EAEBHCM:an extended attribute encryption based hidden credentials model
The identity-based encryption based hidden credentials has three problems that it can not supports 1-N communication,endures no identity fuzzy and lefts open to conspiracy crack.An extended attribute encryption based hidden credentials model(EAEBHCM) was presented in to solve these three issued whic...
Saved in:
| Main Authors: | , |
|---|---|
| Format: | Article |
| Language: | zho |
| Published: |
Editorial Department of Journal on Communications
2012-12-01
|
| Series: | Tongxin xuebao |
| Subjects: | |
| Online Access: | http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436x.2012.12.011/ |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1850097505334722560 |
|---|---|
| author | Wei-jin GE Xiao-hui HU |
| author_facet | Wei-jin GE Xiao-hui HU |
| author_sort | Wei-jin GE |
| collection | DOAJ |
| description | The identity-based encryption based hidden credentials has three problems that it can not supports 1-N communication,endures no identity fuzzy and lefts open to conspiracy crack.An extended attribute encryption based hidden credentials model(EAEBHCM) was presented in to solve these three issued which making use of attribute-set certificates and decryption accuracy threshold characteristics.After analyzed the relevant research,the architecture,the system structure,the two sides trust negotiation protocol,multi-party trust negotiation protocols and how the model to solve complex logical access policies of the extended model were described in detail.And the security of extended model was also analyzed.Through a typical access control scenario,the difference between old and new hidden credentials technology on the performance and security were analyzed,which clarified the advantages of the extended model. |
| format | Article |
| id | doaj-art-eaa3c3c8cc694c6c9ca0d5a6f6304d6f |
| institution | DOAJ |
| issn | 1000-436X |
| language | zho |
| publishDate | 2012-12-01 |
| publisher | Editorial Department of Journal on Communications |
| record_format | Article |
| series | Tongxin xuebao |
| spelling | doaj-art-eaa3c3c8cc694c6c9ca0d5a6f6304d6f2025-08-20T02:40:56ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2012-12-0133859259666192EAEBHCM:an extended attribute encryption based hidden credentials modelWei-jin GEXiao-hui HUThe identity-based encryption based hidden credentials has three problems that it can not supports 1-N communication,endures no identity fuzzy and lefts open to conspiracy crack.An extended attribute encryption based hidden credentials model(EAEBHCM) was presented in to solve these three issued which making use of attribute-set certificates and decryption accuracy threshold characteristics.After analyzed the relevant research,the architecture,the system structure,the two sides trust negotiation protocol,multi-party trust negotiation protocols and how the model to solve complex logical access policies of the extended model were described in detail.And the security of extended model was also analyzed.Through a typical access control scenario,the difference between old and new hidden credentials technology on the performance and security were analyzed,which clarified the advantages of the extended model.http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436x.2012.12.011/attributeencryptionhidden credentialstrust negotiationconspiracy |
| spellingShingle | Wei-jin GE Xiao-hui HU EAEBHCM:an extended attribute encryption based hidden credentials model Tongxin xuebao attribute encryption hidden credentials trust negotiation conspiracy |
| title | EAEBHCM:an extended attribute encryption based hidden credentials model |
| title_full | EAEBHCM:an extended attribute encryption based hidden credentials model |
| title_fullStr | EAEBHCM:an extended attribute encryption based hidden credentials model |
| title_full_unstemmed | EAEBHCM:an extended attribute encryption based hidden credentials model |
| title_short | EAEBHCM:an extended attribute encryption based hidden credentials model |
| title_sort | eaebhcm an extended attribute encryption based hidden credentials model |
| topic | attribute encryption hidden credentials trust negotiation conspiracy |
| url | http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436x.2012.12.011/ |
| work_keys_str_mv | AT weijinge eaebhcmanextendedattributeencryptionbasedhiddencredentialsmodel AT xiaohuihu eaebhcmanextendedattributeencryptionbasedhiddencredentialsmodel |