Toggle navigation
Home
About
About Journal
Historical Evolution
Indexed In
Awards
Reference Index
Editorial Board
Journal Online
Archive
Project Articles
Most Download Articles
Most Read Articles
Instruction
Contribution Column
Author Guidelines
Template
FAQ
Copyright Agreement
Expenses
Academic Integrity
Contact
Contact Us
Location Map
Subscription
Advertisement
中文
Journals
Publication Years
Keywords
Search within results
(((XU Shengwei[Author]) AND 1[Journal]) AND year[Order])
AND
OR
NOT
Title
Author
Institution
Keyword
Abstract
PACS
DOI
Please wait a minute...
For Selected:
Download Citations
EndNote
Ris
BibTeX
Toggle Thumbnails
Select
Anonymous broadcast encryption based access control method for cloud storage
XU Shengwei, LIN Muqing
Journal of Computer Applications 2017, 37 (
2
): 473-482. DOI:
10.11772/j.issn.1001-9081.2017.02.0473
Abstract
(
515
)
PDF
(1569KB)(
585
)
Knowledge map
Save
Focusing on the deficiencies on performance and security of the existing anonymous broadcast encryption scheme, a new anonymous broadcast encryption scheme based on the Lagrange interpolation polynomial was proposed. Firstly, an anonymous broadcast encryption security model against adaptive adversaries was defined. Then the scheme was constructed based on the Lagrange interpolation polynomial under the composite order bilinear group settings, which ensures user identity anonymity and achieves an efficient encryption and decryption at the same time. Finally, based on the subgroup decision assumption and the composite decisional bilinear Diffie-Hellman assumption, the security was proved in standard model, which shows that the proposed scheme has both ciphertext confidentiality and receiver anonymity against adaptive adversaries. Experimental results and performance analysis show that the proposed method has low communication and computing overhead, and can efficiently solve the anonymous access control issues of ciphertext data in cloud storage.
Reference
|
Related Articles
|
Metrics
Select
Improved differential fault attack on scalar multiplication algorithm in elliptic curve cryptosystem
XU Shengwei, CHEN Cheng, WANG Rongrong
Journal of Computer Applications 2016, 36 (
12
): 3328-3332. DOI:
10.11772/j.issn.1001-9081.2016.12.3328
Abstract
(
744
)
PDF
(785KB)(
498
)
Knowledge map
Save
Concerning the failure problem of fault attack on elliptic curve scalar multiplication algorithm, an improved algorithm of differential fault attack was proposed. The nonzero assumption was eliminated, and an authentication mechanism was imported against the failure threat of "fault detection". Using the elliptic curve provided by SM2 algorithm, the binary scalar multiplication algorithm, binary Non-Adjacent Form (NAF) scalar multiplication algorithm and Montgomery scalar multiplication algorithm were successfully attacked with software simulation. The 256-bit private key was restored in three hours. The attacking process of binary NAF scalar multiplication algorithm was optimized, so the attack time was reduced to one fifth of the original one. The experimental results show that the proposed algorithm can improve the effectiveness of the attack.
Reference
|
Related Articles
|
Metrics