1,882 Hits in 4.8 sec

An Efficient Proxy Signature Scheme with Revocation

Manik Lal Das, Ashutosh Saxena, Ved P. Gulati
2004 Informatica  
The proposed second scheme provides an effective proxy revocation mechanism.  ...  The proposed first scheme does not consider proxy revocation mechanism; however, it will help us to compare our protocol with the existing RSA-based schemes.  ...  The revocation of delegated rights (i.e., proxy revocation) is an important issue of proxy signatures scheme.  ... 
doi:10.15388/informatica.2004.072 fatcat:7qiybnrei5fgxhqliw2iqnxuou

Strongly Unforgeable and Efficient Proxy Signature Scheme with Fast Revocation Secure in the Standard Model

Liaojun Pang, Huiyang Zhao, Xia Zhou, Huixian Li
2016 International Journal of Distributed Sensor Networks  
The existing proxy signature schemes with the proxy revocation function are proven to be malleable and do not possess strong unforgeability.  ...  Motivated by these concerns, a new proxy signature scheme with fast revocation is proposed, and it can be proved that the proposed scheme can achieve strong unforgeability in the standard model.  ...  Although strong unforgeability and fast revocation are achieved simultaneously, our scheme has almost no increase in computational efficiency as to other proxy signatures with revocation schemes.  ... 
doi:10.1155/2016/3205206 fatcat:h22mewu45vdmlkdz7beb72qf44

Review of Public Integrity Auditing and Group User Revocation for Shared Dynamic Cloud Data

Autade Dhanshri P, Prof. Raut S.Y
Also it provides efficient public integrity auditing scheme. There is efficient use of vector commitment and verifier local revocation group signature.  ...  We implement concrete scheme for group signature. The scheme support public checking, efficient user revocation, and properties like confidently, efficiency, count ability and traceability.  ...  In this paper, to improve the efficiency of user revocation, we propose to let the cloud to act as the proxy and convert signatures for users.  ... 
doi:10.17148/ijireeice.2015.31211 fatcat:ga7bb32hvjajpd37wg5khw6lra

A New Threshold Proxy Signature Scheme with Fast Revocation

Mohammad Beheshti Atashgah, Mahmoud Gardeshi, Majid Bayat
2012 International Journal of Computer and Electrical Engineering  
Moreover, the revocation of delegated rights is an essential issue of the many proxy signature schemes.  ...  In this paper, we try to solve the fast revocation issue of the threshold proxy signature schemes and propose a new threshold proxy signature scheme with fast revocation that solve the fast revocation  ...  s technique and proposed the first threshold proxy signature scheme with fast revocation.  ... 
doi:10.7763/ijcee.2012.v4.602 fatcat:zmwlt5uax5axxl3zblrsusvwhe

Public auditing for shared data with efficient user revocation in the cloud

Boyang Wang, Baochun Li, Hui Li
2013 2013 Proceedings IEEE INFOCOM  
In this paper, we propose a novel public auditing mechanism for the integrity of shared data with efficient user revocation in mind.  ...  By utilizing proxy re-signatures, we allow the cloud to re-sign blocks on behalf of existing users during user revocation, so that existing users do not need to download and re-sign blocks by themselves  ...  Therefore, HAPS is a homomorphic authenticable proxy re-signature scheme. V. PUBLIC AUDITING WITH EFFICIENT USER REVOCATION A.  ... 
doi:10.1109/infcom.2013.6567101 dblp:conf/infocom/WangLL13 fatcat:3wnnwiddsfg6zlmg2xhj6aubha

Two Stage Public Auditing for Shared Data with Efficient User Revocation in the Cloud

2015 International Journal of Science and Research (IJSR)  
Collusion-resistant proxy re-signature schemes generally have two levels of signatures.  ...  In this paper, we propose a novel public auditing mechanism for the integrity of shared data with efficient user revocation in mind.  ...  It present two provably-secure PDP schemes that are more efficient than previous solutions, even when compared with schemes that achieve weaker guarantees.  ... 
doi:10.21275/v4i11.nov151499 fatcat:kq5zbn5r6zbvtcj3yhb5tcpx44

Secure Multi-Owner Data Sharing for Dynamic Groups using Proxy-Signature in the Cloud

M. Siva, P. Naga, B. Tarakeswara
2015 International Journal of Computer Applications  
Homomorphic authenticable proxy signature scheme with public auditing mechanism checks imparted data integrity along to efficient user revocation.  ...  Cloud computing offers an economical and efficient solution for sharing data among the cloud users with low support without the weight of neighborhood data storing and upkeep.  ...  public auditing scheme for shared data and user data revocation[1]: Homomorphic authenticable proxy resignature scheme with Panda public auditing mechanism is used for public auditing of shared data with  ... 
doi:10.5120/ijca2015907675 fatcat:u22s3kxzpzdlxi3rnmipgozw24

A Lightweight Identity-Based Cloud Storage Auditing Supporting Proxy Update and Workload-Based Payment

Wenting Shen, Jing Qin, Jixin Ma
2019 Security and Communication Networks  
In order to release the user from the burden of generating data signatures, the proxy with a valid warrant is introduced to help the user process data in lightweight cloud storage auditing schemes.  ...  The signatures generated by the revoked proxy or the expired proxy can still be used to verify data integrity. Furthermore, our scheme also supports workload-based payment for the proxy.  ...  [25] considered the problem of user revocation in the cloud storage auditing and presented an identity-based shared data integrity auditing scheme supporting real efficient user revocation.  ... 
doi:10.1155/2019/8275074 fatcat:v4yd6qefsjgofcbpeik2hbe5bm

SoK: Delegation and Revocation, the Missing Links in the Web's Chain of Trust [article]

Laurent Chuat, AbdelRahman Abdou, Ralf Sasse, Christoph Sprenger, David Basin, Adrian Perrig
2020 arXiv   pre-print
We also show that combining short-lived delegated credentials or proxy certificates with an appropriate revocation system would solve several pressing problems.  ...  For this purpose, we propose a 19-criteria framework for characterizing revocation and delegation schemes.  ...  Specifically, we distinguish four types of revocation schemes: client-driven, where the browser establishes an out-of-band connection with a revocation provider; server-driven, where the TLS server attaches  ... 
arXiv:1906.10775v2 fatcat:hsi6whdv6jb25jc3qp43f7obka


From the extensive study, it was found that the overhead on the computational and communication overhead increase proportionally with an increase in the number of the user during the group signature generation  ...  There was a need for an effective cryptic mechanism with effective cloud storage and recovery of data.  ...  After extensive analysis, the proposed signature scheme proved to be highly efficient, securable, and viable for Cloud storage system and reduce the owner burden [27] .The notion of proxy re-signatures  ... 
doi:10.34218/ijcet.10.6.2019.002 fatcat:mayl46n4cnda5fctaemzlpwpna

Attribute based data sharing with attribute revocation

Shucheng Yu, Cong Wang, Kui Ren, Wenjing Lou
2010 Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security - ASIACCS '10  
In this paper we focus on an important issue of attribute revocation which is cumbersome for CP-ABE schemes.  ...  We achieve this by uniquely integrating the technique of proxy re-encryption with CP-ABE, and enable the authority to delegate most of laborious tasks to proxy servers.  ...  To deal with attribute revocation efficiently, we propose to enable proxy servers to handle revocation events in an aggregative way, which further makes lazy re-encryption [14] possible.  ... 
doi:10.1145/1755688.1755720 dblp:conf/ccs/YuWRL10 fatcat:mfarxh7x2ng6neekpqtjrh566u

Verifiable Encryption and Applications to Group Signatures and Signature Sharing

Jan Camenisch, Ivan B. Damgård
1998 BRICS Report Series  
We show a new application of verifiable encryption to group signatures with separability, these schemes do not need special purpose keys but can work with a wide range of signature and encryption schemes  ...  We generalise and improve the security and efficiency of the verifiable encryption scheme of Asokan et al., such that it can rely on more general assumptions, and can be proven secure without relying on  ...  Given any secure signature scheme with an associated Σ-protocol, and any secure public key encryption scheme.  ... 
doi:10.7146/brics.v5i32.19438 fatcat:6niwcpx57zdedh7vxxjphqx5vy

Efficient and Secure Group based Collusion Resistant Public Auditing Scheme for Cloud Storage

Smita Chaudhari, Gandharba Swain
2021 International Journal of Advanced Computer Science and Applications  
Many researchers have specified revocation procedures using re-signature, proxy-re-signature concept to deflect the collusion between the cloud server and a revoked user.  ...  To reduce this cost, a collusion resistant public auditing scheme with group member revocation is proposed in this paper.  ...  ACKNOWLEDGEENT This research work is an independent work and no financial assistance has been received for this work.  ... 
doi:10.14569/ijacsa.2021.0120356 fatcat:47w5qmuwrrhdvfqrex2wyci5gq

Verification Of Multi-Owner Shared Data With User Revocation And Collusion Resistance In Cloud Computing

Dipali S. Kasunde, Ms. A. A. Manjrekar
2018 Zenodo  
Proposed system also provides efficient user revocation with collusion resistance i.e. even if cloud colludes with any use rs;it is not able to learn the contents of the stored data.  ...  Cloud enables its users to easily store an d share the data with each other. Due to the security threats in a cloud,users are not assured about the integrity of their data.  ...  [7] figured out the collusion attack in the existing scheme and provided an efficient public auditing scheme with secure group user revocation based on vector commitment and verifier-local revocation  ... 
doi:10.5281/zenodo.1468504 fatcat:p7qimog4evcrlaikpwxzpsamtm

Proxy Signature Scheme with Effective Revocation Using Bilinear Pairings [article]

Manik Lal Das, Ashutosh Saxena, Deepak B Phatak
2007 arXiv   pre-print
We present a proxy signature scheme using bilinear pairings that provides effective proxy revocation.  ...  the pairing-based proxy signature schemes.  ...  Conclusion We proposed a proxy signature scheme using bilinear pairings that provides effective proxy revocation.  ... 
arXiv:0712.3084v1 fatcat:f6tzmjpsqjewxe64nvia6zxbx4
« Previous Showing results 1 — 15 out of 1,882 results