Powered by OpenAIRE graph
Found an issue? Give us feedback
image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Future Generation Co...arrow_drop_down
image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
Future Generation Computer Systems
Article . 2018 . Peer-reviewed
License: Elsevier TDM
Data sources: Crossref
https://doi.org/10.1109/ispan-...
Article . 2017 . Peer-reviewed
Data sources: Crossref
DBLP
Article
Data sources: DBLP
DBLP
Conference object
Data sources: DBLP
versions View all 4 versions
addClaim

Key-aggregate authentication cryptosystem for data sharing in dynamic cloud storage

Authors: Cheng Guo 0001; Ningqi Luo; Md. Zakirul Alam Bhuiyan; Yingmo Jie; Yuanfang Chen; Bin Feng 0002; Muhammad Alam 0002;

Key-aggregate authentication cryptosystem for data sharing in dynamic cloud storage

Abstract

Sharing encrypted data with different users via public cloud storage is an important research issue. This paper proposes a key-aggregate authentication cryptosystem. The cryptosystem generates a constant-size key that supports flexible delegation of decryption rights for any set of ciphertexts. The key-size is independent of the number of maximum ciphertexts such that the expense of our scheme is stable no matter how frequently users upload files to the cloud server dynamically. In addition, the authentication process in our scheme solves the key-leakage problem of data sharing. Data owner can extract an aggregated key which includes ciphertexts' indices, delegatee's identity and expiration date of the key. The cloud server obtains the identity of download-applicant from the key with public parameter and then controls download right. This paper proves that the authentication key cannot be fudged and the message in this key cannot be denied. In order to achieve efficient and secure data sharing in dynamic cloud storage, the proposed method should be stable in expense, and should be leakage-resilient. Our scheme can satisfy both requirements.

  • BIP!
    Impact byBIP!
    selected citations
    These citations are derived from selected sources.
    This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    50
    popularity
    This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
    Top 10%
    influence
    This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    Top 10%
    impulse
    This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
    Top 10%
Powered by OpenAIRE graph
Found an issue? Give us feedback
selected citations
These citations are derived from selected sources.
This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Citations provided by BIP!
popularity
This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
BIP!Popularity provided by BIP!
influence
This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Influence provided by BIP!
impulse
This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
BIP!Impulse provided by BIP!
50
Top 10%
Top 10%
Top 10%
Upload OA version
Are you the author of this publication? Upload your Open Access version to Zenodo!
It’s fast and easy, just two clicks!