A Hierarchical Identity-Based Signature Scheme

Article Preview

Abstract:

Cloud computing is a new technology for complex systems shared among numerous users. Therefore, for the trust and security of the cloud computing, authentication of users is a significant issue. Based on the fact that SSL Authentication Protocol (SAP) applied in cloud computing undergo a heavy computation and communication, we support the protocol based on the identity-based hierarchical model for cloud computing in this paper. By random oracle, we give the proof of the security of the protocol.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

173-176

Citation:

Online since:

November 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2015 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] HAMIR A. Identity-based cryptosystems and signature schemes[ C] / /Proc of CRYPTO 1984, LNCS 196. Berlin: Springer-Verlag, 1984: 47- 53.

Google Scholar

[2] BONEH D, FRANKLIN M. Identity-based encryption from the Weilpairing[ C] / /Proc of CRYPTO 2001, LNCS 2139. Berlin: Springer-Verlag, 2001: 213- 229.

DOI: 10.1007/3-540-44647-8_13

Google Scholar

[3] ORWITZ J, LYNN B. Towards hierarchical identity-based encryption[C] / /Proc of EUROCRYPT 2002 , LNCS 2332. Berlin: Springer-Verlag, 2002 : 466- 481.

Google Scholar

[4] GENTRY C, SILVERBERG A. Hierarchical ID-based cryptography[ C] / /Proc of ASIACRYPT 2002 , LNCS 2501. Berlin: Springer-Verlag, 2002: 548 - 566.

DOI: 10.1007/3-540-36178-2_34

Google Scholar

[5] CANETTI R, HALEVI S, KATZ J. A forward-secure public-key encryptionscheme[ C] / /Proc of EUROCRYPT 2003, LNCS 2656. Berlin: Springer-Verlag, 2003: 255 -271.

DOI: 10.1007/3-540-39200-9_16

Google Scholar

[6] CANETTI R, HALEVI S, KATZ J. Chosen-ciphertext security fromidentity-based encryption[ C] / / Proc of EUROCRYPT 2004 , LNCS3027. Berlin: Springer-Verlag, 2004: 207 - 222.

DOI: 10.1007/978-3-540-24676-3_13

Google Scholar

[7] BONEH D, BOYEN X. Efficient Selective-ID secure identity-basedencryption without random oracles[ C] / /Proc of EUROCRYPT 2004, LNCS 3027. Berlin: Springer-Verlag, 2004: 223- 238.

DOI: 10.1007/978-3-540-24676-3_14

Google Scholar

[8] BONEH D, BOYEN X, GOH E J. Hierarchical identity-basedencryption with constant size ciphertext [ C] / /Proc of EUROCRYPT2005, LNCS 3494. Berlin: Springer-Verlag, 2005: 440- 456.

DOI: 10.1007/11426639_26

Google Scholar

[9] CHOW S S M, HUI L C K, YIU S M, et al. Secure hierarchicalidentity-based signature and its application[ C] / /Proc of ICICS 2004, LNCS 3269 . Berlin: Springer-Verlag, 2004: 480- 494.

Google Scholar

[10] YUEN T H, WEI V K. Constant-size hierarchical identity-based signature/ signcryption without randomoracles[ EB/OL] . ( 2005-11-17 )[ 2008 - 03- 03] . http: / /eprint. iacr. org /2005 /412.

Google Scholar

[11] AU M H, LIU JK, YUEN T H, et al. Efficient hierarchical identitybasedsignature in the standard model [ EB/OL] . ( 2007- 02- 21 )[ 2008 - 03- 03] . http: / /eprint. iacr. org /2007 /068.

Google Scholar

[12] LI Jin, ZHANG Fangguo, WANG Yanming. Two Efficient Hierarchical Identity Based Signature Schemes [ J] . Acta Electronic Sinica, 2007, 35 ( 1) : 150-152.

Google Scholar