Security Investigate

Hidden Attribute Certificate-Based Encryption Extensions Model

Download now Free registration required

Executive Summary

An encryption extensions model based on hidden attribute certificate is proposed in this paper, which can represent any key by using "And", "or" Logic and the threshold monotony of the access rules, and in order to resist the collusion attack, multiple users use a combination of their keys to decrypt the ciphertext, it virtually eliminates the possibility of a conspiracy to know the key. In the cross-domain large Internet network, in order to ensure users' own security, before the communication with others, users must first assume whether the others are potentially malicious objects, only after the full test of the mutual contact and authorization certificates interaction, communication and transactions subjects can establish trusted relationships in distributed environment.

  • Format: PDF
  • Size: 280.93 KB