4.5 Article

A threshold hybrid encryption method for integrity audit without trusted center

出版社

SPRINGER
DOI: 10.1186/s13677-020-00222-6

关键词

Sharing services; Integrity auditing; Cloud storage; Threshold hybrid encryption; Multiple managers

资金

  1. National Natural Science Foundation of China [U19B2021, 61972457]
  2. National Cryptography Development Fund [MMJJ20180111]
  3. Science & Technology Plan Projects of Henan Province [212102210084, 192102210295]
  4. Key Research and Development Program of Shaanxi [2020ZDLGY08-04]
  5. Innovation Scientists and Technicians Troop Construction Projects of Henan Province

向作者/读者索取更多资源

This paper proposes a new threshold hybrid encryption for integrity auditing method in cloud storage, using AES and ECC with Shamir secret sharing. The method distributes and manages keys without a trusted center, and also includes an integrity auditing and re-signature method to solve collusion issues. Security analysis and performance evaluation show that the scheme achieves correctness, security, and efficiency with low communication and computation cost.
Cloud storage with sharing services is increasingly popular among data owners. However, it is difficult for the users to know if the cloud server providers (CSPs) indeed protect their data. To verify data integrity and preserve data and key privacy in the group, this paper proposes a new threshold hybrid encryption for integrity auditing method without trusted center. The proposed method is developed based on the Advanced Encryption Standard (AES) and the Elliptic Curve Cryptography (ECC) with Shamir secret sharing. In this way, the key can be distributed and managed without trusted center, preserving the privacy of the key of the AES and users' private key. Besides, we design and implement a novel integrity auditing and re-signature method which verifies the data integrity and solves the collusion question of the cloud and the revoked users. Security analysis and performance evaluation demonstrate that the proposed scheme realizes the correctness, security, and efficiency with a low communication and computation cost.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.5
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据