Design and development of a secure certificateless proxy signature based (SE-CLPS) encryption scheme for cloud storage
نویسندگان
چکیده
Certificateless Public Key Cryptography (CL-PKC) scheme is a new standard that combines Identity (ID)-based cryptography and tradi- tional PKC. It yields better security than the ID-based without requiring digital certificates. In CL-PKC scheme, as Generation Center (KGC) generates public key using partial secret key, need for authenticating by trusted third party avoided. Due to lack of authentication, associated with private user may be replaced anyone. Therefore, ciphertext cannot decrypted accurately. To mitigate this issue, an Enhanced Proxy Signature (E-CLPS) proposed offer high guarantee requires minimum computational cost. work, Hackman tool used detecting dictionary attacks in cloud. From experimental analysis, it observed E-CLPS Attack Detection Rate, True Positive Negative Rate Minimum False Positives Negatives existing schemes.
منابع مشابه
A Provably Secure Certificateless Proxy Signature Scheme
Proxy signature, a variant of digital signature, is in the limelight in recent years for secure communication. For instance, when a manager is occupied with business matters, or travelling on business, he has to delegate an agent to deal with his day-today office concerns. Therefore, a proxy signature scheme is necessary in this scenario. Although identity-based proxy signature schemes have bee...
متن کاملA Certificateless Proxy Signature Scheme Secure In Standard Model
A proxy signature scheme allows one user to delegate his/her signing authority to another user called a proxy signer in such a way that the latter can sign messages on behalf of the former. Moreover, after verification, the verifier is convinced of the original signer’s agreement on the signed message. There exist several certificateless proxy signature schemes in the literature, but all of the...
متن کاملA Provably Secure Proxy Signature Scheme in Certificateless Cryptography
A proxy signature scheme enables an original signer to delegate its signing capability to a proxy signer and then the proxy signer can sign a message on behalf of the original signer. Recently, in order to eliminate the use of certificates in certified public key cryptography and the key-escrow problem in identity-based cryptography, the notion of certificateless public key cryptography was int...
متن کاملA Secure Code Based Cloud Storage System Using Proxy Re-Encryption Scheme in Cloud Computing
Cloud computing is a model for enabling convenient, on demand network access to a shared pool of computing resources. The cloud storage system consists of a collection of storage servers and key servers. Storing data in a third party cloud system causes serious concern on data confidentiality, so a user divides the data into blocks, encrypts and stores them in various storage servers. The stora...
متن کاملChosen-Ciphertext Secure Certificateless Proxy Re-Encryption
In this paper we introduce the notion of certificateless proxy re-encryption and also give precise definitions for secure certificateless proxy re-encryption schemes. We present a concrete scheme based on bilinear pairing, which enjoys the advantages of certificateless public key cryptography while providing the functionalities of proxy re-encryption. Moreover, the proposed scheme is unidirecti...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International journal of engineering & technology
سال: 2021
ISSN: ['2227-524X']
DOI: https://doi.org/10.14419/ijet.v10i1.21480