2017
DOI: 10.1007/s00607-017-0548-7
|View full text |Cite
|
Sign up to set email alerts
|

An efficient signcryption for data access control in cloud computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
13
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 36 publications
(13 citation statements)
references
References 24 publications
0
13
0
Order By: Relevance
“…Similarly, in [10], authors propose an identity-based signcryption scheme with efficient revocation access control for big data, leveraging a centralized PKG for key distribution between users and the analytical system. In [11], authors propose an identity based signcryption scheme with proxy reencryption access control, also relying on a centralized PKG between users and cloud. Authors in [12], propose to use a trusted third-party system between users, data owners and cloud storage to distribute keys, handle encryption and decryption, as well as authentication.…”
Section: Related Workmentioning
confidence: 99%
“…Similarly, in [10], authors propose an identity-based signcryption scheme with efficient revocation access control for big data, leveraging a centralized PKG for key distribution between users and the analytical system. In [11], authors propose an identity based signcryption scheme with proxy reencryption access control, also relying on a centralized PKG between users and cloud. Authors in [12], propose to use a trusted third-party system between users, data owners and cloud storage to distribute keys, handle encryption and decryption, as well as authentication.…”
Section: Related Workmentioning
confidence: 99%
“…Another application of signcryption technique can be seen in cloud applications to address security challenges . The design of signcryption schemes for sharing the data via public clouds has a more favorable advantage in terms of both data origin mutual authentication, unlinkability between any arbitrary sessions, and efficient in terms of computation as well as communication costs. The applications of signcryption are also observed in the Internet of Things to address the challenges of security .…”
Section: Introductionmentioning
confidence: 99%
“…At IMACC'13, Nakano et al [6] presented two generic constructions of signcryption in the standard model. At 2017, Li et al [7] proposed a signcryption for cloud computing. At PQCrypto' 18 [8] proposed lattice-based signcryption without random oracles.…”
Section: Introductionmentioning
confidence: 99%