首页 | 本学科首页   官方微博 | 高级检索  
     检索      

卫星通信全代理同态可信传输机制研究
引用本文:丁毅,沈薇,李洁,程子敬,靳军,孙伽宁.卫星通信全代理同态可信传输机制研究[J].中国空间科学技术,2020,40(4):84-96.
作者姓名:丁毅  沈薇  李洁  程子敬  靳军  孙伽宁
作者单位:1 北京物资学院信息学院,北京101149 2 航天恒星科技有限公司,北京100094
基金项目:国家自然科学基金(91538202);;国家重点研发计划(2018YFB1402703);;北京市教育委员会科技计划一般项目(KM201910037003);;北京市社会科学基金研究基地项目(18JDGLB026);
摘    要:卫星通信及应用已经成为当前社会生活的重要组成部分。为了解决卫星通信数据安全传输、信息隐私保护、接收端信息依赖等问题,基于低轨卫星气象数据传输的典型应用场景,提出了一套全代理同态加密传输模型(FPRM),并依据卫星通信系统架构将其实例化,从而设计卫星通信全代理同态可信传输系统与运行机制。该机制增加系统的通信安全和隐私保护,实现密文的可计算和传输全代理,有效融合卫星、商业数据中心以及互联网资源,降低运行成本,提高资源利用率,具有重要的实际意义和应用价值。最后,通过试验证明该模型的性能和数据扩展性具有可行性。

关 键 词:代理重加密  同态加密  可信执行环境  隐私保护  数据传输

Research on trusted full proxy homomorphic transmissionmechanism for satellite communication#br#
DING Yi,SHEN Wei,LI Jie,CHENG Zijing,JIN Jun,SUN Jianing.Research on trusted full proxy homomorphic transmissionmechanism for satellite communication#br#[J].Chinese Space Science and Technology,2020,40(4):84-96.
Authors:DING Yi  SHEN Wei  LI Jie  CHENG Zijing  JIN Jun  SUN Jianing
Institution:1 School of Information, Beijing Wuzi University, Beijing101149, China 2 Space Star Technology CO., Ltd. Beijing100094, China
Abstract:Satellite communication and its applications have become an important part in current social life. In order to ensure the secure transmission of satellite communication data, privacy protection of information, and to sovle the problem of dependency on the receiving side, a set of full proxy re encryption transmission model (FPRM) was proposed based on typical application scenarios of the transmission of low orbit constellation meteorological data. It was instantiated according to the satellite communication architecture to design a trusted proxy homomorphic transmission system. Computable ciphertext and full proxy transmission have been implemented by adding security of system communication and privacy protection to the mechanism. It is of great practical significance and values to integrate satellite, commercial data centers and Internet resources to reduce costs and improve resource utilization. Finally, it proves that the performance and data scalability of this model are feasible through experiments.
Keywords:proxy re-encryption  homomorphic encryption  trusted execution environment  privacy protection  data transmission  
本文献已被 CNKI 等数据库收录!
点击此处可从《中国空间科学技术》浏览原始摘要信息
点击此处可从《中国空间科学技术》下载免费的PDF全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号