An Efficient Key Distribution Scheme in Cloud Computing

被引:0
|
作者
Tang, Chumming [1 ,2 ]
Wong, Duncan S. [3 ]
Hu, Xing [1 ,2 ]
Pei, Dingyi [1 ,2 ]
机构
[1] Guangzhou Univ, Sch Math & Informat Sci, Guangzhou, Guangdong, Peoples R China
[2] Guangzhou Univ, Guangdong Higher Educ Inst, Key Lab Math & Interdisciplinary Sci, Guangzhou, Guangdong, Peoples R China
[3] City Univ Hong Kong, Dept Comp Sci, Hong Kong, Peoples R China
基金
新加坡国家研究基金会; 中国国家自然科学基金;
关键词
Cloud Computing; outsourcing computation; key agreement; modular exponentiation; FULLY HOMOMORPHIC ENCRYPTION; COMPUTATIONS;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloud computing is an emerging computing paradigm in which IT resources and capacities are provided as services over the Internet. It also brings forth new challenges for security when clients want to securely outsource the computation of operations to the untrusted cloud servers. In cloud computing, it is difficult to implement most of cryptographic protocols among clients for this reason that all clients are possibly weaker than computationally powerful players. Hence, clients have to appeal to cloud servers for assistance. However, cloud servers are untrusted so that cryptographic protocols cannot be realized securely. In this paper, we design a secure key agreement scheme for two weaker clients who delegate cloud server to compute modular exponentiation. In our scheme, two clients can get same key for symmetric cryptosystem even that cloud server is untrusted.
引用
收藏
页数:5
相关论文
共 50 条
  • [41] An efficient clustering scheme for cloud computing problems using metaheuristic algorithms
    Baalamurugan, K. M.
    Bhanu, S. Vijay
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 5): : 12917 - 12927
  • [42] EACS: An Efficient Access Control Scheme for Electronic Publishing in Cloud Computing
    Wu Deming
    Zhang Yu
    Wang Lina
    Hou Jian
    Xiao Lei
    Chen Wei
    Zhou Qing
    CHINESE JOURNAL OF ELECTRONICS, 2018, 27 (01) : 60 - 69
  • [43] EACS: An Efficient Access Control Scheme for Electronic Publishing in Cloud Computing
    WU Deming
    ZHANG Yu
    WANG Lina
    HOU Jian
    XIAO Lei
    CHEN Wei
    ZHOU Qing
    Chinese Journal of Electronics, 2018, 27 (01) : 60 - 69
  • [44] An efficient scheme for SDN state consistency verification in cloud computing environment
    Wang, Xiaoyan
    Chen, Xingshu
    Wang, Yitong
    Ge, Long
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2020, 32 (02):
  • [45] An efficient and secure data sharing scheme for mobile devices in cloud computing
    Lu, Xiuqing
    Pan, Zhenkuan
    Xian, Hequn
    JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2020, 9 (01):
  • [46] Design of an Efficient Verification Scheme for Correctness of Outsourced Computations in Cloud Computing
    Vyas, Ronak
    Singh, Alok
    Singh, Jolly
    Soni, Gunjan
    Purushothama, B. R.
    SECURITY IN COMPUTING AND COMMUNICATIONS (SSCC 2015), 2015, 536 : 66 - 77
  • [47] An Efficient and Privacy-Preserving Biometric Identification Scheme in Cloud Computing
    Zhu, Liehuang
    Zhang, Chuan
    Xu, Chang
    Liu, Ximeng
    Huang, Cheng
    IEEE ACCESS, 2018, 6 : 19025 - 19033
  • [48] Efficient public key encryption with revocable keyword search in cloud computing
    Jianhong Zhang
    Jian Mao
    Cluster Computing, 2016, 19 : 1211 - 1217
  • [49] Efficient Verifiable Multi-Key Searchable Encryption in Cloud Computing
    Su, Yaping
    Wang, Jianfeng
    Wang, Yunling
    Miao, Meixia
    IEEE ACCESS, 2019, 7 : 141352 - 141362
  • [50] Efficient public key encryption with revocable keyword search in cloud computing
    Zhang, Jianhong
    Mao, Jian
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2016, 19 (03): : 1211 - 1217