< Terug naar vorige pagina

Publicatie

Elliptic Curve Qu-Vanstone Based Signcryption Schemes with Proxy Re-encryption for Secure Cloud Data Storage

Boekbijdrage - Hoofdstuk

Data storage in cloud computing leads to several security issues such as data privacy, integrity, and authentication. Efficiency for the user to upload and download the data in a secure way plays an important role, as users are nowadays performing these actions on all types of devices, including e.g. smartphones. Signing and encryption of the sensitive data before hosting can solve potential security breaches. In this chapter, we propose two highly efficient identity based signcryption schemes. One of them is used as a building block for a proxy re-encryption scheme. This scheme allows users to store signed and encrypted data in the cloud, where the cloud server provider is able to check the authentication but not to derive the content of the message. When another user requests data access, the originator of the message first checks the authorization and then provides the cloud server with an encryption key to re-encrypt the stored data, enabling the requesting party to decrypt the resulting ciphertext and to validate the signature. The proposed scheme is based on elliptic curve operations and does not use computationally intensive pairing operations, like previous proposals.

Boek: Cloud Computing and Big Data: Technologies, Applications and Security
Series: Lecture Notes in Networks and Systems
Pagina's: 1-18
Aantal pagina's: 18
ISBN:9783319977195
Jaar van publicatie:2019
Trefwoorden:Certificates, Data storage, Elliptic cuve operations, ID-based authentication, Signcryption
  • WoS Id: 000517593200001
  • Scopus Id: 85057080101
  • DOI: https://doi.org/10.1007/978-3-319-97719-5_1
  • ORCID: /0000-0001-8891-180X/work/57959101
  • ORCID: /0000-0002-3622-1943/work/70540634
  • ORCID: /0000-0002-5901-4218/work/71466897
  • ORCID: /0000-0002-9965-915X/work/82863798
Toegankelijkheid:Closed