云社交网络中安全高效的加密数据共享机制(英文)

来源 :中国通信 | 被引量 : 0次 | 上传用户:5201314520
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
Despite that existing data sharing systems in online social networks(OSNs)propose to encrypt data before sharing,the multiparty access control of encrypted data has become a challenging issue.In this paper,we propose a secure data sharing scheme in OSNs based on ciphertext-policy attributebased proxy re-encryption and secret sharing.In order to protect users’ sensitive data,our scheme allows users to customize access policies of their data and then outsource encrypted data to the OSNs service provider.Our scheme presents a multiparty access control model,which enables the disseminator to update the access policy of ciphertext if their attributes satisfy the existing access policy.Further,we present a partial decryption construction in which the computation overhead of user is largely reduced by delegating most of the decryption operations to the OSNs service provider.We also provide checkability on the results returned from the OSNs service provider to guarantee the correctness of partial decrypted ciphertext.Moreover,our scheme presents an efficient attribute revocation method that achieves both forward and backward secrecy.The security and performance analysis results indicate that the proposed scheme is secure and efficient in OSNs. Despite that existing data sharing systems in online social networks (OSNs) propose to encrypt data before sharing, the multiparty access control of encrypted data has become a challenging issue. In this paper, we propose a secure data sharing scheme in OSNs based on ciphertext- policy attribute based on proxy re-encryption and secret sharing. order to protect users’ sensitive data, our scheme allows users to customize access policies of their data and then outsource encrypted data to the OSNs service provider. Our scheme presents a multiparty access control model, which enables the disseminator to update the access policy of ciphertext if their conditions satisfy the existing access policy.Further, we present a partial decryption construction in which the computation overhead of user is largely reduced by delegating most of the decryption operations to the OSNs service provider .We also provide checkability on the results returned from the OSNs service provider to guarantee the correctness of part ial decrypted ciphertext. Moreover, our scheme presents an efficient attribute revocation method that achieves both forward and backward secrecy. The security and performance analysis results indicate that the proposed scheme is secure and efficient in OSNs.
其他文献
☆基础篇 课时一不等式的性质 诊断检测 一、填空题 1.设a=2x2+x-1,b=3x2-x,则a,b的大小关系为_. 2.若0b2,则a>|b|. ☆ Fundamental lesson time Inequality The na
2500多年前,孔子叹曰:“未知生,焉知死?”  一语惊醒梦中人。  可是,孔子的弟子们记下了—子在川上曰:“逝者如斯夫,不舍昼夜。”  你不可能不想到死,正如你不可能不死。  生命在一呼一吸之间延续,也在一呼一吸之间流逝。  正是“照花前后镜,花面交相印”,即使,你并不想去看。  看还是不看,这不是个问题,问题在于,你怎么去看。  看得智慧,便成就了哲学,一门教人如何去死的学问。  看得通透,便
重症急性胰腺炎(SAP)是临床上常见的急腹症之一,具有起病急、进展快、临床病理变化复杂等特点,早期即可发生全身炎症反应综合征和多器官功能不全综合征,病死率高,严重威胁着
充要条件是高中学段中的一个重要概念,并且是一个难点.如何破释难点,使抽象的概念用直观、形象的图形表示出来,让学生看得见。想得通,才是最好方法.笔者在使用下面两个模型
张来印在狼牙山上养的一些专下土鸡蛋的鸡,都是特意被他穿上了鞋的。为什么要给鸡穿鞋?因为鸡的爪子太尖利了,太能刨了,对生态环境太有杀伤力了。且说张来印从部队退伍回来,
宏病毒是近年来被人们谈论最多的一种电脑病毒。国际上已发现的Word宏病毒达一百二十多种,国内流行的Word宏病毒也有十多种。所谓的“宏”是微软公司为Office软件设计的一个
一位做计算机的工程师在公司人事缩减时被裁,他难过极了。“我又没犯什么错,”他沮丧地问同事,“经理为什么把我裁掉?”  “大概是你哪里做得不够好。”同事A说,“还记得上次他要你指导业务部门使用计算机,你坐在那里没事做时刚好被他逮到?”  “什么,我没事做?那时大家刚好都没有问题,我才自己上网的。我不是照样在一旁待命,有人发问我不也是马上就去?”他反驳。  “就是啊!”同事B附和,“经理留下来的另一个
养殖动向河蟹有有望再成家常肴──金坛六百公顷稻田养蟹喜获丰收金坛市今年600多公顷稻田养蟹取得了粮、蟹双丰收;单产稻谷400公斤、成蟹25公斤,为农民增加3000多万元的收益,相当于约7000公顷粮
在中非地区生长着一种名为“绿色杀手”的植物,它的叶片小而柔软,枝条呈放射状铺在地上,如同一条绿色的地毯。当人或动物踏上时,它的 In the Central African region, a pl
考测点导航 1.相交弦、切割线、切线长定理及其推论; 2.这些定理及推论和函数知识相联系后证明圆中的比例线段或求角、求线段长。典型题点击一、已知如图12-15,在直角坐标系