密在實際生活中有許多的應用,例如付費電視系統(tǒng),機密文件的分發(fā),衛(wèi)星視頻通信等。在基于身份的廣播加密系統(tǒng)中,消息的機密性和接收者集合的匿名性都是至關重要的。然而,現(xiàn)有的基于身份的廣播加密系統(tǒng)卻不能同時滿足這兩點。本文提出了一個一般化的匿名的基于身份的廣播加密方案... 

【文章頁數(shù)】:136 頁

【學位級別】:博士

【文章目錄】:
Abstract
摘要
Chapter 1 Introduction
    1.1 Cloud computing foundations and challenges
        1.1.1 Service models
        1.1.2 Deployment models
        1.1.3 Cloud computing features
        1.1.4 Cloud computing challenges
    1.2 Development and Status on Cryptography
        1.2.1 Introduction of cryptography
        1.2.2 Broadcast encryption
        1.2.3 Proxy re-encryption
        1.2.4 Searchable encryption
    1.3 Contributions
    1.4 Organization
Chapter 2 Foundations
    2.1 Foundations on mathematics
        2.1.1 Group
        2.1.2 Cyclic group, Group generator
        2.1.3 Bilinear groups
        2.1.4 Negligible function
        2.1.5 Hash functions
    2.2 Foundations on Provable Security
        2.2.1 Security concepts for cryptographic systems
        2.2.2 Computational complexity problems
        2.2.3 Idealized models
    2.3 Foundations on Cryptography
        2.3.1 Signature cryptography
        2.3.2 Symmetric-key cryptography
        2.3.3 Public key cryptography
Chapter 3 Anonymous Identity-Based Broadcast Encryption
    3.1 Definition
    3.2 Security models
    3.3 A generic anonymous IBBE from IBE
        3.3.1 Construction
        3.3.2 Security analysis
    3.4 Anonymous access control for outsourced encrypted data in cloud computing
        3.4.1 System architecture
        3.4.2 Construction
        3.4.3 Security analysis
        3.4.4 Performance evaluation
    3.5 Conclusion
Chapter 4 Identity-Based Condition Proxy Re-encryption
    4.1 Definition
    4.2 Security model
    4.3 On the security of two IBCPRE schemes
        4.3.1 Review Liang et al.'s UniSH-IBCPRE scheme
        4.3.2 Security analysis I
        4.3.3 Review Liang et al.'s BiMH-IBCPRE scheme
        4.3.4 Security analysis Ⅱ
        4.3.5 Conclusion
    4.4 Fine-grained access control for secure PHRs in cloud computing
        4.4.1 System framework
        4.4.2 Construction
        4.4.3 Security analysis
        4.4.4 Performance evaluation
        4.4.5 Conclusion
Chapter 5 Attribute-Based Hybrid Boolean Keyword Search
    5.1 Definition
    5.2 Security model
    5.3 Searching for the outsourced encrypted data in cloud computing
        5.3.1 System architecture
        5.3.2 Construction
        5.3.3 Security analysis
    5.4 Performance evaluation
    5.5 Conclusion
Chapter 6 Conclusions and Perspectives
Bibliography
Acknowledgement
Author's Publications
Appendix 中文概述


【參考文獻】:
期刊論文
[1]CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles[J]. DENG Robert.  Science China(Information Sciences). 2010(03)



本文編號:3648330

資料下載
論文發(fā)表

本文鏈接:http://sikaile.net/shoufeilunwen/xxkjbs/3648330.html


Copyright(c)文論論文網All Rights Reserved | 網站地圖 |

版權申明:資料由用戶33eb4***提供,本站僅收錄摘要或目錄,作者需要刪除請E-mail郵箱bigeng88@qq.com