ISSN 1000-1239 CN 11-1777/TP

计算机研究与发展 ›› 2019, Vol. 56 ›› Issue (1): 131-137.doi: 10.7544/issn1000-1239.2019.20180756

• 综述 • 上一篇    下一篇



  1. (华东师范大学计算机科学与软件工程学院 上海 200062) (
  • 出版日期: 2019-01-01

New Devolopment of Information Security——For the 60th Anniversary of Journal of Computer Research and Development

Cao Zhenfu   

  1. (School of Computer Science and Software Engineering, East China Normal University, Shanghai 200062)
  • Online: 2019-01-01

摘要: 首先提出了信息安全发展过程中最大的趋势:在系统安全领域不断引入密码技术并产生新的密码问题,使得密码安全不断地渗透到系统的方方面面.其次,阐述了“渗透”加上新的服务运营模式导致现代密码学呈现了新的景象,即“端端”单方模式改变为多方模式、“位置”本地模式改变为异地模式与“安全模型”由信道安全改变为“信道安全+”模型等.在此基础上,较详细介绍了密文访问控制、安全外包计算、安全搜索、电子货币与区块链安全、人工智能与机器学习中的安全与隐私保护等方面的最新理论研究进展与未来发展方向.此外,还介绍了一些成果的应用,包括加密数据共享移动设备硬件研制与基于生物信息的身份鉴别类应用等.

关键词: 信息安全, 密文访问控制, 安全外包计算, 安全搜索, 区块链安全, 人工智能隐私保护

Abstract: This article firstly identifies the most important trend in the development of information security is that finding new security issues by introducing cryptographic techniques into the field of system security, which enables that cryptographic security has been increasingly applied in almost every aspect of the computer system. Besides, we present the new characteristics of modern cryptography resulted from this new application and new types of service mode, including that the entity has been transformed from single mode to multiparty mode, the position has been transformed from local mode to remote mode, and the security model has been transformed from channel security model to “channel security plus” model. Based on the new features given above, we mainly focus on discussing both the state-of-the-art and the future directions for theorectical research in the aspects of ciphertext access control, secure outsourced comutation, secure search, electronic currency and blockchain security, and privacy-preserving in artificial intelligence and machine learning. Finally, we also introduce some application results, including the hardware development of the mobile device for encrypted data sharing and the identity authentication based on biological information.

Key words: information security, ciphertext access control, secure outsourced computation, secure search, blockchain security, privacy-preserving in artificial intelligence