RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • KCI등재

        Efficient and Secure Identity-Based Public Auditing for Dynamic Outsourced Data with Proxy

        ( Haiyang Yu ),( Yongquan Cai ),( Shanshan Kong ),( Zhenhu Ning ),( Fei Xue ),( Han Zhong ) 한국인터넷정보학회 2017 KSII Transactions on Internet and Information Syst Vol.11 No.10

        Cloud storage becomes a new trend that more and more users move their data to cloud storage servers (CSSs). To ensure the security of cloud storage, many cloud auditing schemes are proposed to check the integrity of users’ cloud data. However, most of them are based on public key infrastructure, which leads to complex certificates management and verification. Besides, most existing auditing schemes are inefficient when user uploads a large amount of data or a third party auditor (TPA) performs auditing for multiple users’ data on different CSSs. To overcome these problems, in this paper, we propose an efficient and secure auditing scheme based on identity-based cryptography. To relieve user’s computation burden, we introduce a proxy, which is delegated to generate and upload homomorphic verifiable tags for user. We extend our auditing scheme to support auditing for dynamic data operations. We further extend it to support batch auditing in multiple users and multiple CSSs setting, which is practical and efficient in large scale cloud storage system. Extensive security analysis shows that our scheme is provably secure in random oracle model. Performance analysis demonstrates that our scheme is highly efficient, especially reducing the computation cost of proxy and TPA.

      • Semi-quantum Key Distribution Protocol Based on Bell States

        Haiyang Yu,Yongquan Cai,Shanshan Kong,Fei Xue,Ditta Allah 보안공학연구지원센터 2016 International Journal of Security and Its Applicat Vol.10 No.12

        A quantum key distribution protocol with traditional Bob has been proposed recently by Boyer et al. using single-particle state. In this paper, a semi-quantum key distribution protocol is described, in which Einstein-Podolsky-Rosen (EPR) pairs of particles are utilized to generate a secret key in remote places. This extends the quantum key distribution protocol with traditional Bob where the single-qubit channel is replaced by the entangled EPR-pair channel. And quantum Alice is able to do any quantum operations, preparing quantum states and performing quantum measurement, but traditional Bob is not able to prepare and measure a particle in the computational basis, reflect the particles. Furthermore, entanglement states are used in our protocol. The analysis shows that our protocol is secure, which can avoid the beam splitter attack automatically, and the proposed protocol is more efficient than Boyer’s scheme.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼