EAEBHCM:an extended attribute encryption based hidden credentials model

The identity-based encryption based hidden credentials has three problems that it can not supports 1-N communication,endures no identity fuzzy and lefts open to conspiracy crack.An extended attribute encryption based hidden credentials model(EAEBHCM) was presented in to solve these three issued whic...

Full description

Saved in:
Bibliographic Details
Main Authors: Wei-jin GE, Xiao-hui HU
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2012-12-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436x.2012.12.011/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841539885691830272
author Wei-jin GE
Xiao-hui HU
author_facet Wei-jin GE
Xiao-hui HU
author_sort Wei-jin GE
collection DOAJ
description The identity-based encryption based hidden credentials has three problems that it can not supports 1-N communication,endures no identity fuzzy and lefts open to conspiracy crack.An extended attribute encryption based hidden credentials model(EAEBHCM) was presented in to solve these three issued which making use of attribute-set certificates and decryption accuracy threshold characteristics.After analyzed the relevant research,the architecture,the system structure,the two sides trust negotiation protocol,multi-party trust negotiation protocols and how the model to solve complex logical access policies of the extended model were described in detail.And the security of extended model was also analyzed.Through a typical access control scenario,the difference between old and new hidden credentials technology on the performance and security were analyzed,which clarified the advantages of the extended model.
format Article
id doaj-art-eaa3c3c8cc694c6c9ca0d5a6f6304d6f
institution Kabale University
issn 1000-436X
language zho
publishDate 2012-12-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-eaa3c3c8cc694c6c9ca0d5a6f6304d6f2025-01-14T06:33:18ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2012-12-0133859259666192EAEBHCM:an extended attribute encryption based hidden credentials modelWei-jin GEXiao-hui HUThe identity-based encryption based hidden credentials has three problems that it can not supports 1-N communication,endures no identity fuzzy and lefts open to conspiracy crack.An extended attribute encryption based hidden credentials model(EAEBHCM) was presented in to solve these three issued which making use of attribute-set certificates and decryption accuracy threshold characteristics.After analyzed the relevant research,the architecture,the system structure,the two sides trust negotiation protocol,multi-party trust negotiation protocols and how the model to solve complex logical access policies of the extended model were described in detail.And the security of extended model was also analyzed.Through a typical access control scenario,the difference between old and new hidden credentials technology on the performance and security were analyzed,which clarified the advantages of the extended model.http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436x.2012.12.011/attributeencryptionhidden credentialstrust negotiationconspiracy
spellingShingle Wei-jin GE
Xiao-hui HU
EAEBHCM:an extended attribute encryption based hidden credentials model
Tongxin xuebao
attribute
encryption
hidden credentials
trust negotiation
conspiracy
title EAEBHCM:an extended attribute encryption based hidden credentials model
title_full EAEBHCM:an extended attribute encryption based hidden credentials model
title_fullStr EAEBHCM:an extended attribute encryption based hidden credentials model
title_full_unstemmed EAEBHCM:an extended attribute encryption based hidden credentials model
title_short EAEBHCM:an extended attribute encryption based hidden credentials model
title_sort eaebhcm an extended attribute encryption based hidden credentials model
topic attribute
encryption
hidden credentials
trust negotiation
conspiracy
url http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436x.2012.12.011/
work_keys_str_mv AT weijinge eaebhcmanextendedattributeencryptionbasedhiddencredentialsmodel
AT xiaohuihu eaebhcmanextendedattributeencryptionbasedhiddencredentialsmodel