Learn More
Keywords: Secure computation auditing Secure storage Privacy-cheating discouragement Designated verifier signature Batch verification Cloud computing a b s t r a c t Cloud computing emerges as a new computing paradigm that aims to provide reliable, cus-tomized and quality of service guaranteed computation environments for cloud users. Applications and(More)
Delay/Disruption tolerant networks (DTNs) are self-organized wireless ad-hoc networks, where end-to-end connectivity can not be guaranteed and communications rely on the assumption that the nodes are willing to store-carry-and-forward bundles in an opportunistic way. However, this assumption would be easily violated due to the selfish nodes which are(More)
本文提出了一种新的“cancellation technique”,并将该新技术用于构造黑盒可追踪和可撤销的密文策略属性基加密方案的构造中,在不牺牲其他参数(公开参数长度、密钥长度等)的情况下,本文构造出一个(与当前最好结果相比)更短密文、更小计算代价的黑盒可追踪与可撤销密文策略属性基加密方案。值得一提的是,这种新的“cancellation technique”不仅仅在构造更短密文更高效的黑盒可追踪与可撤销密文策略属性基加密方案中起作用,同时也对其他加密或签名方案更短密文或者是更高效的构造提供了参考价值。
As a sophisticated mechanism for secure fine-grained access control, ciphertext-policy attribute-based encryption (CP-ABE) is a highly promising solution for commercial applications such as cloud computing. However, there still exists one major issue awaiting to be solved, that is, the prevention of key abuse. Most of the existing CP-ABE systems missed this(More)