学习、批判、守正、创新

研究

密码学与安全协议

发布时间:2023-03-13浏览次数:23

密码学一开始的功能是在有恶意攻击者存在的环境下,保护双方通信安全,现在是用来保护信息安全的核心技术。

现代信息安全的基本要求:

信息的保密性 Confidentiality:防止信息泄漏给未经授权的人(加密解密技术)

信息的完整性 Integrity:防止信息被未经授权的篡改(消息认证码,数字签名)

认证性 Authentication:保证信息来自正确的发送者(消息认证码,数字签名)

不可否认性 Non-repudiation:保证发送者不能否认他们已发送的消息(数字签名)

  

  

近几年发表论文

[1] Lin, X.-J., Sun, L. and Qu, H. (2021) “Cryptanalysis of an anonymous and traceable group data sharing in cloud computing.” IEEE Transactions on Information Forensics and Security, 16, pp. 2773–2775. Available at: https://doi.org/10.1109/tifs.2021.3065505.

[1] Lin, X.-J. , Wang, Q. , Sun, L. and Qu, H. (2021) “Identity-based encryption with Equality Test and Datestamp-based authorization mechanism.” Theoretical Computer Science, 861, pp. 117–132. Available at: https://doi.org/10.1016/j.tcs.2021.02.015.

[3] Lin, X.-J., Sun, L. , H. Qu. , and X. Zhang (2021) “Public key encryption supporting equality test and flexible authorization without bilinear pairings.” Computer Communications, 170, pp. 190–199. Available at: https://doi.org/10.1016/j.comcom.2021.02.006.

[4] Lin, X. J. , Wang, Q. , Sun, L. , Yan, Z. , & Liu, P. (2020) “Security analysis of the first certificateless proxy signature scheme against malicious-but-passive KGC attacks.” The Computer Journal, 64(4), pp. 653–660. Available at: https://doi.org/10.1093/comjnl/bxaa105.

[5] Lin, X.-J., Sun, L. and Qu, H. (2020) “Leakage-free ID-based signature, revisited.” The Computer Journal, 63(8), pp. 1263–1270. Available at: https://doi.org/10.1093/comjnl/bxz160.

[6] Lin, X. J. , Sun, L. , Yan, Z. , Zhang, X. , & Qu, H. (2020) “On the security of a certificateless signcryption with known session-specific temporary information security in the standard model.” The Computer Journal, 63(8), pp. 1259–1262. Available at: https://doi.org/10.1093/comjnl/bxz157.

[7] Lin, X. J. , Sun, L. , Qu, H. , & Xian, H. Q. (2018) “Cryptanalysis of a compact anonymous hibe with constant size private keys.” The Computer Journal, 62(8), pp. 1087–1091. Available at: https://doi.org/10.1093/comjnl/bxy130.

[8] Lin, X. J. , Sun, L. , Qu, H. , & Liu, D. (2018) “On the security of secure server-designation public key encryption with Keyword Search.” The Computer Journal, 61(12), pp. 1791–1793. Available at: https://doi.org/10.1093/comjnl/bxy073.

[9] Qu, H. , Zhen, Y. , Lin, X. J. , Qi, Z. , & Sun, L. . (2018) “Certificateless public key encryption with Equality Test.” Information Sciences, 462, pp. 76–92. Available at: https://doi.org/10.1016/j.ins.2018.06.025.

[10] Lin, X.-J., Sun, L. and Qu, H. (2018) “Generic construction of public key encryption, identity-based encryption and signcryption with Equality Test.” Information Sciences, 453, pp. 111–126. Available at: https://doi.org/10.1016/j.ins.2018.04.035.

[11] Xi-Jun, L. , Sun, L. , Qu, H. , & Liu, D. . (2017) “Cryptanalysis of a pairing-free certificateless signcryption scheme.” TheComputer Journal, 61(4), pp.539–544. Available at: https://doi.org/10.1093/comjnl/bxx104.