메뉴 건너뛰기




Volumn , Issue , 2010, Pages 851-855

Identity-based authentication in cloud storage sharing

Author keywords

Bilinear pairing; Cloud storage sharing; Identity based authentication

Indexed keywords

BILINEAR DIFFIE-HELLMAN PROBLEM; BILINEAR PAIRING; CLOUD STORAGE SHARING; CLOUD STORAGES; COMPUTATIONAL COSTS; CRYPTOGRAPHIC TECHNIQUES; HEAVY LOADS; IDENTITY-BASED; KEY SIZES; MASTER KEY; MUTUAL AUTHENTICATION; NON-INTERACTIVE; PUBLIC KEYS; THIN CLIENTS;

EID: 78751480363     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/MINES.2010.180     Document Type: Conference Paper
Times cited : (40)

References (17)
  • 1
    • 84883663400 scopus 로고    scopus 로고
    • Cryptographic Cloud Storage
    • January Available
    • Seny Kamara and Kristin Lauter, "Cryptographic Cloud Storage," in Microsoft Research publications, January 2010. Available: http://research.microsoft.com/pubs/112576/crypto- cloud.pdf.
    • (2010) Microsoft Research Publications
    • Kamara, S.1    Lauter, K.2
  • 5
    • 0004035649 scopus 로고    scopus 로고
    • Certicom, and Certicom, January Available
    • Certicom, C. Allen and Certicom, "The TLS Protocol Version 1.0," January 1999, Available: http://www.ietf.org/rfc/rfc2246.txt.
    • (1999) The TLS Protocol Version 1.0
    • Allen, C.1
  • 6
    • 35048899816 scopus 로고    scopus 로고
    • Key Agreement using statically keyed authenticators
    • Applied Cryptography and Network Security (ACNS'04) Yellow Mountain, China, June 2004, to appear in Springer, doi: 10.1007/b98360
    • C. Boyd , W. Mao and K. Paterson, "Key Agreement using statically keyed authenticators,".In: Applied Cryptography and Network Security (ACNS'04) Yellow Mountain, China, June 2004, to appear in Lecture Notes in Computer Science, Springer, 2004,doi: 10.1007/b98360.
    • (2004) Lecture Notes in Computer Science
    • Boyd, C.1    Mao, W.2    Paterson, K.3
  • 7
    • 35048860626 scopus 로고    scopus 로고
    • Analysis of key-exchange protocols and their use for building secure channels
    • Advances in Cryptology - Eurocrypt 2001, Spring-Verlag
    • Ran Canetti and Hugo Krawczyk, "Analysis of key-exchange protocols and their use for building secure channels," Advances in Cryptology - Eurocrypt 2001, volume 2045 of LNCS. Spring-Verlag, 2001.
    • LNCS , vol.2045 , pp. 2001
    • Canetti, R.1    Krawczyk, H.2
  • 9
    • 71749113079 scopus 로고    scopus 로고
    • Identity-Based Authentication for Cloud Computing
    • M.G. Jaatun, G. Zhao, and C. Rong,eds: CloudCom 2009, Springer-Verlag Berlin Heidelberg
    • Hongwei Li, Yuanshun Dai, LingTian and Haomiao Yang, "Identity-Based Authentication for Cloud Computing," M.G. Jaatun, G. Zhao, and C. Rong,eds: CloudCom 2009, LNCS 5931 .Springer-Verlag Berlin Heidelberg ,2009.157-166.
    • (2009) LNCS , vol.5931 , pp. 157-166
    • Li, H.1    Dai, Y.2    Tian, L.3    Yang, H.4
  • 10
    • 84937428623 scopus 로고    scopus 로고
    • Efficient algorithems for pairing-based cryptosystems
    • Advances in Cryptology - CRYPTO 2002, Springer-Verlag
    • P. S. L. M. Barreto, H. Y. Kin, B. Lynn, and M. Scott, "Efficient algorithems for pairing-based cryptosystems," Advances in Cryptology - CRYPTO 2002, Lecture Notes in Computater Science. Springer-Verlag, 2002.
    • (2002) Lecture Notes in Computater Science
    • Barreto, P.S.L.M.1    Kin, H.Y.2    Lynn, B.3    Scott, M.4
  • 11
    • 84874324906 scopus 로고    scopus 로고
    • Identity based encryption from the Weil pairing
    • J. Killian, editor, Advances in Cryptology - Proceedings of CRYPTO'01, Springer-Verlag
    • D.Boneh and M. Franklin, "Identity based encryption from the Weil pairing," J. Killian, editor, Advances in Cryptology - Proceedings of CRYPTO'01, Lecture Notes in Computer Science 2139.pp.213-229. Springer-Verlag, 2001.
    • (2001) Lecture Notes in Computer Science , vol.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 15
    • 70449569012 scopus 로고    scopus 로고
    • Ensuring data storage security in cloud computing
    • Available
    • C. Wang, Q. Wang, K. Ren, and W. Lou, "Ensuring data storage security in cloud computing," in. Proc. of IWQoS'09, July 2009. 19, Available: http://www.cs.odu.edu/~mukka/cs775s10/Presentations/Security.6.pdf.
    • Proc. of IWQoS'09, July 2009 , pp. 19
    • Wang, C.1    Wang, Q.2    Ren, K.3    Lou, W.4
  • 16
    • 70350389843 scopus 로고    scopus 로고
    • Enabling public verifiability and data dynamics for storage security in cloud computing
    • European Symposium on Research in Computer Security (ESORICS'09), SpRINGER, Available
    • Q. Wang, C. Wang, J. Li, K. Ren and W. Lou, "Enabling public verifiability and data dynamics for storage security in cloud computing," In European Symposium on Research in Computer Security (ESORICS'09), volume 5789 of Lecture Notes in Computer Science, page 355-370.SpRINGER,2009, Available: http://eprint.iacr.org/2009/281.pdf.
    • (2009) Lecture Notes in Computer Science , vol.5789 , pp. 355-370
    • Wang, Q.1    Wang, C.2    Li, J.3    Ren, K.4    Lou, W.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.