• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

模糊加密阈值签名算法及其在云计算中的应用。

Obfuscating encrypted threshold signature algorithm and its applications in cloud computing.

作者信息

Li Yahong, Wei Jianzhou, Wu Bin, Wang Chunli, Wang Caifen, Zhang Yulei, Yang Xiaodong

机构信息

School of Electronic and Information Engineering, Lanzhou Jiaotong University, Lanzhou, Gansu, China.

School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, Sichuan, China.

出版信息

PLoS One. 2021 Apr 16;16(4):e0250259. doi: 10.1371/journal.pone.0250259. eCollection 2021.

DOI:10.1371/journal.pone.0250259
PMID:33861767
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC8051800/
Abstract

Current cloud computing causes serious restrictions to safeguarding users' data privacy. Since users' sensitive data is submitted in unencrypted forms to remote machines possessed and operated by untrusted service providers, users' sensitive data may be leaked by service providers. Program obfuscation shows the unique advantages that it can provide for cloud computing. In this paper, we construct an encrypted threshold signature functionality, which can outsource the threshold signing rights of users to cloud server securely by applying obfuscation, while revealing no more sensitive information. The obfuscator is proven to satisfy the average case virtual black box property and existentially unforgeable under the decisional linear (DLIN) assumption and computational Diffie-Hellman (CDH) assumption in the standard model. Moreover, we implement our scheme using the Java pairing-based cryptography library on a laptop.

摘要

当前的云计算对保护用户数据隐私造成了严重限制。由于用户的敏感数据以未加密的形式提交给由不可信服务提供商拥有和运营的远程机器,用户的敏感数据可能会被服务提供商泄露。程序混淆显示出它可为云计算提供的独特优势。在本文中,我们构建了一种加密阈值签名功能,通过应用混淆技术,可以将用户的阈值签名权安全地外包给云服务器,同时不会泄露更多敏感信息。在标准模型中,证明该混淆器满足平均情况虚拟黑盒属性,并且在决策线性(DLIN)假设和计算性迪菲-赫尔曼(CDH)假设下是存在不可伪造的。此外,我们在笔记本电脑上使用基于Java配对的密码库实现了我们的方案。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/bda0/8051800/4a9eae08222a/pone.0250259.g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/bda0/8051800/779b71542308/pone.0250259.g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/bda0/8051800/b80454577664/pone.0250259.g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/bda0/8051800/4a9eae08222a/pone.0250259.g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/bda0/8051800/779b71542308/pone.0250259.g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/bda0/8051800/b80454577664/pone.0250259.g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/bda0/8051800/4a9eae08222a/pone.0250259.g003.jpg

相似文献

1
Obfuscating encrypted threshold signature algorithm and its applications in cloud computing.模糊加密阈值签名算法及其在云计算中的应用。
PLoS One. 2021 Apr 16;16(4):e0250259. doi: 10.1371/journal.pone.0250259. eCollection 2021.
2
Secure Obfuscation for Encrypted Group Signatures.加密群组签名的安全混淆技术。
PLoS One. 2015 Jul 13;10(7):e0131550. doi: 10.1371/journal.pone.0131550. eCollection 2015.
3
A searchable personal health records framework with fine-grained access control in cloud-fog computing.云雾计算中具有细粒度访问控制的可搜索个人健康记录框架。
PLoS One. 2018 Nov 29;13(11):e0207543. doi: 10.1371/journal.pone.0207543. eCollection 2018.
4
NPMA: A Novel Privacy-Preserving Mutual Authentication in TMIS for Mobile Edge-Cloud Architecture.NPMA:移动边缘云架构中 TMIS 的一种新的隐私保护的相互认证方法。
J Med Syst. 2019 Sep 14;43(10):318. doi: 10.1007/s10916-019-1444-9.
5
A keyword searchable attribute-based encryption scheme with attribute update for cloud storage.一种具有属性更新功能的基于关键字搜索的属性加密方案,用于云存储。
PLoS One. 2018 May 24;13(5):e0197318. doi: 10.1371/journal.pone.0197318. eCollection 2018.
6
Using Identity-Based Cryptography as a Foundation for an Effective and Secure Cloud Model for E-Health.基于身份的密码学在电子健康的有效和安全云模型中的应用。
Comput Intell Neurosci. 2022 Apr 25;2022:7016554. doi: 10.1155/2022/7016554. eCollection 2022.
7
Searchable attribute-based encryption scheme with attribute revocation in cloud storage.云存储中具有属性撤销功能的可搜索属性基加密方案。
PLoS One. 2017 Aug 31;12(8):e0183459. doi: 10.1371/journal.pone.0183459. eCollection 2017.
8
Improving the proof of "Privacy-preserving attribute-keyword based data publish-subscribe service on cloud platforms".改进“基于隐私保护属性-关键词的云平台数据发布-订阅服务”的证明。
PLoS One. 2019 Feb 25;14(2):e0212761. doi: 10.1371/journal.pone.0212761. eCollection 2019.
9
FRR: fair remote retrieval of outsourced private medical records in electronic health networks.FRR:电子健康网络中外包私人医疗记录的公平远程检索
J Biomed Inform. 2014 Aug;50:226-33. doi: 10.1016/j.jbi.2014.02.008. Epub 2014 Feb 18.
10
A hybrid cloud read aligner based on MinHash and kmer voting that preserves privacy.一种基于 MinHash 和 kmer 投票的混合云读取对齐器,可保护隐私。
Nat Commun. 2017 May 16;8:15311. doi: 10.1038/ncomms15311.

本文引用的文献

1
Secure Obfuscation for Encrypted Group Signatures.加密群组签名的安全混淆技术。
PLoS One. 2015 Jul 13;10(7):e0131550. doi: 10.1371/journal.pone.0131550. eCollection 2015.