Advertisement

Springer Nature is making SARS-CoV-2 and COVID-19 research free. View research | View latest news | Sign up for updates

New trends of information security —how to change people’s life style?

信息安全新趋势——如何改变人类的生活方式?

摘要

创新点

2007–2008年间, 我们提出并解决了两大信息安全难题, 即密文数据的访问控制问题与不存储生物特征任何信息而实现生物特征比对问题。 随着近几年的发展和完善, 我们在理论和应用上提出了信息安全的三个新趋势: “信道安全+”模型, 密文域上的大数据处理技术, 以及在不得不使用公钥密码算法时, 只使用一次公钥密码算法而实现n个数据安全的新方法。 介绍了我们对上述新趋势的研究结果, 为该领域的进一步奠定了基础。

This is a preview of subscription content, log in to check access.

References

  1. 1

    Cao Z F. New Directions of Modern Cryptography. Boca Raton: CRC Press Inc., 2012. 1–400

  2. 2

    Shao J, Cao Z F, Wang L C, et al. Proxy re-signature schemes without random oracles. In: Proceedings of 8th International Conference on Cryptology in India, Chennai, 2007. 197–209

  3. 3

    Shao J, Cao Z F. CCA-secure proxy re-encryption without pairings. In: Proceedings of 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, 2009. 357–376

  4. 4

    Liu Z, Cao Z F, Huang Q, et al. Fully secure multiauthority ciphertext-policy attribute-based encryption without random oracles. In: Proceedings of 16th European Symposium on Research in Computer Security, Leuven, 2011. 278–297

  5. 5

    Liang X H, Cao Z F, Lin H, et al. Provably secure and efficient bounded ciphertext policy attribute based encryption. In: Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, Sydney, 2009. 343–352

  6. 6

    Lin H, Cao Z F, Liang X H, et al. How to construct interval encryption from binary tree encryption. In: Proceedings of 8th International Conference on Applied Cryptography and Network Security, Beijing, 2010. 19–34

  7. 7

    Cao Z F. New development of cryptography (in Chinese). J Sichuan Univ Eng Sci Ed, 2015, 47: 1–12

  8. 8

    Liu Z, Cao Z F, Wong D S. White-box traceable ciphertext-policy attribute-based encryption supporting any monotone access structures. IEEE Trans Inf Forensics Secur, 2013, 8: 76–88

  9. 9

    Ning J T, Dong X L, Cao Z F, et al. White-box traceable ciphertext-policy attribute-based encryption supporting flexible attributes. IEEE Trans Inf Forensics Secur, 2015, 10: 1274–1288

  10. 10

    Liu Z, Cao Z F, Wong D S. Blackbox traceable CPABE: How to catch people leaking their keys by selling decryption devices on ebay. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, Berlin, 2013. 475–486

  11. 11

    Liu Z, Cao Z F, Wong D S. Traceable CP-ABE: How to trace decryption devices found in the wild. IEEE Trans Inf Forensics Secur, 2015, 10: 55–68

  12. 12

    Liang X H, Cao Z F, Lin H, et al. Attribute based proxy re-encryption with delegating capabilities. In: Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, Sydney, 2009. 276–286

  13. 13

    Qian J L, Dong X L. Fully secure revocable attributebased encryption. J Shanghai Jiaotong Univ Sci Ed, 2011, 16: 490–496

  14. 14

    Sahai A, Seyalioglu H, Waters B. Dynamic credentials and ciphertext delegation for attribute-based encryption. In: Proceedings of 32nd Annual Cryptology Conference, Santa Barbara, 2012. 199–217

  15. 15

    Zhou J, Dong X L, Cao Z F, et al. Secure and privacy preserving protocol for cloud-based vehicular DTNs. IEEE Trans Inf Forensics Secur, 2015, 10: 1299–1314

  16. 16

    Zhou J, Cao Z F, Dong X L, et al. Security and privacy in cloud-assisted wireless wearable communications: challenges, solutions and future directions. IEEE Wirel Commun, 2015, 22: 136–144

  17. 17

    Zhang Z Y, Cao Z F, Ding N, et al. Non-malleable statistically hiding commitment from any one-way function. In: Proceedings of 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, 2009. 303–318

  18. 18

    Cao Z F, Visconti I, Zhang Z Y. Constant-round concurrent non-malleable statistically binding commitments and decommitments. In: Proceedings of 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, 2010. 193–208

  19. 19

    Cao Z F, Visconti I, Zhang Z Y. On constant-round concurrent non-malleable proof systems. Inf Process Lett, 2011, 111: 883–890

  20. 20

    Dong X L, Wei L F, Zhu H J, et al. EP2DF: an efficient privacy preserving data forwarding scheme for serviceoriented vehicular ad hoc networks. IEEE Trans Veh Technol, 2011, 60: 580–591

  21. 21

    Lin H, Zhu X Y, Fang Y G, et al. Efficient trust based information sharing schemes over distributed collaborative network. IEEE J Sel Areas Commun, 2013, 31: 279–290

  22. 22

    Zhu H J, Du S G, Gao Z Y, et al. A probabilistic misbehavior detection scheme towards efficient trust establishment in delay-tolerant networks. IEEE Trans Parall Distr Syst, 2014, 25: 22–32

  23. 23

    Zhou J, Lin X D, Dong X L, et al. PSMPA: patient self-controllable and multi-level privacy-preserving cooperative authentication in distributed m-healthcare cloud computing system. IEEE Trans Parall Distr Syst, 2015, 26: 1693–1703

Download references

Author information

Correspondence to Zhenfu Cao.

Additional information

The authors declare that they have no conflict of interest.

Rights and permissions

Reprints and Permissions

About this article

Verify currency and authenticity via CrossMark

Cite this article

Cao, Z. New trends of information security —how to change people’s life style?. Sci. China Inf. Sci. 59, 050106 (2016). https://doi.org/10.1007/s11432-016-5558-0

Download citation

关键词

  • 密文访问控制
  • 信道安全+
  • 密文大数据处理
  • 隐私保护