An Efficient Key Distribution Scheme in Cloud Computing

被引:0
|
作者
Tang, Chumming [1 ,2 ]
Wong, Duncan S. [3 ]
Hu, Xing [1 ,2 ]
Pei, Dingyi [1 ,2 ]
机构
[1] Guangzhou Univ, Sch Math & Informat Sci, Guangzhou, Guangdong, Peoples R China
[2] Guangzhou Univ, Guangdong Higher Educ Inst, Key Lab Math & Interdisciplinary Sci, Guangzhou, Guangdong, Peoples R China
[3] City Univ Hong Kong, Dept Comp Sci, Hong Kong, Peoples R China
基金
新加坡国家研究基金会; 中国国家自然科学基金;
关键词
Cloud Computing; outsourcing computation; key agreement; modular exponentiation; FULLY HOMOMORPHIC ENCRYPTION; COMPUTATIONS;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloud computing is an emerging computing paradigm in which IT resources and capacities are provided as services over the Internet. It also brings forth new challenges for security when clients want to securely outsource the computation of operations to the untrusted cloud servers. In cloud computing, it is difficult to implement most of cryptographic protocols among clients for this reason that all clients are possibly weaker than computationally powerful players. Hence, clients have to appeal to cloud servers for assistance. However, cloud servers are untrusted so that cryptographic protocols cannot be realized securely. In this paper, we design a secure key agreement scheme for two weaker clients who delegate cloud server to compute modular exponentiation. In our scheme, two clients can get same key for symmetric cryptosystem even that cloud server is untrusted.
引用
收藏
页数:5
相关论文
共 50 条
  • [31] An Efficient and Simple Key Distribution Scheme for Smart Environments
    Kumar, Pardeep
    Ylianttila, Mika
    Gurtov, Andrei
    Sain, Mangal
    2014 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS (ICCE), 2014, : 470 - 471
  • [32] An Efficient and Flexible Decentralized Multicast Key Distribution Scheme
    Juang, Wen-Shenq
    Wu, Jyan-Cwan
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2006, 6 (8B): : 141 - 150
  • [33] Secure and efficient synchronization scheme for quantum key distribution
    Liu, Peng
    Yin, Hua-Lei
    OSA CONTINUUM, 2019, 2 (10): : 2883 - 2890
  • [34] An efficient and revocable storage CP-ABE scheme in the cloud computing
    Zhao, Yang
    Ren, Mao
    Jiang, Songquan
    Zhu, Guobin
    Xiong, Hu
    COMPUTING, 2019, 101 (08) : 1041 - 1065
  • [35] An efficient traceable data sharing scheme in cloud computing for mobile devices
    Wang Z.
    Ye J.
    Wang J.
    Wang, Zhiying (392535641@qq.com), 2018, Inderscience Publishers, 29, route de Pre-Bois, Case Postale 856, CH-1215 Geneva 15, CH-1215, Switzerland (12) : 156 - 165
  • [36] Secure and Efficient Online Fingerprint Authentication Scheme Based On Cloud Computing
    Liu, Yao
    Zhou, Tanping
    Yue, Zelun
    Liu, Wenchao
    Han, Yiliang
    Li, Qi
    Yang, Xiaoyuan
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2023, 11 (01) : 564 - 578
  • [37] An efficient and revocable storage CP-ABE scheme in the cloud computing
    Yang Zhao
    Mao Ren
    Songquan Jiang
    Guobin Zhu
    Hu Xiong
    Computing, 2019, 101 : 1041 - 1065
  • [38] An Efficient Conjunctive Keyword Searchable Encryption Scheme for Mobile Cloud Computing
    Lin, Tao
    Sun, Zexian
    Sun, Hexu
    Cao, Bin
    INTELLIGENT COMPUTING THEORIES AND APPLICATION, ICIC 2016, PT II, 2016, 9772 : 659 - 669
  • [39] An Efficient Encryption Scheme with Verifiable Outsourced Decryption in Mobile Cloud Computing
    Li, Jing
    Guan, Zhitao
    Du, Xiaojiang
    Zhang, Zijian
    Wu, Jun
    2017 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2017,
  • [40] An efficient and secure data sharing scheme for mobile devices in cloud computing
    Xiuqing Lu
    Zhenkuan Pan
    Hequn Xian
    Journal of Cloud Computing, 9