• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Cao Zhenfu. New Devolopment of Information Security——For the 60th Anniversary of Journal of Computer Research and Development[J]. Journal of Computer Research and Development, 2019, 56(1): 131-137. DOI: 10.7544/issn1000-1239.2019.20180756
Citation: Cao Zhenfu. New Devolopment of Information Security——For the 60th Anniversary of Journal of Computer Research and Development[J]. Journal of Computer Research and Development, 2019, 56(1): 131-137. DOI: 10.7544/issn1000-1239.2019.20180756

New Devolopment of Information Security——For the 60th Anniversary of Journal of Computer Research and Development

More Information
  • Published Date: December 31, 2018
  • This article firstly identifies the most important trend in the development of information security is that finding new security issues by introducing cryptographic techniques into the field of system security, which enables that cryptographic security has been increasingly applied in almost every aspect of the computer system. Besides, we present the new characteristics of modern cryptography resulted from this new application and new types of service mode, including that the entity has been transformed from single mode to multiparty mode, the position has been transformed from local mode to remote mode, and the security model has been transformed from channel security model to “channel security plus” model. Based on the new features given above, we mainly focus on discussing both the state-of-the-art and the future directions for theorectical research in the aspects of ciphertext access control, secure outsourced comutation, secure search, electronic currency and blockchain security, and privacy-preserving in artificial intelligence and machine learning. Finally, we also introduce some application results, including the hardware development of the mobile device for encrypted data sharing and the identity authentication based on biological information.
  • Related Articles

    [1]Qin Zhen, Zhuang Tianming, Zhu Guosong, Zhou Erqiang, Ding Yi, Geng Ji. Survey of Security Attack and Defense Strategies for Artificial Intelligence Model[J]. Journal of Computer Research and Development, 2024, 61(10): 2627-2648. DOI: 10.7544/issn1000-1239.202440449
    [2]Wei Zishu, Han Yue, Liu Sihao, Zhang Shengyu, Wu Fei. Lookahead Analysis and Discussion of Research Hotspots in Artificial Intelligence from 2021 to 2023[J]. Journal of Computer Research and Development, 2024, 61(5): 1261-1275. DOI: 10.7544/issn1000-1239.202440063
    [3]Zhou Wei, Wang Chao, Xu Jian, Hu Keyong, Wang Jinlong. Privacy-Preserving and Decentralized Federated Learning Model Based on the Blockchain[J]. Journal of Computer Research and Development, 2022, 59(11): 2423-2436. DOI: 10.7544/issn1000-1239.20220470
    [4]Wang Chenxu, Cheng Jiacheng, Sang Xinxin, Li Guodong, Guan Xiaohong. Data Privacy-Preserving for Blockchain: State of the Art and Trends[J]. Journal of Computer Research and Development, 2021, 58(10): 2099-2119. DOI: 10.7544/issn1000-1239.2021.20210804
    [5]Liu Feng, Yang Jie, Li Zhibin, Qi Jiayin. A Secure Multi-Party Computation Protocol for Universal Data Privacy Protection Based on Blockchain[J]. Journal of Computer Research and Development, 2021, 58(2): 281-290. DOI: 10.7544/issn1000-1239.2021.20200751
    [6]Chen Yufei, Shen Chao, Wang Qian, Li Qi, Wang Cong, Ji Shouling, Li Kang, Guan Xiaohong. Security and Privacy Risks in Artificial Intelligence Systems[J]. Journal of Computer Research and Development, 2019, 56(10): 2135-2150. DOI: 10.7544/issn1000-1239.2019.20190415
    [7]Wang Baonan, Hu Feng, Zhang Huanguo, Wang Chao. From Evolutionary Cryptography to Quantum Artificial Intelligent Cryptography[J]. Journal of Computer Research and Development, 2019, 56(10): 2112-2134. DOI: 10.7544/issn1000-1239.2019.20190374
    [8]Xu Wenyu, Wu Lei, Yan Yunxue. Privacy-Preserving Scheme of Electronic Health Records Based on Blockchain and Homomorphic Encryption[J]. Journal of Computer Research and Development, 2018, 55(10): 2233-2243. DOI: 10.7544/issn1000-1239.2018.20180438
    [9]Zhu Liehuang, Gao Feng, Shen Meng, Li Yandong, Zheng Baokun, Mao Hongliang, Wu Zhen. Survey on Privacy Preserving Techniques for Blockchain Technology[J]. Journal of Computer Research and Development, 2017, 54(10): 2170-2186. DOI: 10.7544/issn1000-1239.2017.20170471
    [10]Cao Zhenfu, Dong Xiaolei, Zhou Jun, Shen Jiachen, Ning Jianting, Gong Junqing. Research Advances on Big Data Security and Privacy Preserving[J]. Journal of Computer Research and Development, 2016, 53(10): 2137-2151. DOI: 10.7544/issn1000-1239.2016.20160684
  • Cited by

    Periodical cited type(2)

    1. 刘梦君,蒋新宇,石斯瑾,江南,吴笛. 人工智能教育融合安全警示:来自机器学习算法功能的原生风险分析. 江南大学学报(人文社会科学版). 2022(05): 89-101 .
    2. 刘波涛,彭长根,吴睿雪,丁红发,谢明明. 面向数字型的轻量级保形加密算法研究. 计算机研究与发展. 2019(07): 1488-1497 . 本站查看

    Other cited types(4)

Catalog

    Article views (1705) PDF downloads (833) Cited by(6)

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return