Police-based encryption for privacy protection of trust negotiation
CSTR:
Author:
  • Article
  • | |
  • Metrics
  • |
  • Reference
  • |
  • Related [20]
  • |
  • Cited by
  • | |
  • Comments
    Abstract:

    Privacy protection technologies of automated trust negotiation have witnessed great development, among which hidden credentials is an admittedly more satisfactory one. However, for hidden credentials, there exists fatal weakness of blindly decryption, which results decryption execution costly. To solve the problem, using bilinear pairings over elliptic curves, a policy-based encryption for privacy protection is proposed. Under the assumption of BDH problem, the scheme is proven to be IND-Pol-CCA safety in the random prediction model. Compared with hidden credentials and other encryption solutions based on policy, this scheme is more efficient, secure and of shorter length of cipher text.

    Reference
    Cited by
    Comments
    Comments
    分享到微博
    Submit
Get Citation

喻玲,陈蜀宇.策略加密的信任协商隐私保护[J].重庆大学学报,2011,34(2):52~57

Copy
Share
Article Metrics
  • Abstract:
  • PDF:
  • HTML:
  • Cited by:
History
  • Received:September 21,2010
Article QR Code