Effective Data Sharing with Forward Security Identity based Ring Signature using different algorithms

被引:0
|
作者
Pandey, Vivek [1 ]
Kulkarni, Umesh [1 ]
机构
[1] Vidyalankar Inst Technol, Comp Engn, Mumbai, Maharashtra, India
关键词
Cloud Computing; Data Sharing; Identity Based Ring Signature; Forward Security;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Freedom of speech is one of the basic human rights. Today with the boom of technology and use of internet, the use of data sharing is correspondingly important. The number of users in the internet has increased by 700% in last fifteen years [1] [13]. Also, more than 90% of world's data on the internet which is shared, is uploaded in the last two years as of 2013 [12], and it is increasing exponentially every day. The number of users has increased, so the data and its usage. The security of data and the individual is of equal importance. This brings to the point that anonymity of the individual is to be considered as of prime importance, also as the saying goes; give a man a mask, and he will tell you the truth. There is no system in place to help with these requirements. The PKI system has a bottleneck to support such a vast number of users and their data. The identity based ring signature can be used instead to overcome this by excluding the part of certificate verification, as it makes use of identity signature, which speeds up the process. Forward security is implemented along with identity ring signature to advance the data security, which helps to eliminate the flaws of any big data sharing system where the revocation mechanism is used. This property helps when a key of a single user is compromised for a specific data, then still the past and future signatures for that user will remain valid and secure, also the other users will be unaffected. This is very important as it is very wrong to ask a huge number of users to re-authenticate their data in the time of such crisis. Therefore, to preserve data integrity, giving user anonymity, and support notion of forward security we propose two different identity based ring signature with forward security implemented by two different algorithms: HMAC, and AES, we also show the comparison of both.
引用
收藏
页数:6
相关论文
共 50 条
  • [31] Efficient identity-based ring identification scheme and identity-based ring signature scheme on lattices
    School of Mathematics and Information Science, Guangzhou University, Guangzhou
    510006, China
    不详
    510665, China
    [J]. Int. J. Secur. Netw., 2023, 4 (213-226):
  • [32] Signature scheme with forward security based on elliptic curve cryptosystem
    Liu, Yali
    Yin, Xinchun
    Zhu, Hong
    [J]. 2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES: ITESS 2008, VOL 3, 2008, : 1118 - 1123
  • [33] Identity-based ring signature scheme with constant-size signature
    Wang, Ling-Ling
    Zhang, Guo-Yin
    Ma, Chun-Guang
    [J]. Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2007, 29 (11): : 2645 - 2648
  • [34] Traceable ring signature schemes based on SM2 digital signature algorithm and its applications in the data sharing scheme
    Zhang, Yongxin
    Lei, Hong
    Wang, Bin
    Wang, Qinghao
    Lu, Ning
    Shi, Wenbo
    Chen, Bangdao
    Yue, Qiuling
    [J]. FRONTIERS OF COMPUTER SCIENCE, 2024, 18 (02)
  • [35] Traceable ring signature schemes based on SM2 digital signature algorithm and its applications in the data sharing scheme
    Yongxin Zhang
    Hong Lei
    Bin Wang
    Qinghao Wang
    Ning Lu
    Wenbo Shi
    Bangdao Chen
    Qiuling Yue
    [J]. Frontiers of Computer Science, 2024, 18
  • [36] Identity based Proxy Re-Encryption using Forward Security in Cloud Framework
    Bankar, Jaitee
    Raghatwan, Jyoti
    [J]. 2017 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION, CONTROL AND AUTOMATION (ICCUBEA), 2017,
  • [37] AN EFFECTIVE GROUP FORMATION IN THE CLOUD BASED ON RING SIGNATURE
    Dhivya, V
    Anandakumar, H.
    Sivakumar, M.
    [J]. PROCEEDINGS OF 2015 IEEE 9TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND CONTROL (ISCO), 2015,
  • [38] On the security of two identity-based signature schemes based on pairings
    Qin, Zhen
    Yuan, Chen
    Wang, Yilei
    Xiong, Hu
    [J]. INFORMATION PROCESSING LETTERS, 2016, 116 (06) : 416 - 418
  • [39] Identity-based ring signature scheme based on quadratic residues
    Xiong, Hu
    Qin, Zhiguang
    Li, Fagen
    [J]. High Technology Letters, 2009, 15 (01) : 94 - 100