Proceedings of the 14th International Joint Conference on E-Business and Telecommunications 2017
DOI: 10.5220/0006469202120225
|View full text |Cite
|
Sign up to set email alerts
|

Constant-size Threshold Attribute based SignCryption for Cloud Applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
45
0

Year Published

2018
2018
2020
2020

Publication Types

Select...
3
2
2

Relationship

3
4

Authors

Journals

citations
Cited by 30 publications
(45 citation statements)
references
References 0 publications
0
45
0
Order By: Relevance
“…Contributions -This paper extends our previous work [4] and it introduces Coop-DAAB, a cooperative privacy preserving attribute based signcryption mechanism based on the constant-size attribute based signcryption (ABSC) technique [2]. As such, our Coop-DAAB construction consists on performing the combined signing and encrypting processes of a set of data devices' inputs in a secure collaborative manner.…”
Section: Introductionmentioning
confidence: 83%
See 1 more Smart Citation
“…Contributions -This paper extends our previous work [4] and it introduces Coop-DAAB, a cooperative privacy preserving attribute based signcryption mechanism based on the constant-size attribute based signcryption (ABSC) technique [2]. As such, our Coop-DAAB construction consists on performing the combined signing and encrypting processes of a set of data devices' inputs in a secure collaborative manner.…”
Section: Introductionmentioning
confidence: 83%
“…Similar to other attribute based techniques, ABSC introduces one main drawback related to high computation and storage costs which depends on the size of used access policies. To mitigate this limitation, thus, attribute based signcryption schemes with constant computation costs and ciphertext sizes have been proposed [2].…”
Section: Introductionmentioning
confidence: 99%
“…Security and privacy issues are a major vulnerability to any technology, this can become quite serious if not treated correctly by adopting the appropriate methods [15], [16], [17], [18], [19], [20]. It has been known in recent years that RFID contactless cards have one of the most serious vulnerabilities due to the accessibility of RFID readers that can be bought online.…”
Section: Related Workmentioning
confidence: 99%
“…Another application of signcryption technique can be seen in cloud applications to address security challenges . The design of signcryption schemes for sharing the data via public clouds has a more favorable advantage in terms of both data origin mutual authentication, unlinkability between any arbitrary sessions, and efficient in terms of computation as well as communication costs. The applications of signcryption are also observed in the Internet of Things to address the challenges of security .…”
Section: Introductionmentioning
confidence: 99%