• DocumentCode
    593181
  • Title

    Efficient identity based threshold proxy signature scheme in cloud environment

  • Author

    Yingying Qiao ; Xiaonan Jiang ; Hao Wen Lin ; Jeng-Shyang Pan

  • Author_Institution
    Shenzhen Grad. Sch., Harbin Inst. of Technol., Shenzhen, China
  • fYear
    2012
  • fDate
    14-16 Aug. 2012
  • Firstpage
    53
  • Lastpage
    56
  • Abstract
    Threshold proxy signature is more practical, flexible and secure than traditional proxy signature and multi-proxy signature schemes. However, the majority of existing identity-based threshold proxy signature schemes is still inefficient and impractical. Cloud services allow users to create, store, edit, and read electronic documents on the internet conveniently. While access control mechanisms enable communications between user terminals and the cloud to be executed securely and in a trusted manner. In this paper, we proposed a refined efficient identity-based threshold proxy signature in the cloud environment. Our approach is not only practical but also enjoys fewer rounds of communication and less operation cost in comparison to the existing schemes. In this paper, we have also introduced the implementation of our approach in the cloud environment.
  • Keywords
    cloud computing; digital signatures; Internet; access control mechanisms; cloud environment; cloud services; edit documents; efficient identity; electronic documents; identity based threshold proxy signature schemes; multiproxy signature schemes; read documents; store documents; Access control; Cloud computing; Computational modeling; Public key; User interfaces; Cloud Computing; Identity-based public key crypto-system; Threshold proxy signature;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Information Security and Intelligence Control (ISIC), 2012 International Conference on
  • Conference_Location
    Yunlin
  • Print_ISBN
    978-1-4673-2587-5
  • Type

    conf

  • DOI
    10.1109/ISIC.2012.6449706
  • Filename
    6449706