Journals
  Publication Years
  Keywords
Search within results Open Search
Please wait a minute...
For Selected: Toggle Thumbnails
Anonymous broadcast encryption based access control method for cloud storage
XU Shengwei, LIN Muqing
Journal of Computer Applications    2017, 37 (2): 473-482.   DOI: 10.11772/j.issn.1001-9081.2017.02.0473
Abstract515)      PDF (1569KB)(585)       Save
Focusing on the deficiencies on performance and security of the existing anonymous broadcast encryption scheme, a new anonymous broadcast encryption scheme based on the Lagrange interpolation polynomial was proposed. Firstly, an anonymous broadcast encryption security model against adaptive adversaries was defined. Then the scheme was constructed based on the Lagrange interpolation polynomial under the composite order bilinear group settings, which ensures user identity anonymity and achieves an efficient encryption and decryption at the same time. Finally, based on the subgroup decision assumption and the composite decisional bilinear Diffie-Hellman assumption, the security was proved in standard model, which shows that the proposed scheme has both ciphertext confidentiality and receiver anonymity against adaptive adversaries. Experimental results and performance analysis show that the proposed method has low communication and computing overhead, and can efficiently solve the anonymous access control issues of ciphertext data in cloud storage.
Reference | Related Articles | Metrics
Improved differential fault attack on scalar multiplication algorithm in elliptic curve cryptosystem
XU Shengwei, CHEN Cheng, WANG Rongrong
Journal of Computer Applications    2016, 36 (12): 3328-3332.   DOI: 10.11772/j.issn.1001-9081.2016.12.3328
Abstract744)      PDF (785KB)(498)       Save
Concerning the failure problem of fault attack on elliptic curve scalar multiplication algorithm, an improved algorithm of differential fault attack was proposed. The nonzero assumption was eliminated, and an authentication mechanism was imported against the failure threat of "fault detection". Using the elliptic curve provided by SM2 algorithm, the binary scalar multiplication algorithm, binary Non-Adjacent Form (NAF) scalar multiplication algorithm and Montgomery scalar multiplication algorithm were successfully attacked with software simulation. The 256-bit private key was restored in three hours. The attacking process of binary NAF scalar multiplication algorithm was optimized, so the attack time was reduced to one fifth of the original one. The experimental results show that the proposed algorithm can improve the effectiveness of the attack.
Reference | Related Articles | Metrics