Yingying Qiao, Xiaonan Jiang, H. Lin, Jeng-Shyang Pan
{"title":"云环境下高效的基于身份的门限代理签名方案","authors":"Yingying Qiao, Xiaonan Jiang, H. Lin, Jeng-Shyang Pan","doi":"10.1109/ISIC.2012.6449706","DOIUrl":null,"url":null,"abstract":"Threshold proxy signature is more practical, flexible and secure than traditional proxy signature and multi-proxy signature schemes. However, the majority of existing identity-based threshold proxy signature schemes is still inefficient and impractical. Cloud services allow users to create, store, edit, and read electronic documents on the internet conveniently. While access control mechanisms enable communications between user terminals and the cloud to be executed securely and in a trusted manner. In this paper, we proposed a refined efficient identity-based threshold proxy signature in the cloud environment. Our approach is not only practical but also enjoys fewer rounds of communication and less operation cost in comparison to the existing schemes. In this paper, we have also introduced the implementation of our approach in the cloud environment.","PeriodicalId":393653,"journal":{"name":"2012 International Conference on Information Security and Intelligent Control","volume":"47 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Efficient identity based threshold proxy signature scheme in cloud environment\",\"authors\":\"Yingying Qiao, Xiaonan Jiang, H. Lin, Jeng-Shyang Pan\",\"doi\":\"10.1109/ISIC.2012.6449706\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Threshold proxy signature is more practical, flexible and secure than traditional proxy signature and multi-proxy signature schemes. However, the majority of existing identity-based threshold proxy signature schemes is still inefficient and impractical. Cloud services allow users to create, store, edit, and read electronic documents on the internet conveniently. While access control mechanisms enable communications between user terminals and the cloud to be executed securely and in a trusted manner. In this paper, we proposed a refined efficient identity-based threshold proxy signature in the cloud environment. Our approach is not only practical but also enjoys fewer rounds of communication and less operation cost in comparison to the existing schemes. In this paper, we have also introduced the implementation of our approach in the cloud environment.\",\"PeriodicalId\":393653,\"journal\":{\"name\":\"2012 International Conference on Information Security and Intelligent Control\",\"volume\":\"47 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2012-08-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2012 International Conference on Information Security and Intelligent Control\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISIC.2012.6449706\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 International Conference on Information Security and Intelligent Control","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISIC.2012.6449706","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Efficient identity based threshold proxy signature scheme in cloud environment
Threshold proxy signature is more practical, flexible and secure than traditional proxy signature and multi-proxy signature schemes. However, the majority of existing identity-based threshold proxy signature schemes is still inefficient and impractical. Cloud services allow users to create, store, edit, and read electronic documents on the internet conveniently. While access control mechanisms enable communications between user terminals and the cloud to be executed securely and in a trusted manner. In this paper, we proposed a refined efficient identity-based threshold proxy signature in the cloud environment. Our approach is not only practical but also enjoys fewer rounds of communication and less operation cost in comparison to the existing schemes. In this paper, we have also introduced the implementation of our approach in the cloud environment.