메뉴 건너뛰기




Volumn 9204, Issue , 2015, Pages 612-622

An efficient and secure delegated multi-authentication protocol for mobile data owners in cloud

Author keywords

Authenticated computing; Cloud computing; Delegated multi authentication; Mobile data owner; Multi proxy signature

Indexed keywords

CLOUD COMPUTING; CRYPTOGRAPHY;

EID: 84943601168     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-319-21837-3_60     Document Type: Conference Paper
Times cited : (5)

References (19)
  • 2
    • 84925082806 scopus 로고    scopus 로고
    • Multicloud-based evacuation services for emergency management
    • Dong, M., Li, H., Ota, K., Yang, L.T., Zhu, H.: Multicloud-based evacuation services for emergency management. IEEE Cloud Comput. 1(4), 50–59 (2014)
    • (2014) IEEE Cloud Comput , vol.1 , Issue.4 , pp. 50-59
    • Dong, M.1    Li, H.2    Ota, K.3    Yang, L.T.4    Zhu, H.5
  • 3
    • 84889087663 scopus 로고    scopus 로고
    • Security and privacy for storage and computation in cloud computing
    • Wei, L., Zhu, H., Cao, Z., Dong, X., Jia, W., Chen, Y., Vasilakos, A.V.: Security and privacy for storage and computation in cloud computing. Inf. Sci. 258, 371–386 (2014)
    • (2014) Inf. Sci , vol.258 , pp. 371-386
    • Wei, L.1    Zhu, H.2    Cao, Z.3    Dong, X.4    Jia, W.5    Chen, Y.6    Vasilakos, A.V.7
  • 4
    • 84861959172 scopus 로고    scopus 로고
    • Privacy-preserving public auditing for secure cloud storage
    • Wang, C., Chow, S.S., Wang, Q., Ren, K., Lou, W.: Privacy-preserving public auditing for secure cloud storage. IEEE Trans. Comput. 62(2), 362–375 (2013)
    • (2013) IEEE Trans. Comput , vol.62 , Issue.2 , pp. 362-375
    • Wang, C.1    Chow, S.S.2    Wang, Q.3    Ren, K.4    Lou, W.5
  • 5
    • 84904430603 scopus 로고    scopus 로고
    • Efficient public integrity checking for cloud data sharing with multi-user modification
    • Yuan, J., Yu, S.: Efficient public integrity checking for cloud data sharing with multi-user modification. In: INFOCOM 2014, pp. 2121–2129 (2014)
    • (2014) INFOCOM 2014 , pp. 2121-2129
    • Yuan, J.1    Yu, S.2
  • 6
    • 84858316020 scopus 로고    scopus 로고
    • Computing on authenticated data
    • In: Cramer, R. (ed.), Springer, Heidelberg
    • Ahn, J.H., Boneh, D., Camenisch, J., Hohenberger, S., shelat, A., Waters, B.: Computing on authenticated data. In: Cramer, R. (ed.) TCC 2012. LNCS, vol. 7194, pp. 1–20. Springer, Heidelberg (2012)
    • (2012) TCC 2012. LNCS , vol.7194 , pp. 1-20
    • Ahn, J.H.1    Boneh, D.2    Camenisch, J.3    Hohenberger, S.4    Shelat, A.5    Waters, B.6
  • 8
    • 84855426977 scopus 로고    scopus 로고
    • Secure proxy signature schemes for delegation of signing rights
    • Boldyreva, A., Palacio, A., Warinschi, B.: Secure proxy signature schemes for delegation of signing rights. J. Cryptology 25(1), 57–115 (2012)
    • (2012) J. Cryptology , vol.25 , Issue.1 , pp. 57-115
    • Boldyreva, A.1    Palacio, A.2    Warinschi, B.3
  • 9
    • 84944905011 scopus 로고    scopus 로고
    • Homomorphic signature schemes
    • In: Preneel, B. (ed.), Springer, Heidelberg
    • Johnson, R., Molnar, D., Song, D., Wagner, D.: Homomorphic signature schemes. In: Preneel, B. (ed.) CT-RSA 2002. LNCS, vol. 2271, pp. 244–262. Springer, Heidelberg (2002)
    • (2002) CT-RSA 2002. LNCS , vol.2271 , pp. 244-262
    • Johnson, R.1    Molnar, D.2    Song, D.3    Wagner, D.4
  • 10
    • 84891911238 scopus 로고    scopus 로고
    • A new definition of homomorphic signature for identity management in mobile cloud computing
    • Wang, Z., Sun, G., Chen, D.: A new definition of homomorphic signature for identity management in mobile cloud computing. J. Comput. Syst. Sci. 80(3), 546–553 (2014)
    • (2014) J. Comput. Syst. Sci , vol.80 , Issue.3 , pp. 546-553
    • Wang, Z.1    Sun, G.2    Chen, D.3
  • 11
    • 84893546633 scopus 로고    scopus 로고
    • Flexible and publicly verifiable aggregation query for outsourced databases in cloud
    • Yuan, J., Yu, S.: Flexible and publicly verifiable aggregation query for outsourced databases in cloud. In: IEEE CNS 2013, pp. 520–524 (2013)
    • (2013) IEEE CNS 2013 , pp. 520-524
    • Yuan, J.1    Yu, S.2
  • 12
    • 57849092101 scopus 로고    scopus 로고
    • A secure identity-based multi-proxy signature scheme
    • Cao, F., Cao, Z.: A secure identity-based multi-proxy signature scheme. Comput. Electr. Eng. 35(1), 86–95 (2009)
    • (2009) Comput. Electr. Eng , vol.35 , Issue.1 , pp. 86-95
    • Cao, F.1    Cao, Z.2
  • 13
    • 84921874319 scopus 로고    scopus 로고
    • Provable secure identity-based multi-proxy signature scheme
    • Sahu, R.A., Padhye, S.: Provable secure identity-based multi-proxy signature scheme. Int. J. Commun. Syst. 28(3), 497–512 (2015)
    • (2015) Int. J. Commun. Syst , vol.28 , Issue.3 , pp. 497-512
    • Sahu, R.A.1    Padhye, S.2
  • 15
    • 84863270684 scopus 로고    scopus 로고
    • Provably secure and efficient identity-based signature scheme based on cubic residues
    • Wang, Z., Wang, L., Zheng, S., Yang, Y., Hu, Z.: Provably secure and efficient identity-based signature scheme based on cubic residues. Int. J. Netw. Secur. 14(1), 33–38 (2012)
    • (2012) Int. J. Netw. Secur , vol.14 , Issue.1 , pp. 33-38
    • Wang, Z.1    Wang, L.2    Zheng, S.3    Yang, Y.4    Hu, Z.5
  • 16
    • 84865366436 scopus 로고    scopus 로고
    • An efficient and provably-secure certificateless signature scheme without bilinear pairings
    • He, D., Chen, J., Zhang, R.: An efficient and provably-secure certificateless signature scheme without bilinear pairings. Int. J. Commun. Syst. 25(11), 1432–1442 (2012)
    • (2012) Int. J. Commun. Syst , vol.25 , Issue.11 , pp. 1432-1442
    • He, D.1    Chen, J.2    Zhang, R.3
  • 17
    • 27144534222 scopus 로고    scopus 로고
    • Id-based multi-proxy signature, proxy multi-signature and multi-proxy multi-signature schemes from bilinear pairings
    • Li, X., Chen, K.: Id-based multi-proxy signature, proxy multi-signature and multi-proxy multi-signature schemes from bilinear pairings. Appl. Math. Comput. 169(1), 437–450 (2005)
    • (2005) Appl. Math. Comput , vol.169 , Issue.1 , pp. 437-450
    • Li, X.1    Chen, K.2
  • 18
    • 78650034291 scopus 로고    scopus 로고
    • Identity-based aggregate and multi-signature schemes based on RSA
    • In: Nguyen, P.Q., Pointcheval, D. (eds.), Springer, Heidelberg
    • Bagherzandi, A., Jarecki, S.: Identity-based aggregate and multi-signature schemes based on RSA. In: Nguyen, P.Q., Pointcheval, D. (eds.) PKC 2010. LNCS, vol. 6056, pp. 480–498. Springer, Heidelberg (2010)
    • (2010) PKC 2010. LNCS , vol.6056 , pp. 480-498
    • Bagherzandi, A.1    Jarecki, S.2
  • 19
    • 84883376529 scopus 로고    scopus 로고
    • Efficient cryptosystems from 2k-th power residue symbols
    • In: Johansson, T., Nguyen, P.Q. (eds.), Springer, Heidelberg
    • Joye, M., Libert, B.: Efficient cryptosystems from 2k-th power residue symbols. In: Johansson, T., Nguyen, P.Q. (eds.) EUROCRYPT 2013. LNCS, vol. 7881, pp. 76–92. Springer, Heidelberg (2013)
    • (2013) EUROCRYPT 2013. LNCS , vol.7881 , pp. 76-92
    • Joye, M.1    Libert, B.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.