信息安全研究 ›› 2025, Vol. 11 ›› Issue (2): 189-.

• 技术应用 • 上一篇    

基于变色龙哈希的可信数据安全管理技术研究及应用

马嘉蔚1武文浩2董佳瑜2   

  1. 1(北京邮电大学国际学院北京100876)
    2(北京邮电大学网络安全学院北京100876)
  • 出版日期:2025-02-20 发布日期:2025-02-21
  • 通讯作者: 武文浩 硕士研究生.主要研究方向为区块链技术及应用、网络与信息安全. wwh19863806950@163.com
  • 作者简介:马嘉蔚 主要研究方向为网络信息安全、区块链理论与技术、Web3.0技术及应用. 2022213154@bupt.cn 武文浩 硕士研究生.主要研究方向为区块链技术及应用、网络与信息安全. wwh19863806950@163.com 董佳瑜 硕士研究生.主要研究方向为区块链技术及应用、密码学、网络与信息安全. djy20020612@163.com

Research and Application of Trusted Data Security Management #br# Technology Based on Chameleon Hash#br#

Ma Jiawei1, Wu Wenhao2, and Dong Jiayu2   

  1. 1(International School, Beijing University of Posts and Telecommunications, Beijing 100876)
    2(School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing 100876)
  • Online:2025-02-20 Published:2025-02-21

摘要: 为同时满足数据流通领域中的数据更新与数据安全管理需求,研究基于变色龙哈希实现的可信数据安全管理方案.首先分析介绍了变色龙哈希的数学基础并对比3种构造方法,总结了一种基于变色龙哈希与同态加密的数据安全管理方法并应用于数字版权保护,该方法不仅允许更新修改已提交的数据,还保证了数据的安全性和用户的使用友好性.最后,采用了实验模拟的方式评估所提方法的效率.结果表明,提出的数据安全管理更新方法适用于需要频繁更新数据且有一定安全需求的数据安全保护环境,该方法有效降低了数据更新的总成本,为数据要素流通提供了一种高效、安全的解决方案.

关键词: 变色龙哈希, 同态加密, 数据安全更新, 数据流通, 数字版权管理

Abstract: To simultaneously address the demands for data updates and data security management in the field of data circulation, this paper investigates a trusted data security management scheme based on chameleon hash. Initially, the mathematical foundations of chameleon hash are analyzed and three construction methods are compared. A data security management approach that integrates chameleon hash with homomorphic encryption is summarized and applied to digital rights protection. This method not only permits the updating and modification of submitted data but also ensures data security and userfriendliness. Finally, the efficiency of the proposed method is evaluated through experimental simulations. The results demonstrate that the data security management and update method proposed in this paper is suitable for environments requiring frequent data updates and certain security needs. This method effectively reduces the overall cost of data updates, providing an efficient and secure solution for the circulation of data elements.

Key words: chameleon hash, homomorphic encryption, data security updates, data circulation, digital rights management

中图分类号: