吉林大学学报(工学版) ›› 2018, Vol. 48 ›› Issue (2): 551-557.doi: 10.13229/j.cnki.jdxbgxb20171141

Previous Articles     Next Articles

Identity-based encryption scheme based on cloud and quantum keys

HAN Jia-wei1, 2, LIU Yan-heng1, 3, SUN Xin3, SONG Li-jun2   

  1. 1.College of Computer Science and Technology, Jilin University, Changchun 130012,China;
    2. Quantum Cryptography Laboratory, Changchun University, Changchun 130022,China;
    3.Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education, Jilin University, Changchun 130012,China
  • Received:2017-07-06 Online:2018-03-01 Published:2018-03-01

Abstract: In order to handle the safety problems in the Identity-based Encryption (IBE) key schemes associated with the existing cloud services, an IBE scheme based on quantum secret keys and cloud service is proposed. First, the quantum encryption technology is introduced to handle the safety problems of information transmission between the private key generator and the cloud services, involving user privacy information and revocation lists, etc. Next, the quantum time token mechanism is proposed to safely distribute and manage users' secret keys. Finally, the user revocation management is safely and effectively achieved by sharing the quantum secret keys and using the cloud services. Comparing with the existing schemes, the proposed scheme can make full use of the advantages of the quantum encryption technology and the cloud computing services. The secret key management and user revocation of the IBE public key scheme can be more safely and effectively done, and multiple safety hazards can be avoided with better safety and practicality in the cloud computing environment. Experimental results in the real quantum key distribution and the cloud computing environment demonstrate the feasibility and effectiveness of the proposed scheme.

Key words: computer application, identity based encryption scheme, quantum key distribution, cloud service, quantum time token

CLC Number: 

  • TP393
[1] Wang X A, Ma J,Xhafa F, et al. Cost-effective secure E-health cloud system using identity based cryptographic techniques[J]. Future Generation Computer Systems, 2017, 67: 242-254.
[2] Zhou Y, Deng H, Wu Q, et al. Identity-based proxy re-encryption version 2:making mobile access easy in cloud[J]. Future Generation Computer Systems, 2016, 62: 128-139.
[3] Li J, Li JW, Chen X, et al. Identity-based encryption with outsourced revocation in cloud computing[J]. IEEE Transactions on Computers, 2015, 64(2): 425-437.
[4] Boneh D, Franklin M. Identity based encryption from the Weil pairing [J]. SIAM Journal on Computing, 2001, 32(3): 213-229.
[5] Boldyreva A, Goyal V, Kumar V. Identity-based encryption with efficient revocation[C]∥ ACM Conference on Computer and Communications Security, ACM,Alexandria USA,2008: 417-426.
[6] Alléaume R, Branciard C, Bouda J, et al. Using quantum key distribution for cryptographic purposes:a survey[J]. Theoretical Computer Science, 2014, 560: 62-81.
[7] 郭光灿, 张昊, 王琴. 量子信息技术发展概况[J]. 南京邮电大学学报:自然科学版, 2017, 37(3): 1-14.
Guo Guang-can, Zhang Hao, Wang Qin. Review on development of quantum information technology[J]. Journal of Nanjing University of Posts and Telecommunications (Natural Science Edition), 2017, 37(3): 1-14.
[8] Fröhlich B, Dynes J F, Lucamarini M, et al. A quan-tum access network[J]. Nature, 2013, 501 (7465): 69-72.
[9] Jasim O K, Abbas S, El-Horbaty E S M, et al. Cryptographic cloud computing environment as a more trusted communication environment[J]. International Journal of Grid & High Performance Computing, 2014, 6(2): 38-51.
[10] Thayananthan V, Albeshri A. Big data security issues based on quantum cryptography and privacy with authentication for mobile data center[J]. Procedia Computer Science, 2015, 50: 149-156.
[11] 韩家伟, 刘衍珩, 孙鑫,等. 基于滑动窗口的量子密钥管理算法[J]. 吉林大学学报:工学版, 2016, 46(2): 535-541.
Han Jia-wei, Liu Yan-heng, Sun Xin, et al. Quantum key management algorithm based on sliding window[J]. Journal of Jilin University(Engineering and Technology Edition), 2016, 46(2): 535-541
[12] Fujiwara M, Domeki T, Moriai S, et al. Highly secure network switches with quantum key distribution systems[J]. International Journal of Network Security, 2015, 17(1): 34-39.
[1] LIU Fu,ZONG Yu-xuan,KANG Bing,ZHANG Yi-meng,LIN Cai-xia,ZHAO Hong-wei. Dorsal hand vein recognition system based on optimized texture features [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1844-1850.
[2] WANG Li-min,LIU Yang,SUN Ming-hui,LI Mei-hui. Ensemble of unrestricted K-dependence Bayesian classifiers based on Markov blanket [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1851-1858.
[3] JIN Shun-fu,WANG Bao-shuai,HAO Shan-shan,JIA Xiao-guang,HUO Zhan-qiang. Synchronous sleeping based energy saving strategy of reservation virtual machines in cloud data centers and its performance research [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1859-1866.
[4] ZHAO Dong,SUN Ming-yu,ZHU Jin-long,YU Fan-hua,LIU Guang-jie,CHEN Hui-ling. Improved moth-flame optimization method based on combination of particle swarm optimization and simplex method [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1867-1872.
[5] LIU En-ze,WU Wen-fu. Agricultural surface multiple feature decision fusion disease judgment algorithm based on machine vision [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1873-1878.
[6] OUYANG Dan-tong, FAN Qi. Clause-level context-aware open information extraction [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1563-1570.
[7] LIU Fu, LAN Xu-teng, HOU Tao, KANG Bing, LIU Yun, LIN Cai-xia. Metagenomic clustering method based on k-mer frequency optimization [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1593-1599.
[8] GUI Chun, HUANG Wang-xing. Network clustering method based on improved label propagation algorithm [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1600-1605.
[9] LIU Yuan-ning, LIU Shuai, ZHU Xiao-dong, CHEN Yi-hao, ZHENG Shao-ge, SHEN Chun-zhuang. LOG operator and adaptive optimization Gabor filtering for iris recognition [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1606-1613.
[10] CHE Xiang-jiu, WANG Li, GUO Xiao-xin. Improved boundary detection based on multi-scale cues fusion [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1621-1628.
[11] ZHAO Hong-wei, LIU Yu-qi, DONG Li-yan, WANG Yu, LIU Pei. Dynamic route optimization algorithm based on hybrid in ITS [J]. 吉林大学学报(工学版), 2018, 48(4): 1214-1223.
[12] HUANG Hui, FENG Xi-an, WEI Yan, XU Chi, CHEN Hui-ling. An intelligent system based on enhanced kernel extreme learning machine for choosing the second major [J]. 吉林大学学报(工学版), 2018, 48(4): 1224-1230.
[13] FU Wen-bo, ZHANG Jie, CHEN Yong-le. Network topology discovery algorithm against routing spoofing attack in Internet of things [J]. 吉林大学学报(工学版), 2018, 48(4): 1231-1236.
[14] CAO Jie, SU Zhe, LI Xiao-xu. Image annotation method based on Corr-LDA model [J]. 吉林大学学报(工学版), 2018, 48(4): 1237-1243.
[15] HOU Yong-hong, WANG Li-wei, XING Jia-ming. HTTP-based dynamic adaptive streaming video transmission algorithm [J]. 吉林大学学报(工学版), 2018, 48(4): 1244-1253.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] XU Hong-feng, GAO Shuang-shuang, ZHENG Qi-ming, ZHANG Kun. Hybrid dynamic lane operation at signalized intersection[J]. 吉林大学学报(工学版), 2018, 48(2): 430 -439 .
[2] YANG Hong-yu, XU Jin. An Android malware static detection model[J]. 吉林大学学报(工学版), 2018, 48(2): 564 -570 .
[3] LIU Zhou-zhou, PENG Han. Topology control algorithm based on node reliability in WSN[J]. 吉林大学学报(工学版), 2018, 48(2): 571 -577 .