2016
DOI: 10.1109/tc.2015.2479609
|View full text |Cite
|
Sign up to set email alerts
|

Achieving Simple, Secure and Efficient Hierarchical Access Control in Cloud Computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
32
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
6
4

Relationship

0
10

Authors

Journals

citations
Cited by 50 publications
(32 citation statements)
references
References 35 publications
0
32
0
Order By: Relevance
“…Firstly, based on the features of the group blind signature, the signature and message reveal neither the identity of data owner nor identity of the issuing signer. Then, the scheme is a conditional group blind signature which can identity malicious user if necessary [33].At last, we introduce the homomorphic tag mechanism [34,35,36,37,38] to verify the integrity of data. We believe that our contributions can widen the application scope of privacy-preserving in smart grid.…”
Section: Data Integrity Can Be Verified By CCmentioning
confidence: 99%
“…Firstly, based on the features of the group blind signature, the signature and message reveal neither the identity of data owner nor identity of the issuing signer. Then, the scheme is a conditional group blind signature which can identity malicious user if necessary [33].At last, we introduce the homomorphic tag mechanism [34,35,36,37,38] to verify the integrity of data. We believe that our contributions can widen the application scope of privacy-preserving in smart grid.…”
Section: Data Integrity Can Be Verified By CCmentioning
confidence: 99%
“…Reference [187] proposed a new security model that provided a simple, effective and secure structure for key distribution at any level using pseudo-random function and forward-secure pseudo-random generator. Reference [188] proposed a hierarchical key distribution scheme based on linear geometry. In this scheme, the keys of hierarchical structure are associated with a private vector, both the inner product of the private sector and the common vector can be used to obtain the subclass encryption key.…”
Section: Hierarchical Keymentioning
confidence: 99%
“…All these transformations involve computation of multi-linear maps. Tang et al [20] proposed an elegant scheme involving vectors and linear geometry where each class in the system has public and private keys in the form of key vectors. Encryption key of the descendant classes can be derived using inner product of the vector associated with the private key of the class and that with the public key of its descendants.…”
Section: Related Workmentioning
confidence: 99%