4.7 Article

Authentication and Key Agreement Based on Anonymous Identity for Peer-to-Peer Cloud

Related references

Note: Only part of the references are listed.
Article Computer Science, Hardware & Architecture

Design of Secure Authenticated Key Management Protocol for Cloud Computing Environments

Wei Li et al.

Summary: This paper addresses the security flaws and high computational costs of existing three-factor Mutual Authentication and Key Agreement (MAKA) protocols, proposing a dynamic revocable protocol that utilizes Schnorr signatures for user dynamic management. The protocol provides a formal security proof in the random oracle, meeting various demands in multi-server environments and being well suited for computing resource constrained smart devices. Simulation implementation proves the feasibility of the protocol.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2021)

Article Computer Science, Hardware & Architecture

Revocable Identity-Based Broadcast Proxy Re-Encryption for Data Sharing in Clouds

Chunpeng Ge et al.

Summary: Cloud computing relies on massive storage and computing capabilities, making secure data sharing crucial. Recent IB-BPRE schemes aim to address this, but involve users in the complex key sharing process. To simplify this, a new RIB-BPRE scheme allows proxies to revoke specific users from the re-encryption key, making it efficient and practical.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2021)

Article Computer Science, Information Systems

A Provably Secure and Efficient Identity-Based Anonymous Authentication Scheme for Mobile Edge Computing

Xiaoying Jia et al.

IEEE SYSTEMS JOURNAL (2020)

Article Automation & Control Systems

Blockchain-Based Anonymous Authentication With Key Management for Smart Grid Edge Computing Infrastructure

Jing Wang et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2020)

Article Computer Science, Theory & Methods

Extensible Conditional Privacy Protection Authentication Scheme for Secure Vehicular Networks in a Multi-Cloud Environment

Jie Cui et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2020)

Article Computer Science, Information Systems

OOABKS: Online/offline attribute-based encryption for keyword search in mobile cloud

Jie Cui et al.

INFORMATION SCIENCES (2019)

Article Engineering, Electrical & Electronic

Provably Secure Authenticated Key Agreement Scheme for Smart Grid

Vanga Odelu et al.

IEEE TRANSACTIONS ON SMART GRID (2018)

Article Computer Science, Information Systems

A proxy broadcast re-encryption for cloud data sharing

Maosheng Sun et al.

MULTIMEDIA TOOLS AND APPLICATIONS (2018)

Article Computer Science, Information Systems

Secure attribute-based data sharing for resource-limited users in cloud computing

Jin Li et al.

COMPUTERS & SECURITY (2018)

Article Computer Science, Theory & Methods

Pairing based anonymous and secure key agreement protocol for smart grid edge computing infrastructure

Khalid Mahmood et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)

Article Computer Science, Hardware & Architecture

A Provably-Secure Cross-Domain Handshake Scheme with Symptoms-Matching for Mobile Healthcare Social Network

Debiao He et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2018)

Article Computer Science, Information Systems

AKSER: Attribute-based keyword search with efficient revocation in cloud computing

Jie Cui et al.

INFORMATION SCIENCES (2018)

Article Health Care Sciences & Services

CDAKA: A Provably-Secure Heterogeneous Cross-Domain Authenticated Key Agreement Protocol with Symptoms-Matching in TMIS

Xiaoxue Liu et al.

JOURNAL OF MEDICAL SYSTEMS (2018)

Article Computer Science, Theory & Methods

Provably secure authenticated key agreement scheme for distributed mobile cloud computing services

Vanga Odelu et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2017)

Article Computer Science, Information Systems

SeDaSC: Secure Data Sharing in Clouds

Mazhar Ali et al.

IEEE SYSTEMS JOURNAL (2017)

Editorial Material Computer Science, Information Systems

Area-based mobile multicast group key management scheme for secure mobile cooperative sensing

Jie Cui et al.

SCIENCE CHINA-INFORMATION SCIENCES (2017)

Proceedings Paper Automation & Control Systems

A Privacy-Preserving Authentication Scheme in an Edge-Fog Environment

Arij Ben Amor et al.

2017 IEEE/ACS 14TH INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS (AICCSA) (2017)

Article Computer Science, Hardware & Architecture

Conditional Identity-Based Broadcast Proxy Re-Encryption and Its Application to Cloud Email

Peng Xu et al.

IEEE TRANSACTIONS ON COMPUTERS (2016)

Article Computer Science, Theory & Methods

A secure and efficient Ciphertext-Policy Attribute-Based Proxy Re-Encryption for cloud data sharing

Kaitai Liang et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2015)

Article Computer Science, Information Systems

A Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services

Jia-Lun Tsai et al.

IEEE SYSTEMS JOURNAL (2015)

Article Computer Science, Software Engineering

CloudMon: a resource-efficient IaaS cloud monitoring system based on networked intrusion detection system virtual appliances

Bo Li et al.

CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE (2015)

Article Computer Science, Hardware & Architecture

An anonymous mobile user authentication protocol using self-certified public keys based on multi-server architectures

Wen-Bin Hsieh et al.

JOURNAL OF SUPERCOMPUTING (2014)

Article Computer Science, Theory & Methods

Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud

Xuefeng Liu et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2013)

Article Computer Science, Information Systems

Dynamic Authentication for Cross-Realm SOA-Based Business Processes

Jie Xu et al.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2012)

Article Computer Science, Hardware & Architecture

A Secure Handshake Scheme with Symptoms-Matching for mHealthcare Social Network

Rongxing Lu et al.

MOBILE NETWORKS & APPLICATIONS (2011)

Article Computer Science, Theory & Methods

Security arguments for digital signatures and blind signatures

D Pointcheval et al.

JOURNAL OF CRYPTOLOGY (2000)