Parallel Proxy-Signcryption Scheme in Cloud Environment

被引:0
|
作者
Deng Wenping [1 ]
Wu Xuguang [2 ]
机构
[1] CAPF, Detachment Xinjiang Corps 1, Urumqi 830000, Peoples R China
[2] CAPF, Key Lab Networks & Informat Secur, Xian 710086, Peoples R China
关键词
cloud computing; parallel computing; proxy signcryption;
D O I
10.1109/INCoS.2015.35
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
A parallel proxy signcryption scheme is proposed, which significantly improves the secure message transmission in cloud environment. The imbalanced network model is presented, that is, powerful proxy agents are assumed the cloud service center; end users with limited ability are the sender and receiver of message transmission. The parallel proxy signcryption algorithm places the most calculating on the proxy agents, reducing the burden of end users. The messages are processed in parallel to reduce the computation and transmission overheads. Experiment result shows that, the improvement of CPU time is close to the theoretical value 50%.
引用
收藏
页码:402 / 406
页数:5
相关论文
共 50 条
  • [1] The efficient proxy-protected proxy-signcryption scheme based on the ECKCDSA for mobile environment
    Kim, KS
    Kim, JB
    Yang, HK
    [J]. 6TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL X, PROCEEDINGS: MOBILE/WIRELESS COMPUTING AND COMMUNICATION SYSTEMS II, 2002, : 26 - 30
  • [2] Identity based proxy-signcryption scheme from pairings
    Li, XX
    Chen, KF
    [J]. 2004 IEEE INTERNATIONAL CONFERENCE ON SERVICES COMPUTING, PROCEEDINGS, 2004, : 494 - 497
  • [3] A post-quantum communication secure identity-based proxy-signcryption scheme
    Zhang, Xiaojun
    Xu, Chunxiang
    Jin, Chunhua
    Wen, Junwei
    [J]. INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2015, 7 (02) : 147 - 165
  • [4] An Efficient and Provably-Secure Certificateless Proxy-Signcryption Scheme for Electronic Prescription System
    Li, Li
    Zhou, Siqin
    Choo, Kim-Kwang Raymond
    Li, Xiaohong
    He, Debiao
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [5] Convertible Proxy Signcryption Scheme
    李继国
    李建中
    曹珍富
    张亦辰
    [J]. Journal of Harbin Institute of Technology(New series), 2004, (02) : 209 - 213
  • [6] Efficient identity based proxy-signcryption schemes with forward security and public verifiability
    Wang, M
    Li, H
    Liu, ZJ
    [J]. NETWORKING AND MOBILE COMPUTING, PROCEEDINGS, 2005, 3619 : 982 - 991
  • [7] Proxy signcryption scheme in the standard model
    Ming, Yang
    Wang, Yumin
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (08) : 1431 - 1446
  • [8] A proxy signcryption scheme for secure sharing of industrial IoT data in fog environment
    Patil, Rachana Y.
    Patil, Yogesh H.
    [J]. INTERNATIONAL JOURNAL OF COMPUTATIONAL SCIENCE AND ENGINEERING, 2023, 26 (02) : 118 - 128
  • [9] Identity Based Generalized Proxy Signcryption Scheme
    Zhou, Cai-Xue
    [J]. INFORMATION TECHNOLOGY AND CONTROL, 2016, 45 (01): : 13 - 26
  • [10] An Efficient Proxy Blind Signcryption Scheme for IoT
    Khan, Aamer
    Ullah, Insaf
    Algarni, Fahad
    Naeem, Muhammad
    Uddin, M. Irfan
    Khan, Muhammad Asghar
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 70 (03): : 4293 - 4306