Outsourced Decentralized Multi-Authority Attribute Based Signature and Its Application in IoT
نویسندگان
چکیده
IoT (Internet of things) devices often collect data and store the in cloud for sharing further processing; This collection, sharing, processing will inevitably encounter secure access authentication issues. Attribute based signature (ABS), which utilizes signer’s attributes to generate private keys, plays a competent role identity privacy preservation. In ABS, there are multiple authorities that issue different keys signers on their various attributes, central authority is usually established manage all these attribute authorities. However, one security concern if compromised, whole system be broken. this paper, we present an outsourced decentralized multi-authority (ODMA-ABS) scheme. The proposed ODMA-ABS achieves stronger authority-corruption resistance than existing schemes can achieve. addition, overhead reduced by outsourcing expensive computation signing server. We extensive analysis experimental simulation also propose control scheme ODMA-ABS.
منابع مشابه
Multi-authority Attribute Based Encryption
In an identity based encryption scheme, each user is identified by a unique identity string. An attribute based encryption scheme (ABE), in contrast, is a scheme in which each user is identified by a set of attributes, and some function of those attributes is used to determine decryption ability for each ciphertext. Sahai and Waters introduced a single authority attribute encryption scheme and ...
متن کاملKey-Policy Multi-authority Attribute-Based Encryption
Bilinear groups are often used to create Attribute-Based Encryption (ABE) algorithms. In particular, they have been used to create an ABE system with multi authorities, but limited to the ciphertext-policy instance. Here, for the first time, we propose two multi-authority key-policy ABE systems. In our first proposal, the authorities may be set up in any moment and without any coordination. A p...
متن کاملSecure Attribute-based Threshold Signature without a Trusted Central Authority
Currently, in most attribute-based cryptosystem, the central authority that distributes private keys for attributes assigned to the user must be trusted unconditionally otherwise the systems will soon be collapsed. To solve the problem we propose a new attributebased threshold signature scheme without a trusted central authority. When the number of user’s attributes reaches the threshold he can...
متن کاملSecure Outsourced Attribute-based Encryption
Attribute-Based Encryption (ABE) is a promising cryptographic primitive which significantly enhances the versatility of access control mechanisms. Due to the high expressiveness of ABE policies, the computational complexities of ABE key-issuing (by Attribute Authorities (AAs)) and decryption (by eligible users) are getting prohibitively high. Despite that the existing Outsourced ABE solutions a...
متن کاملMulti-authority Attribute Based Encryption in Cloud Computing for Agriculture
Cloud computing is a revolutionary computing paradigm, which enables flexible, on-demand, and low-cost usage of computing resources, but the data is outsourced to some cloud servers, and various privacy concerns emerge from it. Various schemes based on the attribute-based encryption have been proposed to secure the cloud storage. However, most work focuses on the data contents privacy and the a...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Cloud Computing
سال: 2021
ISSN: ['2168-7161', '2372-0018']
DOI: https://doi.org/10.1109/tcc.2019.2902380