An Efficient Key Distribution Scheme in Cloud Computing

被引:0
|
作者
Tang, Chumming [1 ,2 ]
Wong, Duncan S. [3 ]
Hu, Xing [1 ,2 ]
Pei, Dingyi [1 ,2 ]
机构
[1] Guangzhou Univ, Sch Math & Informat Sci, Guangzhou, Guangdong, Peoples R China
[2] Guangzhou Univ, Guangdong Higher Educ Inst, Key Lab Math & Interdisciplinary Sci, Guangzhou, Guangdong, Peoples R China
[3] City Univ Hong Kong, Dept Comp Sci, Hong Kong, Peoples R China
基金
新加坡国家研究基金会; 中国国家自然科学基金;
关键词
Cloud Computing; outsourcing computation; key agreement; modular exponentiation; FULLY HOMOMORPHIC ENCRYPTION; COMPUTATIONS;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloud computing is an emerging computing paradigm in which IT resources and capacities are provided as services over the Internet. It also brings forth new challenges for security when clients want to securely outsource the computation of operations to the untrusted cloud servers. In cloud computing, it is difficult to implement most of cryptographic protocols among clients for this reason that all clients are possibly weaker than computationally powerful players. Hence, clients have to appeal to cloud servers for assistance. However, cloud servers are untrusted so that cryptographic protocols cannot be realized securely. In this paper, we design a secure key agreement scheme for two weaker clients who delegate cloud server to compute modular exponentiation. In our scheme, two clients can get same key for symmetric cryptosystem even that cloud server is untrusted.
引用
收藏
页数:5
相关论文
共 50 条
  • [21] A Scalable and Efficient User Authentication Scheme for Cloud Computing Environments
    Moghaddam, Faraz Fatemi
    Moghaddam, Shiva Gerayeli
    Rouzbeh, Sohrab
    Araghi, Sagheb Kohpayeh
    Alibeigi, Nima Morad
    Varnosfaderani, Shirin Dabbaghi
    2014 IEEE REGION 10 SYMPOSIUM, 2014, : 508 - 513
  • [22] Attribute Based DRM Scheme with Efficient Revocation in Cloud Computing
    Huang, Qinlong
    Ma, Zhaofeng
    Fu, Jingyi
    Niu, Xinxin
    Yang, Yixian
    JOURNAL OF COMPUTERS, 2013, 8 (11) : 2776 - 2781
  • [23] Efficient Keyword Search Scheme in Encrypted Cloud Computing Environment
    Shu, Jiangang
    Sun, Xingming
    Zhou, Lu
    Wang, Jin
    INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2014, 7 (05): : 65 - 76
  • [24] A Higher-Level Security Scheme for Key Access on Cloud Computing
    Celiktas, Baris
    Celikbilek, Ibrahim
    Ozdemir, Enver
    IEEE ACCESS, 2021, 9 : 107347 - 107359
  • [25] Efficient Data Distribution and Sharing in Mobile Cloud Computing
    Vemulapalli, Chaitanya
    Madria, Sanjay Kumar
    Linderman, Mark
    INTERNATIONAL JOURNAL OF NEXT-GENERATION COMPUTING, 2014, 5 (03): : 200 - 217
  • [26] An efficient public key secure scheme for cloud and IoT security
    Thirumalai, Chandrasegar
    Mohan, Senthilkumar
    Srivastava, Gautam
    COMPUTER COMMUNICATIONS, 2020, 150 (150) : 634 - 643
  • [27] A Key-Ordered Decisional Learning Parity with Noise (DLPN) Scheme for Public Key Encryption Scheme in Cloud Computing
    Lakum, Tarasvi
    Rao, B. Thirumala
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2019, 10 (11) : 157 - 161
  • [28] An efficient random key pre-distribution scheme
    Ramkumar, M
    Memon, N
    GLOBECOM '04: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-6, 2004, : 2218 - 2223
  • [29] Secure and efficient proxy re-encryption scheme based on key-homomorphic constrained PRFs in cloud computing
    Luo, Wei
    Ma, Wenping
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (02): : 541 - 551
  • [30] Secure and efficient proxy re-encryption scheme based on key-homomorphic constrained PRFs in cloud computing
    Wei Luo
    Wenping Ma
    Cluster Computing, 2019, 22 : 541 - 551