信息安全的新发展——为《计算机研究与发展》创刊六十周年而作
详细信息    查看全文 | 推荐本文 |
  • 英文篇名:New Devolopment of Information Security——For the 60th Anniversary of Journal of Computer Research and Development
  • 作者:曹珍富
  • 英文作者:Cao Zhenfu;School of Computer Science and Software Engineering,East China Normal University;
  • 关键词:信息安全 ; 密文访问控制 ; 安全外包计算 ; 安全搜索 ; 区块链安全 ; 人工智能隐私保护
  • 英文关键词:information security;;ciphertext access control;;secure outsourced computation;;secure search;;blockchain security;;privacy-preserving in artificial intelligence
  • 中文刊名:JFYZ
  • 英文刊名:Journal of Computer Research and Development
  • 机构:华东师范大学计算机科学与软件工程学院;
  • 出版日期:2018-12-21 15:15
  • 出版单位:计算机研究与发展
  • 年:2019
  • 期:v.56
  • 语种:中文;
  • 页:JFYZ201901012
  • 页数:7
  • CN:01
  • ISSN:11-1777/TP
  • 分类号:135-141
摘要
首先提出了信息安全发展过程中最大的趋势:在系统安全领域不断引入密码技术并产生新的密码问题,使得密码安全不断地渗透到系统的方方面面.其次,阐述了"渗透"加上新的服务运营模式导致现代密码学呈现了新的景象,即"端端"单方模式改变为多方模式、"位置"本地模式改变为异地模式与"安全模型"由信道安全改变为"信道安全+"模型等.在此基础上,较详细介绍了密文访问控制、安全外包计算、安全搜索、电子货币与区块链安全、人工智能与机器学习中的安全与隐私保护等方面的最新理论研究进展与未来发展方向.此外,还介绍了一些成果的应用,包括加密数据共享移动设备硬件研制与基于生物信息的身份鉴别类应用等.
        This article firstly identifies the most important trend in the development of information security is that finding new security issues by introducing cryptographic techniques into the field of system security,which enables that cryptographic security has been increasingly applied in almost every aspect of the computer system.Besides,we present the new characteristics of modern cryptography resulted from this new application and new types of service mode,including that the entity has been transformed from single mode to multiparty mode,the position has been transformed from local mode to remote mode,and the security model has been transformed from channel security model to"channel security plus"model.Based on the new features given above,we mainly focus on discussing both the state-of-the-art and the future directions for theorectical research in the aspects of ciphertext access control,secure outsourced comutation,secure search,electronic currency and blockchain security,and privacy-preserving in artificial intelligence and machine learning.Finally,we also introduce some application results,including the hardware development of the mobile device for encrypted data sharing and the identity authentication based on biological information.
引文
[1]Cao Zhenfu.Public Key Cryptography[M].Heilongjiang:Heilongjiang Education Press,1993(in Chinese)(曹珍富.公钥密码学[M].黑龙江:黑龙江教育出版社,1993)
    [2]Cao Zhenfu.New Directions of Modern Cryptography[M].Boca Raton,FL:CRC Press,2012
    [3]Cao Zhenfu,Dong Xiaolei,Zhou Jun,et al.Research advances on big data security and privacy preserving[J].Journal of Computer Research and Development,2016,53(10):2137-2151(in Chinese)(曹珍富,董晓蕾,周俊,等.大数据安全与隐私保护研究进展[J].计算机研究与发展,2016,53(10):2137-2151)
    [4]Cao Zhenfu.New trends of information security-how to change people's life style/[J].SCIENCE CHINAInformation Sciences,2016,59(5):050106:1-050106:3
    [5]Cao Zhenfu.New development of cryptography[J].Journal of Sichuan University:Engineering Science Edition,2015,47(1):1-12(in Chinese)(曹珍富.密码学的新发展[J].四川大学学报:工程科学版,2015,47(1):1-12)
    [6]Liu Zhen,Cao Zhenfu,Wong D S.Blackbox traceable CP-ABE:How to catch people leaking their keys by selling decryption devices on eBay[C]Proc of the 2013 ACMSIGSAC Conf on Computer&Communications Security.New York:ACM,2013:475-486
    [7]Ning Jianting,Dong Xiaolei,Cao Zhenfu,et al.White-box traceable ciphertext-policy attribute-based encryption supporting flexible attributes[J].IEEE Transactions on Information Forensics and Security,2015,10(6):1274-1288
    [8]Liang Xiaohui,Cao Zhenfu,Lin Huang,et al.Attribute based proxy re-encryption with delegating capabilities[C]Proc of the 4th Int Symp on Information,Computer,and Communications Security.New York:ACM,2009:276-286
    [9]Qian Junlei,Dong Xiaolei.Fully secure revocable attributebased encryption[J].Journal of Shanghai Jiaotong University(Science),2011,16(4):490-496
    [10]Sahai A,Seyalioglu H,Waters B.Dynamic credentials and ciphertext delegation for attribute-based encryption[C]Proc of the 32nd Int Cryptology Conf.Berlin:Springer,2012:199-217
    [11]Zhou Jun,Cao Zhenfu,Dong Xiaolei,et al.TR-MABE:White-box traceable and revocable multi-authority attributebased encryption and its applications to multi-level privacypreserving e-healthcare cloud computing systems[C]Proc of 2015IEEE Conf on Computer Communications(INFOCOM).Piscataway,NJ:IEEE,2015:2398-2406
    [12]Zhou Jun,Dong Xiaolei,Cao Zhenfu,et al.Secure and privacy preserving protocol for cloud-based vehicular DTNs[J].IEEE Transactions on Information Forensics and Security,2015,10(6):1299-1314
    [13]Zhou Jun,Cao Zhenfu,Dong Xiaolei,et al.PPDM:Aprivacy-preserving protocol for cloud-assisted e-healthcare systems[J].IEEE Journal of Selected Topics in Signal Processing,2015,9(7):1332-1344
    [14]Dong Xiaolei,Zhou Jun,Cao Zhenfu.Research advances on secure searchable encryption[J].Journal of Computer Research and Development,2017,54(10):2107-2120(in Chinese)(董晓蕾,周俊,曹珍富.可搜索加密研究进展[J].计算机研究与发展,2017,54(10):2107-2120)
    [15]Wang Haijiang,Dong Xiaolei,Cao Zhenfu,et al.Secure and efficient attribute-based encryption with keyword search[J].The Computer Journal,2018,61(8):1133-1142
    [16]Zhou Jun,Cao Zhenfu,Dong Xiaolei.PPOPM:More efficient privacy preserving outsourced pattern matching[C]Proc of European Symp on Research in Computer Security.Cham,Switzerland:Springer,2016:135-153
    [17]Chaum D,Fiat A,Naor M.Untraceable electronic cash[C]Proc of Conf on the Theory and Application of Cryptography.New York:Springer,1988:319-327
    [18]Maji H K,Prabhakaran M,Rosulek M.Attribute-based signatures[C]Proc of Cryptographers'Track at the RSAConf.Berlin:Springer,2011:376-392
    [19]Back A,Corallo M,Dashjr L,et al.Enabling blockchain innovations with pegged sidechains[J/OL].[2018-06-30].http:www.opensciencereview.com/papers/123/enablingbloc kchain-innovations-with-pegged-sidechains,2014
    [20]Canard S,Pointcheval D,Sanders O,et al.Divisible e-cash made practical[C]Proc of IACR Int Workshop on Public Key Cryptography.Berlin:Springer,2015:77-100
    [21]Miers I,Garman C,Green M,et al.Zerocoin:Anonymous distributed e-cash from bitcoin[C]Proc of 2013IEEESymp on Security and Privacy(SP).Piscataway,NJ:IEEE,2013:397-411
    [22]Eyal I,Gencer A E,Sirer E G,et al.Bitcoin-NG:Ascalable blockchain protocol[C]Proc of NSDI.New York:ACM,2016:45-59
    [23]Ketterer J A,Andrade G.Digital central bank money and the unbundling of the banking function[J/OL].[2018-05-26].https:webimages.iadb.org,2018
    [24]Abrams R,Popper N.Trading site failure stirs ire and hope for bitcoin[J/OL].[2018-06-21].http:connection.ebscohost.com/c/articles/94838817/trading-site-failure-stirs-irehope-bitcoin,2018
    [25]Siegel D.Understanding the DAO attack[J/OL].Web.[2018-05-20].http:www.coindesk.com/understandingdao-hack-journalists,2016
    [26]Cao Zhenfu.New thought for applied cryptography-Why blockchain is an important research direction[C]The 5th Forward-looking Forum for Cryptography and Security.Nanning,Guangxi:2018(in Chinese)(曹珍富.密码应用的新思维---为什么区块链是个重要的方向[C]第五届密码与安全前瞻性论坛.广西南宁:2018)
    [27]Mohri M,Rostamizadeh A,Talwalkar A.Foundations of Machine Learning[M].Cambridge,MA:MIT Press,2012
    [28]Tang Qiang,Wang Jun.Privacy-preserving context-aware recommender systems:Analysis and new solutions[C]Proc of European Symp on Research in Computer Security.Cham,Switzerland:Springer,2015:101-119
    [29]Tang Qiang,Wang Jun.Privacy-preserving friendship-based recommender systems[J].IEEE Transactions on Dependable and Secure Computing,2018,15(5):784-796
    [30]Beuchat J,Detrey J,Estibals N,et al.Fast architectures for theηT pairing over small-characteristic supersingular elliptic curves[J].IEEE Transactions on Computers,2011,60(2):266-281