信息安全的新发展-为《计算机研究与发展》创刊六十周年而作

Translated title of the contribution: New Devolopment of Information Security -For the 60th Anniversary of Journal of Computer Research and Development

Research output: Contribution to journalArticlepeer-review

1 Scopus citations

Abstract

This article firstly identifies the most important trend in the development of information security is that finding new security issues by introducing cryptographic techniques into the field of system security, which enables that cryptographic security has been increasingly applied in almost every aspect of the computer system. Besides, we present the new characteristics of modern cryptography resulted from this new application and new types of service mode, including that the entity has been transformed from single mode to multiparty mode, the position has been transformed from local mode to remote mode, and the security model has been transformed from channel security model to "channel security plus" model. Based on the new features given above, we mainly focus on discussing both the state-of-the-art and the future directions for theorectical research in the aspects of ciphertext access control, secure outsourced comutation, secure search, electronic currency and blockchain security, and privacy-preserving in artificial intelligence and machine learning. Finally, we also introduce some application results, including the hardware development of the mobile device for encrypted data sharing and the identity authentication based on biological information.

Translated title of the contributionNew Devolopment of Information Security -For the 60th Anniversary of Journal of Computer Research and Development
Original languageChinese (Traditional)
Pages (from-to)131-137
Number of pages7
JournalJisuanji Yanjiu yu Fazhan/Computer Research and Development
Volume56
Issue number1
DOIs
StatePublished - 1 Jan 2019

Fingerprint

Dive into the research topics of 'New Devolopment of Information Security -For the 60th Anniversary of Journal of Computer Research and Development'. Together they form a unique fingerprint.

Cite this