A new definition of homomorphic signature for identity management in mobile cloud computing

被引:15
|
作者
Wang, Zhiwei [1 ,2 ,3 ]
Sur, Guozi [1 ,2 ,3 ]
Chen, Danwei [1 ,2 ,3 ]
机构
[1] Nanjing Univ Posts & Telecommun, Coll Comp, Nanjing 210003, Jiangsu, Peoples R China
[2] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing 100190, Peoples R China
[3] Jiangsu High Technol Res Key Lab Wireless Sensor, Nanjing 210003, Jiangsu, Peoples R China
基金
中国国家自然科学基金;
关键词
Homomorphic signature; Identity management; Mobile cloud computing; GHR signature; SANITIZABLE SIGNATURES; SCHEMES; SECURITY;
D O I
10.1016/j.jcss.2013.06.010
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we define a new homomorphic signature for identity management in mobile cloud computing. A mobile user firstly computes a full signature on all his sensitive personal information (SPI), and stores it in a trusted third party (UP). During the valid period of his full signature, if the user wants to call a cloud service, he should authenticate him to the cloud service provider (CSP) through UP. In our scheme, the mobile user only needs to send a {0,1}(n) vector to the access controlling server (UP). The access controlling server who doesn't know the secret key can compute a partial signature on a small part of user's SPI, and then sends it to the CSP. We give a formal secure definition of this homomorphic signature, and construct a scheme from GHR signature. We prove that our scheme is secure under GHR signature. (C) 2013 Elsevier Inc. All rights reserved.
引用
收藏
页码:546 / 553
页数:8
相关论文
共 50 条
  • [1] Secure Identity Management In Mobile Cloud Computing
    Suguna, M.
    Shalinie, S. Mercy
    Anusia, R.
    Deepti, S.
    2017 INTERNATIONAL CONFERENCE ON NEXTGEN ELECTRONIC TECHNOLOGIES: SILICON TO SOFTWARE (ICNETS2), 2017, : 42 - 45
  • [2] A New Lightweight Homomorphic Encryption Scheme for Mobile Cloud Computing
    Baharon, Mohd Rizuan
    Shi, Qi
    Llewellyn-Jones, David
    CIT/IUCC/DASC/PICOM 2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY - UBIQUITOUS COMPUTING AND COMMUNICATIONS - DEPENDABLE, AUTONOMIC AND SECURE COMPUTING - PERVASIVE INTELLIGENCE AND COMPUTING, 2015, : 618 - 625
  • [3] Homomorphic Encryption in Mobile Multi Cloud Computing
    Louk, Maya
    Lim, Hyotaek
    2015 INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), 2015, : 493 - 497
  • [4] Slight Homomorphic Signature for Access Controlling in Cloud Computing
    Wang, Zhiwei
    Sha, Kewei
    Lv, Wei
    WIRELESS PERSONAL COMMUNICATIONS, 2013, 73 (01) : 51 - 61
  • [5] Slight Homomorphic Signature for Access Controlling in Cloud Computing
    Zhiwei Wang
    Kewei Sha
    Wei Lv
    Wireless Personal Communications, 2013, 73 : 51 - 61
  • [6] Consolidated Identity Management System for secure mobile cloud computing
    Khalil, Issa
    Khreishah, Abdallah
    Azeem, Muhammad
    COMPUTER NETWORKS, 2014, 65 : 99 - 110
  • [7] Improved Identity Management Protocol for Secure Mobile Cloud Computing
    Park, In-Shin
    Lee, Yoon-Deock
    Jeong, Jonpil
    PROCEEDINGS OF THE 46TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, 2013, : 4958 - 4965
  • [8] Integrity checking protocol with identity-based proxy signature in mobile cloud computing
    Yan, Li
    Shi, Run-Hua
    Zhong, Hong
    Cui, Jie
    Zhang, Shun
    Xu, Yan
    Tongxin Xuebao/Journal on Communications, 2015, 36 (10): : 278 - 286
  • [9] Identity-Based Proxy Signature Multiple-File PDP for Mobile Cloud Computing
    Yuan, Yuan
    Xie, Fu
    2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE) AND IEEE/IFIP INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (EUC), VOL 1, 2017, : 381 - 387
  • [10] Secure scheme on mobile multi cloud computing based on homomorphic encryption
    Zkik, Karim
    Orhanou, Ghizlane
    El Hajji, Said
    2016 INTERNATIONAL CONFERENCE ON ENGINEERING & MIS (ICEMIS), 2016,