EAEBHCM:an extended attribute encryption based hidden credentials model
The identity-based encryption based hidden credentials has three problems that it can not supports 1-N communication,endures no identity fuzzy and lefts open to conspiracy crack.An extended attribute encryption based hidden credentials model(EAEBHCM) was presented in to solve these three issued whic...
Saved in:
Main Authors: | , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2012-12-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436x.2012.12.011/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841539885691830272 |
---|---|
author | Wei-jin GE Xiao-hui HU |
author_facet | Wei-jin GE Xiao-hui HU |
author_sort | Wei-jin GE |
collection | DOAJ |
description | The identity-based encryption based hidden credentials has three problems that it can not supports 1-N communication,endures no identity fuzzy and lefts open to conspiracy crack.An extended attribute encryption based hidden credentials model(EAEBHCM) was presented in to solve these three issued which making use of attribute-set certificates and decryption accuracy threshold characteristics.After analyzed the relevant research,the architecture,the system structure,the two sides trust negotiation protocol,multi-party trust negotiation protocols and how the model to solve complex logical access policies of the extended model were described in detail.And the security of extended model was also analyzed.Through a typical access control scenario,the difference between old and new hidden credentials technology on the performance and security were analyzed,which clarified the advantages of the extended model. |
format | Article |
id | doaj-art-eaa3c3c8cc694c6c9ca0d5a6f6304d6f |
institution | Kabale University |
issn | 1000-436X |
language | zho |
publishDate | 2012-12-01 |
publisher | Editorial Department of Journal on Communications |
record_format | Article |
series | Tongxin xuebao |
spelling | doaj-art-eaa3c3c8cc694c6c9ca0d5a6f6304d6f2025-01-14T06:33:18ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2012-12-0133859259666192EAEBHCM:an extended attribute encryption based hidden credentials modelWei-jin GEXiao-hui HUThe identity-based encryption based hidden credentials has three problems that it can not supports 1-N communication,endures no identity fuzzy and lefts open to conspiracy crack.An extended attribute encryption based hidden credentials model(EAEBHCM) was presented in to solve these three issued which making use of attribute-set certificates and decryption accuracy threshold characteristics.After analyzed the relevant research,the architecture,the system structure,the two sides trust negotiation protocol,multi-party trust negotiation protocols and how the model to solve complex logical access policies of the extended model were described in detail.And the security of extended model was also analyzed.Through a typical access control scenario,the difference between old and new hidden credentials technology on the performance and security were analyzed,which clarified the advantages of the extended model.http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436x.2012.12.011/attributeencryptionhidden credentialstrust negotiationconspiracy |
spellingShingle | Wei-jin GE Xiao-hui HU EAEBHCM:an extended attribute encryption based hidden credentials model Tongxin xuebao attribute encryption hidden credentials trust negotiation conspiracy |
title | EAEBHCM:an extended attribute encryption based hidden credentials model |
title_full | EAEBHCM:an extended attribute encryption based hidden credentials model |
title_fullStr | EAEBHCM:an extended attribute encryption based hidden credentials model |
title_full_unstemmed | EAEBHCM:an extended attribute encryption based hidden credentials model |
title_short | EAEBHCM:an extended attribute encryption based hidden credentials model |
title_sort | eaebhcm an extended attribute encryption based hidden credentials model |
topic | attribute encryption hidden credentials trust negotiation conspiracy |
url | http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436x.2012.12.011/ |
work_keys_str_mv | AT weijinge eaebhcmanextendedattributeencryptionbasedhiddencredentialsmodel AT xiaohuihu eaebhcmanextendedattributeencryptionbasedhiddencredentialsmodel |