Two Efficient outsourced ABS (OABS) Schemes Denoted By OABS-I And OABS-II To Build An Efficient outsourced Verifying Protocol

M vamsi Krishna, S Madhuri, Y Praveen Kumar

Abstract


Attribute-based signature (ABS) facilitates revelry to mark a message with fine-grained access control over make out information. Particularly, in an ABS system, users get hold of their attribute private keys from an attribute authority, with which they can presently sign messages for any predicate fulfilled by their attributes. We first advise and formalize a new concept called Outsourced ABS, i.e., OABS, in which the computational overhead at user side is really concentrated through outsourcing concentrated computations to an untrusted signing-cloud service provider (S-CSP). In addition, we be relevant this novel paradigm to existing ABS schemes to decrease the difficulty.


Keywords


Outsource-secure algorithm, Cloud computing, Attribute-based signature.

References


M. J. Atallah, K. Pantazopoulos, J. R. Rice, and E. E. Spafford, Secure outsourcing of scientific computations, Trends in Software Engineering, Elsevier, 2002, vol. 54, pp. 215-272.

M. J. Atallah and J. Li, Secure outsourcing of sequence comparisons, International Journal of Information Security, 2005, vol. 4, pp. 277-287.

M. J. Atallah and K. B. Frikken, Securely outsourcing linear algebra computations, ASIACCS 2010, ACM, 2010, pp. 48-59.

D. Benjamin and M. J. Atallah, Private and cheating-free outsourcing of algebraic computations, PST 2008, IEEE Computer Society, 2008, pp. 240-245.

D. Beaver, J. Feigenbaum, J. Kilian, and P. Rogaway, Locally random reductions: Improvements and applications, Journal of Cryptology, 10(1), pp.17-36, 1997.

D. Boneh, X. Ding, G. Tsudik, and C.-M. Wong, A method for fast revocation of public key certificates and security capabilities, USENIX Security Symposium, 2001.

D. Boneh, X. Ding, and G. Tsudik, Fine-grained control of security capabilities, ACM Trans. Internet Technol., vol. 4, no. 1, 2004, pp. 60-82.

D. Boneh, C. Gentry, and B. Waters, Collusion resistant broadcast encryption with short ciphertexts and private keys, CRYPTO 2005, LNCS 3621, Springer, 2005, pp. 258-275.

V. Boyko, M. Peinado, and R. Venkatesan, Speeding up discrete log and factoring based schemes via precomputations, Advances in Cryptology-Eurocrypt 1998, LNCS 1403, Springer-Verlag, pp.221-232, 1998.

K. Bicakci and N. Baykal, Server assisted signatures revisited, CT-RSA 2004, Springer, LNCS 2964, 2004, pp. 1991-1992.

D. Chaum and T. Pedersen, Wallet databases with observers, Advances in Cryptology-Crypto 1992, LNCS 740, Springer- Verlag, pp.89-105, 1993.

X. Chen, J. Li, and W. Susilo, Efficient Fair Conditional Payments for Outsourcing Computations, IEEE Transactions on Information Forensics and Security, 7(6), pp.1687-1694, 2012.

X. Chen, J. Li, J. Ma, Q. Tang, and W. Lou, New algorithms for secure outsourcing of modular exponentiations, ESORICS 2012, LNCS 7459, pp.541-556, Springer-Verlag, 2012.

K.-M. Chung, Y. Kalai, F.-H. Liu, and R. Raz, Memory delegation, CRYPTO 2011, LNCS 6841, Springer, 2011, pp. 151-168.

C. Delerable and D. Pointcheval, Dynamic threshold public-key encryption, in Advances in Cryptology-CRYPTO 2008, LNCS 5157, Springer, 2008, pp. 317-334.


Full Text: PDF [FULL TEXT]

Refbacks

  • There are currently no refbacks.


Copyright © 2013, All rights reserved.| ijseat.com

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.