New trends of information security —how to change people’s life style?

信息安全新趋势——如何改变人类的生活方式?

摘要

创新点

2007–2008年间, 我们提出并解决了两大信息安全难题, 即密文数据的访问控制问题与不存储生物特征任何信息而实现生物特征比对问题。 随着近几年的发展和完善, 我们在理论和应用上提出了信息安全的三个新趋势: “信道安全+”模型, 密文域上的大数据处理技术, 以及在不得不使用公钥密码算法时, 只使用一次公钥密码算法而实现n个数据安全的新方法。 介绍了我们对上述新趋势的研究结果, 为该领域的进一步奠定了基础。

This is a preview of subscription content, access via your institution.

References

  1. 1

    Cao Z F. New Directions of Modern Cryptography. Boca Raton: CRC Press Inc., 2012. 1–400

    Book  MATH  Google Scholar 

  2. 2

    Shao J, Cao Z F, Wang L C, et al. Proxy re-signature schemes without random oracles. In: Proceedings of 8th International Conference on Cryptology in India, Chennai, 2007. 197–209

    Google Scholar 

  3. 3

    Shao J, Cao Z F. CCA-secure proxy re-encryption without pairings. In: Proceedings of 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, 2009. 357–376

    Google Scholar 

  4. 4

    Liu Z, Cao Z F, Huang Q, et al. Fully secure multiauthority ciphertext-policy attribute-based encryption without random oracles. In: Proceedings of 16th European Symposium on Research in Computer Security, Leuven, 2011. 278–297

    Google Scholar 

  5. 5

    Liang X H, Cao Z F, Lin H, et al. Provably secure and efficient bounded ciphertext policy attribute based encryption. In: Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, Sydney, 2009. 343–352

    Google Scholar 

  6. 6

    Lin H, Cao Z F, Liang X H, et al. How to construct interval encryption from binary tree encryption. In: Proceedings of 8th International Conference on Applied Cryptography and Network Security, Beijing, 2010. 19–34

    Google Scholar 

  7. 7

    Cao Z F. New development of cryptography (in Chinese). J Sichuan Univ Eng Sci Ed, 2015, 47: 1–12

    MathSciNet  Google Scholar 

  8. 8

    Liu Z, Cao Z F, Wong D S. White-box traceable ciphertext-policy attribute-based encryption supporting any monotone access structures. IEEE Trans Inf Forensics Secur, 2013, 8: 76–88

    Article  Google Scholar 

  9. 9

    Ning J T, Dong X L, Cao Z F, et al. White-box traceable ciphertext-policy attribute-based encryption supporting flexible attributes. IEEE Trans Inf Forensics Secur, 2015, 10: 1274–1288

    Article  Google Scholar 

  10. 10

    Liu Z, Cao Z F, Wong D S. Blackbox traceable CPABE: How to catch people leaking their keys by selling decryption devices on ebay. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, Berlin, 2013. 475–486

    Google Scholar 

  11. 11

    Liu Z, Cao Z F, Wong D S. Traceable CP-ABE: How to trace decryption devices found in the wild. IEEE Trans Inf Forensics Secur, 2015, 10: 55–68

    Article  Google Scholar 

  12. 12

    Liang X H, Cao Z F, Lin H, et al. Attribute based proxy re-encryption with delegating capabilities. In: Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, Sydney, 2009. 276–286

    Google Scholar 

  13. 13

    Qian J L, Dong X L. Fully secure revocable attributebased encryption. J Shanghai Jiaotong Univ Sci Ed, 2011, 16: 490–496

    Article  MATH  Google Scholar 

  14. 14

    Sahai A, Seyalioglu H, Waters B. Dynamic credentials and ciphertext delegation for attribute-based encryption. In: Proceedings of 32nd Annual Cryptology Conference, Santa Barbara, 2012. 199–217

    Google Scholar 

  15. 15

    Zhou J, Dong X L, Cao Z F, et al. Secure and privacy preserving protocol for cloud-based vehicular DTNs. IEEE Trans Inf Forensics Secur, 2015, 10: 1299–1314

    Article  Google Scholar 

  16. 16

    Zhou J, Cao Z F, Dong X L, et al. Security and privacy in cloud-assisted wireless wearable communications: challenges, solutions and future directions. IEEE Wirel Commun, 2015, 22: 136–144

    Article  Google Scholar 

  17. 17

    Zhang Z Y, Cao Z F, Ding N, et al. Non-malleable statistically hiding commitment from any one-way function. In: Proceedings of 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, 2009. 303–318

    Google Scholar 

  18. 18

    Cao Z F, Visconti I, Zhang Z Y. Constant-round concurrent non-malleable statistically binding commitments and decommitments. In: Proceedings of 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, 2010. 193–208

    Google Scholar 

  19. 19

    Cao Z F, Visconti I, Zhang Z Y. On constant-round concurrent non-malleable proof systems. Inf Process Lett, 2011, 111: 883–890

    MathSciNet  Article  MATH  Google Scholar 

  20. 20

    Dong X L, Wei L F, Zhu H J, et al. EP2DF: an efficient privacy preserving data forwarding scheme for serviceoriented vehicular ad hoc networks. IEEE Trans Veh Technol, 2011, 60: 580–591

    Article  Google Scholar 

  21. 21

    Lin H, Zhu X Y, Fang Y G, et al. Efficient trust based information sharing schemes over distributed collaborative network. IEEE J Sel Areas Commun, 2013, 31: 279–290

    Article  Google Scholar 

  22. 22

    Zhu H J, Du S G, Gao Z Y, et al. A probabilistic misbehavior detection scheme towards efficient trust establishment in delay-tolerant networks. IEEE Trans Parall Distr Syst, 2014, 25: 22–32

    Article  Google Scholar 

  23. 23

    Zhou J, Lin X D, Dong X L, et al. PSMPA: patient self-controllable and multi-level privacy-preserving cooperative authentication in distributed m-healthcare cloud computing system. IEEE Trans Parall Distr Syst, 2015, 26: 1693–1703

    Article  Google Scholar 

Download references

Author information

Affiliations

Authors

Corresponding author

Correspondence to Zhenfu Cao.

Additional information

The authors declare that they have no conflict of interest.

Rights and permissions

Reprints and Permissions

About this article

Verify currency and authenticity via CrossMark

Cite this article

Cao, Z. New trends of information security —how to change people’s life style?. Sci. China Inf. Sci. 59, 050106 (2016). https://doi.org/10.1007/s11432-016-5558-0

Download citation

关键词

  • 密文访问控制
  • 信道安全+
  • 密文大数据处理
  • 隐私保护