Constructing fair-exchange protocols for cloud computing

The existing fair-exchange protocols can't be run in cloud servers, because the user's data aren't stored in local computers, but be escrowed to ‘clound'. An anonymous conditional proxy re-encryption scheme was constructed and its security was proved in random oracle model based...

Full description

Saved in:
Bibliographic Details
Main Authors: Cai-hui LAN, Cai-fen WANG
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2013-03-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436x.2013.03.014/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841539797674360832
author Cai-hui LAN
Cai-fen WANG
author_facet Cai-hui LAN
Cai-fen WANG
author_sort Cai-hui LAN
collection DOAJ
description The existing fair-exchange protocols can't be run in cloud servers, because the user's data aren't stored in local computers, but be escrowed to ‘clound'. An anonymous conditional proxy re-encryption scheme was constructed and its security was proved in random oracle model based on modified decisional bilinear Diffie-Hellman problem. At the same time, a fair-exchange protocol based on their scheme was designed, it can be employed when two users exchange their data information in cloud.
format Article
id doaj-art-3ad37442402543c7bfb1377107d6ccef
institution Kabale University
issn 1000-436X
language zho
publishDate 2013-03-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-3ad37442402543c7bfb1377107d6ccef2025-01-14T06:34:50ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2013-03-013411111859670864Constructing fair-exchange protocols for cloud computingCai-hui LANCai-fen WANGThe existing fair-exchange protocols can't be run in cloud servers, because the user's data aren't stored in local computers, but be escrowed to ‘clound'. An anonymous conditional proxy re-encryption scheme was constructed and its security was proved in random oracle model based on modified decisional bilinear Diffie-Hellman problem. At the same time, a fair-exchange protocol based on their scheme was designed, it can be employed when two users exchange their data information in cloud.http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436x.2013.03.014/cloud computingfair-exchange protocolsconditional proxy re-encryptionCCA security
spellingShingle Cai-hui LAN
Cai-fen WANG
Constructing fair-exchange protocols for cloud computing
Tongxin xuebao
cloud computing
fair-exchange protocols
conditional proxy re-encryption
CCA security
title Constructing fair-exchange protocols for cloud computing
title_full Constructing fair-exchange protocols for cloud computing
title_fullStr Constructing fair-exchange protocols for cloud computing
title_full_unstemmed Constructing fair-exchange protocols for cloud computing
title_short Constructing fair-exchange protocols for cloud computing
title_sort constructing fair exchange protocols for cloud computing
topic cloud computing
fair-exchange protocols
conditional proxy re-encryption
CCA security
url http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436x.2013.03.014/
work_keys_str_mv AT caihuilan constructingfairexchangeprotocolsforcloudcomputing
AT caifenwang constructingfairexchangeprotocolsforcloudcomputing