2020
DOI: 10.1002/cpe.5657
|View full text |Cite
|
Sign up to set email alerts
|

Elliptic curve‐based proxy re‐signcryption scheme for secure data storage on the cloud

Abstract: SummaryConsider the situation of a patient carrying a body area network with sensors measuring different body characteristics. These data should be securely sent to the cloud and only retrievable by doctors authorized by the patient. Even the cloud service provider should not be able to derive the sensible data. In order to address this problem, this paper first proposes a highly efficient certificate‐based signcryption scheme, able to execute signing and encryption in one single phase and to guarantee the lin… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(2 citation statements)
references
References 17 publications
0
2
0
Order By: Relevance
“…In this scheme, the proxy can be used to verify the validity of the signature besides resigning, so that the user does not need to undertake the heavy burden of calculation. Then, Patonico et al [25] put forward an efficient proxy re-signcryption scheme using the arithmetic operation in the elliptic curve, so as to realize the safe ownership transfer in the cloud. Under the attention of quantum computers, in order to resist this kind of attack, some researchers [26,27] turned their direction to construct PRS schemes from the perspective of lattices.…”
Section: Related Workmentioning
confidence: 99%
“…In this scheme, the proxy can be used to verify the validity of the signature besides resigning, so that the user does not need to undertake the heavy burden of calculation. Then, Patonico et al [25] put forward an efficient proxy re-signcryption scheme using the arithmetic operation in the elliptic curve, so as to realize the safe ownership transfer in the cloud. Under the attention of quantum computers, in order to resist this kind of attack, some researchers [26,27] turned their direction to construct PRS schemes from the perspective of lattices.…”
Section: Related Workmentioning
confidence: 99%
“…The threat model includes three games, which will be played among a malicious agent/forger (MA/MF ) and a challenger ζ [29]. The first game is played for confidentiality regarding indistinguishability in contradiction of adaptive chosen multi-ciphertext attacks (IND-CBMMS-CCA).…”
Section: Threat Modelmentioning
confidence: 99%