面向云计算的基于身份/属性加密体制的研究

发布时间:2022-04-25 20:59
  云计算是一种基于互联网的分布式计算模式,可以为企业和用户提供大规模数据存储与计算能力。然而,当用户将数据上传到云服务器后,数据的机密性和隐私性将面临新的挑战。通常,数据拥有者会将数据加密后再存储到云服务器上,以保证数据的机密性。然而,数据加密后,传统的明文数据访问控制、搜索和分享等技术不再适用。因此,本文对密文域上数据的搜索与分享操作进行了研究,设计了一些密码方案解决了上述挑战问题。这些方案能够在保证云存储数据机密性的前提下,实现对加密数据匿名的访问控制、细粒度的访问控制以及布尔关键字搜索。在广播加密系统中,广播者广播的加密消息只有指定接收者集合中的用户能够解密,接收者集合之外的用户则无法正确解密。基于身份的广播加密系统是传统广播加密方案的扩展,在该系统中,每个用户使用一个能够唯一标识用户身份的信息作为用户的公钥。基于身份的广播加密在实际生活中有许多的应用,例如付费电视系统,机密文件的分发,卫星视频通信等。在基于身份的广播加密系统中,消息的机密性和接收者集合的匿名性都是至关重要的。然而,现有的基于身份的广播加密系统却不能同时满足这两点。本文提出了一个一般化的匿名的基于身份的广播加密方案... 

【文章页数】:136 页

【学位级别】:博士

【文章目录】:
Abstract
摘要
Chapter 1 Introduction
    1.1 Cloud computing foundations and challenges
        1.1.1 Service models
        1.1.2 Deployment models
        1.1.3 Cloud computing features
        1.1.4 Cloud computing challenges
    1.2 Development and Status on Cryptography
        1.2.1 Introduction of cryptography
        1.2.2 Broadcast encryption
        1.2.3 Proxy re-encryption
        1.2.4 Searchable encryption
    1.3 Contributions
    1.4 Organization
Chapter 2 Foundations
    2.1 Foundations on mathematics
        2.1.1 Group
        2.1.2 Cyclic group, Group generator
        2.1.3 Bilinear groups
        2.1.4 Negligible function
        2.1.5 Hash functions
    2.2 Foundations on Provable Security
        2.2.1 Security concepts for cryptographic systems
        2.2.2 Computational complexity problems
        2.2.3 Idealized models
    2.3 Foundations on Cryptography
        2.3.1 Signature cryptography
        2.3.2 Symmetric-key cryptography
        2.3.3 Public key cryptography
Chapter 3 Anonymous Identity-Based Broadcast Encryption
    3.1 Definition
    3.2 Security models
    3.3 A generic anonymous IBBE from IBE
        3.3.1 Construction
        3.3.2 Security analysis
    3.4 Anonymous access control for outsourced encrypted data in cloud computing
        3.4.1 System architecture
        3.4.2 Construction
        3.4.3 Security analysis
        3.4.4 Performance evaluation
    3.5 Conclusion
Chapter 4 Identity-Based Condition Proxy Re-encryption
    4.1 Definition
    4.2 Security model
    4.3 On the security of two IBCPRE schemes
        4.3.1 Review Liang et al.'s UniSH-IBCPRE scheme
        4.3.2 Security analysis I
        4.3.3 Review Liang et al.'s BiMH-IBCPRE scheme
        4.3.4 Security analysis Ⅱ
        4.3.5 Conclusion
    4.4 Fine-grained access control for secure PHRs in cloud computing
        4.4.1 System framework
        4.4.2 Construction
        4.4.3 Security analysis
        4.4.4 Performance evaluation
        4.4.5 Conclusion
Chapter 5 Attribute-Based Hybrid Boolean Keyword Search
    5.1 Definition
    5.2 Security model
    5.3 Searching for the outsourced encrypted data in cloud computing
        5.3.1 System architecture
        5.3.2 Construction
        5.3.3 Security analysis
    5.4 Performance evaluation
    5.5 Conclusion
Chapter 6 Conclusions and Perspectives
Bibliography
Acknowledgement
Author's Publications
Appendix 中文概述


【参考文献】:
期刊论文
[1]CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles[J]. DENG Robert.  Science China(Information Sciences). 2010(03)



本文编号:3648330

资料下载
论文发表

本文链接:https://www.wllwen.com/shoufeilunwen/xxkjbs/3648330.html


Copyright(c)文论论文网All Rights Reserved | 网站地图

版权申明:资料由用户33eb4***提供,本站仅收录摘要或目录,作者需要删除请E-mail邮箱bigeng88@qq.com