• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Li Chunhua, Wang Hua, Zhang Yanzhe, Zhou Ke. Optimization for Broadcast Encryption in Cloud Using Extended Public Key[J]. Journal of Computer Research and Development, 2017, 54(12): 2818-2824. DOI: 10.7544/issn1000-1239.2017.20170902
Citation: Li Chunhua, Wang Hua, Zhang Yanzhe, Zhou Ke. Optimization for Broadcast Encryption in Cloud Using Extended Public Key[J]. Journal of Computer Research and Development, 2017, 54(12): 2818-2824. DOI: 10.7544/issn1000-1239.2017.20170902

Optimization for Broadcast Encryption in Cloud Using Extended Public Key

More Information
  • Published Date: November 30, 2017
  • Security issues have been a major hurdle for the application of cloud storage. As data encryption is the mainstream method to ensure confidentiality, users always share their data by means of key's management and distribution. However, how to manage massive keys and distribute them securely and efficiently is a challenge in cloud storage. In recent years, broadcast encryption scheme has been paid more attention by researchers to mitigate above problems for cloud data sharing. Since current schemes take insufficient account of changes of users and users's privilege, they do not perform well in cloud. To reduce the overhead of key distribution, an optimization method is proposed for public-key based broadcast encryption in this paper. First, the scope of public keys is expanded to two or more times and the initial related parameters used for generating public keys are kept simultaneously. These parameters can ensure private keys distributed previously still available when they are employed to generate the new public keys for new valid users, thus greatly decreases the cost of redistributing private keys. Second, lazy revocation is adopted to reduce the cost of updating keys. Experimental results show that our optimized method outperforms the existing schemes while adding new users and revoking users' privilege in cloud.
  • Related Articles

    [1]Yu Zihao, Chen Lu, Sun Ninghui, Bao Yungang. Quality Optimization Method of Dynamic Binary Translation Code Targeting for RISC-V[J]. Journal of Computer Research and Development, 2023, 60(10): 2322-2334. DOI: 10.7544/issn1000-1239.202220296
    [2]Yu Yaxin, Zhang Wenchao, Li Zhenguo, Li Ying. Hypergraph-Based Personalized Recommendation & Optimization Algorithm in EBSN[J]. Journal of Computer Research and Development, 2020, 57(12): 2556-2570. DOI: 10.7544/issn1000-1239.2020.20190275
    [3]Fu Yongquan, Li Dongsheng. Application Driven Network Latency Measurement Analysis and Optimization Techniques Edge Computing Environment: A Survey[J]. Journal of Computer Research and Development, 2018, 55(3): 512-523. DOI: 10.7544/issn1000-1239.2018.20170793
    [4]Wu Fenfen, Liu Ligang. Stable Equilibrium Optimization for 3D Printed Objects[J]. Journal of Computer Research and Development, 2017, 54(3): 549-556. DOI: 10.7544/issn1000-1239.2017.20150911
    [5]Zhong Ming, Wang Sheng, and Liu Mengchi. An Optimization Approach of Known-Item Search on Large-Scale Graph Data[J]. Journal of Computer Research and Development, 2014, 51(1): 54-63.
    [6]Zhao Yuelong, Xie Xiaoling, Cai Yongcai, Wang Guohua, and Liu Lin. A Strategy of Small File Storage Access with Performance Optimization[J]. Journal of Computer Research and Development, 2012, 49(7): 1579-1586.
    [7]Tang Tao, Yang Xuejun, and Lin Yisong. Locality Analysis and Optimization for Stream Programs Based on Iteration Sequence[J]. Journal of Computer Research and Development, 2012, 49(6): 1363-1375.
    [8]Zhao Xia, Guo Yao, Chen Xiangqun. Research Progresses on Energy-Efficient Software Optimization Techniques[J]. Journal of Computer Research and Development, 2011, 48(12): 2308-2316.
    [9]Wang Jin, Li Dequan, and Feng Dengguo. An Automatically Optimized Distributed Intrusion Detection System Using Mobile Agent[J]. Journal of Computer Research and Development, 2006, 43(1): 9-14.
    [10]Dou Quansheng, Zhou Chunguang, and Ma Ming. Two Improvement Strategies for Particle Swarm Optimization[J]. Journal of Computer Research and Development, 2005, 42(5): 897-904.
  • Cited by

    Periodical cited type(3)

    1. 袁明新,张全兵,申一虎,申燚. 轮毂锻造机器人欠秩耦合端拾器结构设计及优化. 机械科学与技术. 2022(08): 1197-1204 .
    2. 谢志强,周伟,杨静. 工艺树子树循环分解的资源协同综合调度算法. 机械工程学报. 2022(13): 228-239 .
    3. 胡北辰. 基于密度峰值的网络用户信息聚类局部自适应加密研究. 成都工业学院学报. 2020(04): 43-47 .

    Other cited types(3)

Catalog

    Article views (1086) PDF downloads (495) Cited by(6)

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return