원문정보
보안공학연구지원센터(IJSIA)
International Journal of Security and Its Applications
Vol.6 No.2
2012.04
pp.469-474
피인용수 : 0건 (자료제공 : 네이버학술정보)
초록
영어
An encryption extensions model based on hidden attribute certificate is proposed in this paper, which can represent any key by using "and", "or" logic and the threshold monotony of the access rules, and in order to resist the collusion attack, multiple users use a combination of their keys to decrypt the ciphertext, it virtually eliminates the possibility of a conspiracy to know the key.
목차
Abstract
1. Introduction
2. Related Work
3. Extended Architecture Model
4. System Construction
5. Trust Negotiation Process of Two Sides
6. Trust Negotiation Process of Multi-sides
7. Performance Analysis
8. Conclusion
Acknowledgements
References
1. Introduction
2. Related Work
3. Extended Architecture Model
4. System Construction
5. Trust Negotiation Process of Two Sides
6. Trust Negotiation Process of Multi-sides
7. Performance Analysis
8. Conclusion
Acknowledgements
References
저자정보
참고문헌
자료제공 : 네이버학술정보
