An Efficient Key Distribution Scheme in Cloud Computing

被引:0
|
作者
Tang, Chumming [1 ,2 ]
Wong, Duncan S. [3 ]
Hu, Xing [1 ,2 ]
Pei, Dingyi [1 ,2 ]
机构
[1] Guangzhou Univ, Sch Math & Informat Sci, Guangzhou, Guangdong, Peoples R China
[2] Guangzhou Univ, Guangdong Higher Educ Inst, Key Lab Math & Interdisciplinary Sci, Guangzhou, Guangdong, Peoples R China
[3] City Univ Hong Kong, Dept Comp Sci, Hong Kong, Peoples R China
基金
新加坡国家研究基金会; 中国国家自然科学基金;
关键词
Cloud Computing; outsourcing computation; key agreement; modular exponentiation; FULLY HOMOMORPHIC ENCRYPTION; COMPUTATIONS;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloud computing is an emerging computing paradigm in which IT resources and capacities are provided as services over the Internet. It also brings forth new challenges for security when clients want to securely outsource the computation of operations to the untrusted cloud servers. In cloud computing, it is difficult to implement most of cryptographic protocols among clients for this reason that all clients are possibly weaker than computationally powerful players. Hence, clients have to appeal to cloud servers for assistance. However, cloud servers are untrusted so that cryptographic protocols cannot be realized securely. In this paper, we design a secure key agreement scheme for two weaker clients who delegate cloud server to compute modular exponentiation. In our scheme, two clients can get same key for symmetric cryptosystem even that cloud server is untrusted.
引用
收藏
页数:5
相关论文
共 50 条
  • [1] Lightweight Secure Authentication and Key Distribution Scheme for Vehicular Cloud Computing
    Goumidi, Hadjer
    Harous, Saad
    Aliouat, Zibouda
    Gueroui, Abdelhak Mourad
    SYMMETRY-BASEL, 2021, 13 (03):
  • [2] An efficient traceable access control scheme with reliable key delegation in mobile cloud computing
    Zhitao Guan
    Jing Li
    Ying Zhang
    Ruzhi Xu
    Zhuxiao Wang
    Tingting Yang
    EURASIP Journal on Wireless Communications and Networking, 2016
  • [3] An efficient traceable access control scheme with reliable key delegation in mobile cloud computing
    Guan, Zhitao
    Li, Jing
    Zhang, Ying
    Xu, Ruzhi
    Wang, Zhuxiao
    Yang, Tingting
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2016,
  • [4] Identity based secure authentication scheme based on quantum key distribution for cloud computing
    Sharma, Geeta
    Kalra, Sheetal
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2018, 11 (02) : 220 - 234
  • [5] Identity based secure authentication scheme based on quantum key distribution for cloud computing
    Geeta Sharma
    Sheetal Kalra
    Peer-to-Peer Networking and Applications, 2018, 11 : 220 - 234
  • [6] An Efficient FHE Scheme to Secure Cloud Computing
    Hariss, Khalil
    Samhat, Abed Ellatif
    Chamoun, Maroun
    PROCEEDINGS OF THE 16TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS, VOL 2: SECRYPT, 2019, : 341 - 349
  • [7] An efficient key management scheme for pervasive computing
    Ge, H
    ISM 2005: SEVENTH IEEE INTERNATIONAL SYMPOSIUM ON MULTIMEDIA, PROCEEDINGS, 2005, : 657 - 661
  • [8] Efficient flow control scheme in multimedia cloud computing
    Tan, Jinsheng
    Liu, Peng
    Journal of Networks, 2013, 8 (10) : 2285 - 2292
  • [9] An Efficient Authentication Scheme for Mobile Cloud Computing Services
    Audithan, Sivaraman
    Vijayasaro, Vijayaregunathan
    Vijayakumar, Pandi
    Vijayakumar, Varadarajan
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2017, 33 (03) : 727 - 741
  • [10] Efficient Distribution of Virtual Machines for Cloud Computing
    Schmidt, Matthias
    Fallenbeck, Niels
    Smith, Matthew
    Freisleben, Bernd
    PROCEEDINGS OF THE 18TH EUROMICRO CONFERENCE ON PARALLEL, DISTRIBUTED AND NETWORK-BASED PROCESSING, 2010, : 567 - 574