shtang的个人博客分享 http://blog.sciencenet.cn/u/shtang

博文

Cost-Effective Authentic and Anonymous Data Sharing

已有 3397 次阅读 2014-6-9 14:52 |个人分类:Paper_Journal|系统分类:论文交流

  • Cost-Effective Authentic and Anonymous Data Sharing with Forward Security


--------------------------------------------------------------------------------------------------------------

Data sharing has never been easier with the advances of cloud computing, and an accurate analysis on the shared data provides an array of benefits to both the society and individuals. Data sharing with a large number of participants must take into account several issues, including efficiency, data integrity and privacy of data owner. Ring signature is a promising candidate to construct an anonymous and authentic data sharing system. It allows a data owner to anonymously authenticate his data which can be put into the cloud for storage or analysis purpose. Yet the costly certificate verification in the traditional public key infrastructure (PKI) setting becomes a bottleneck for this solution to be scalable. Identity-based (ID-based) ring signature, which eliminates the process of certificate verification, can be used instead. In this paper, we further enhance the security of ID-based ring signature by providing forward security: If a secret key of any user has been compromised, all previous generated signatures that include this user still remain valid. This property is especially important to any large scale data sharing system, as it is impossible to ask all data owners to reauthenticate their data even if a secret key of one single user has been compromised. We provide a concrete and efficient instantiation of our scheme, prove its security and provide an implementation to show its practicality.

--------------------------------------------------------------------------------------------------------------

Published in:Computers, IEEE Transactions on  (Volume:PP ,  Issue: 99 )

Page(s):1ISSN :0018-9340

Digital Object Identifier :10.1109/TC.2014.2315619

Date of Publication :03 四月 2014

Sponsored by :IEEE Computer Society

Publisher:IEEE

--------------------------------------------------------------

Paper published online: http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6782632 

Download the PDF file of this paper: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6782632 

--------------------------------------------------------------









https://blog.sciencenet.cn/blog-1381284-801874.html

上一篇:Towards provably secure proxy signature scheme based on IP
下一篇:Provably Secure Group Key Mng Approach Based on HyperSphere
收藏 IP: 202.38.207.*| 热度|

0

该博文允许注册用户评论 请点击登录 评论 (1 个评论)

数据加载中...

Archiver|手机版|科学网 ( 京ICP备07017567号-12 )

GMT+8, 2024-4-19 20:36

Powered by ScienceNet.cn

Copyright © 2007- 中国科学报社

返回顶部