Outsourced Decentralized Multi-Authority Attribute Based Signature and Its Application in IoT

نویسندگان

چکیده

IoT (Internet of things) devices often collect data and store the in cloud for sharing further processing; This collection, sharing, processing will inevitably encounter secure access authentication issues. Attribute based signature (ABS), which utilizes signer’s attributes to generate private keys, plays a competent role identity privacy preservation. In ABS, there are multiple authorities that issue different keys signers on their various attributes, central authority is usually established manage all these attribute authorities. However, one security concern if compromised, whole system be broken. this paper, we present an outsourced decentralized multi-authority (ODMA-ABS) scheme. The proposed ODMA-ABS achieves stronger authority-corruption resistance than existing schemes can achieve. addition, overhead reduced by outsourcing expensive computation signing server. We extensive analysis experimental simulation also propose control scheme ODMA-ABS.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Multi-authority Attribute Based Encryption

In an identity based encryption scheme, each user is identified by a unique identity string. An attribute based encryption scheme (ABE), in contrast, is a scheme in which each user is identified by a set of attributes, and some function of those attributes is used to determine decryption ability for each ciphertext. Sahai and Waters introduced a single authority attribute encryption scheme and ...

متن کامل

Key-Policy Multi-authority Attribute-Based Encryption

Bilinear groups are often used to create Attribute-Based Encryption (ABE) algorithms. In particular, they have been used to create an ABE system with multi authorities, but limited to the ciphertext-policy instance. Here, for the first time, we propose two multi-authority key-policy ABE systems. In our first proposal, the authorities may be set up in any moment and without any coordination. A p...

متن کامل

Secure Attribute-based Threshold Signature without a Trusted Central Authority

Currently, in most attribute-based cryptosystem, the central authority that distributes private keys for attributes assigned to the user must be trusted unconditionally otherwise the systems will soon be collapsed. To solve the problem we propose a new attributebased threshold signature scheme without a trusted central authority. When the number of user’s attributes reaches the threshold he can...

متن کامل

Secure Outsourced Attribute-based Encryption

Attribute-Based Encryption (ABE) is a promising cryptographic primitive which significantly enhances the versatility of access control mechanisms. Due to the high expressiveness of ABE policies, the computational complexities of ABE key-issuing (by Attribute Authorities (AAs)) and decryption (by eligible users) are getting prohibitively high. Despite that the existing Outsourced ABE solutions a...

متن کامل

Multi-authority Attribute Based Encryption in Cloud Computing for Agriculture

Cloud computing is a revolutionary computing paradigm, which enables flexible, on-demand, and low-cost usage of computing resources, but the data is outsourced to some cloud servers, and various privacy concerns emerge from it. Various schemes based on the attribute-based encryption have been proposed to secure the cloud storage. However, most work focuses on the data contents privacy and the a...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Cloud Computing

سال: 2021

ISSN: ['2168-7161', '2372-0018']

DOI: https://doi.org/10.1109/tcc.2019.2902380