Please wait a minute...
Computer & Telecommunication
Current Issue | Archive | Adv Search |
Secure Self-Destruction Scheme for Publicly Posted Composite Documents with Hierarchical Identity-based Encryption
Fujian Provincial Education ExaminationsAuthority
Download:   PDF(0KB)
Export: BibTeX | EndNote (RIS)      
Abstract  To deal with the issue of lifecycle security of Publicly Posted Composite Documents (PPCD) which was proposed in re- cent years, in this paper, we propose a Secure Self-Destruction Scheme for Publicly Posted Composite Documents with Hierarchical Identity-based Encryption (HICDSS), which can protect a user’s sensitive PPCD automatically destructed after a period of time. We form a new structure of the PPCD with different security levels. We firstly encrypt the different security documents into ciphertexts by different symmetric keys and encrypt the symmetric keys using the HIBE algorithm; then use the Mingle Shares Generaion algo- rithm to make the part of document’s ciphertext and the symmetric key’s ciphertext into mixed ciphertext, and sent the mixed ci- phertext into the Object Storage System; finally we analyze and prove the security, efficiency and performance of the HICDSS scheme.
Key wordsPPCD      secure deletion      HIBE      OSS     
Published: 24 February 2021

Cite this article:

DAI Su-fen. Secure Self-Destruction Scheme for Publicly Posted Composite Documents with Hierarchical Identity-based Encryption. Computer & Telecommunication, 2021, 1(1): 41-45.

URL:

http://www.computertelecom.com.cn/EN/     OR     http://www.computertelecom.com.cn/EN/Y2021/V1/I1/41

[1] GU Yu-fei SUN Kai-bin TANG Jia-lei DU Yu-ren. QRS Complex Recognition Method Based on Differential Zero - crossing Detection Method[J]. 电脑与电信, 2021, 1(7): 56-59.
[2] XIAO Cheng-wei. Design of the G.657 Single-mode Fiber Based on OptiFiber Simulation System[J]. 电脑与电信, 2020, 1(8): 36-40.
[3] FU Yu. Image Super-resolution Reconstruction Based on LapSRN[J]. 电脑与电信, 2020, 1(5): 71-74.
[4] YANG Jing. Innovative and Entrepreneurial Cross-border E-commerce Training Mode for Private Universities in Shaanxi Province[J]. 电脑与电信, 2020, 1(4): 1-4.
[5] FENG Jin GAO Wen-bin ZENG Zhi-yang LI Zhu. Design of High Speed Cross Sampling Based on FPGA and AD9226[J]. 电脑与电信, 2020, 1(1-2): 6-10.
[6] SHANG Yong-tao CAO Liang-wen ZHU Jun-zhi HE Xiang-yu XIAO Yu. Modeling of Radio Wave Propagation Loss in Space[J]. 电脑与电信, 2019, 1(6): 25-27.
[7] LIU Jia-ju HOU Ya-ling. Simulation Analysis of Power Amplifier Circuit Based on Multisim[J]. 电脑与电信, 2018, 1(12): 8-10.
[8] WENG Qiu-hua, YU Yong-cheng, OU Hai-yan. Research and Realization of Remote Login System of Linux Based on Java[J]. 电脑与电信, 2017, 1(12): 32-35.
[9] Cui Yumei. Signal Integrity Analysis Based on Altium Designer[J]. 电脑与电信, 2016, 1(9): 92-95.
[10] ZhengWeihong, Lin Zhu. Design on the Information Statistics Management System of Key Laboratory Based on SSH Framework[J]. 电脑与电信, 2016, 1(6): 13-15.
[11] WeiWenping. Analysis on the Application of OTN technology in Provincial Trunk Transmission Network[J]. 电脑与电信, 2016, 1(6): 46-48.
[12] Xie Cuiqin, Wu Chun. Data Transmission Scheme for Operators Based on Hadoop and OGG[J]. 电脑与电信, 2016, 1(6): 71-73.
[13] Yang Jiaying. The Principle of CSRF and Protective Measures[J]. 电脑与电信, 2016, 1(3): 81-83.
[14] Lv Taizhi, Liu Chenyi. Design and Implementation of the Server of Student Tracking System[J]. 电脑与电信, 2016, 1(11): 16-18.
[15] Guo Jianfang. Analysis on the Development of Cross-border Electricity Suppliers in the Experimentation Area——Taking Hangzhou Comprehensive Area as An Example[J]. 电脑与电信, 2015, 1(12): 30-31.
Copyright © Computer & Telecommunication, All Rights Reserved.
Powered by Beijing Magtech Co. Ltd