Stronger anonymity password authentication key exchange protocols based on traditional cryptography are not resistant to quantum computing attacks, and there is no lattice-only anonymous password authentication key exchange protocol protocol that satisfies the strong anonymity requirement. Therefore, this paper constructs stronger anonymity PAKE protocol based on the ring learning with errors (RLWE) and smooth projective hash function (SPHF) based on ideal lattice. The proposed protocol can achieve stronger anonymity and resists to desynchronization attacks and quantum attack. The security of the protocol is proved under the BPR model. The security and performance analysis shows that the proposed PAKE protocol has better advantages in security and efficiency.
With the development of the 5th Generation Mobile Communication Technology (5G), the 5G network can more accurately locate the user's location. This enables location-based services to provide users with more personalized services, but it also brings more challenges to user location privacy protection. Aiming at the leakage of location privacy and query privacy in LBS, a LBS privacy protection scheme based on searchable encryption is proposed. The scheme uses thresholds to replace the private information queried by users, thereby reducing the risk of location information leakage during user service requests; it reduces the storage space of the server through attribute-based encryption and improves query efficiency. Finally, the correctness of the ciphertext search of the scheme is proved.
The virtual network function carried by the container has the advantages of strong orchestration ability and high flexibility. However, due to the poor natural isolation of the container, the security of the containerized virtual network function has attracted much attention. After trusted measurement of containerized virtual network functions based on trusted computing, how to reduce the privacy exposure of containerized virtual network functions under the premise of effective response to challengers has become an urgent problem to be solved. This paper proposes a trusted remote attestation protocol based on attribute certificates and ciphertext policy attribute-based encryption for containerized virtual network function, and uses Ban logic to perform inference analysis on this protocol. The results prove that the proposed is correct and can meet the expected goals.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.