Constructing fair-exchange protocols for cloud computing
The existing fair-exchange protocols can't be run in cloud servers, because the user's data aren't stored in local computers, but be escrowed to ‘clound'. An anonymous conditional proxy re-encryption scheme was constructed and its security was proved in random oracle model based...
Saved in:
Main Authors: | , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2013-03-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436x.2013.03.014/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841539797674360832 |
---|---|
author | Cai-hui LAN Cai-fen WANG |
author_facet | Cai-hui LAN Cai-fen WANG |
author_sort | Cai-hui LAN |
collection | DOAJ |
description | The existing fair-exchange protocols can't be run in cloud servers, because the user's data aren't stored in local computers, but be escrowed to ‘clound'. An anonymous conditional proxy re-encryption scheme was constructed and its security was proved in random oracle model based on modified decisional bilinear Diffie-Hellman problem. At the same time, a fair-exchange protocol based on their scheme was designed, it can be employed when two users exchange their data information in cloud. |
format | Article |
id | doaj-art-3ad37442402543c7bfb1377107d6ccef |
institution | Kabale University |
issn | 1000-436X |
language | zho |
publishDate | 2013-03-01 |
publisher | Editorial Department of Journal on Communications |
record_format | Article |
series | Tongxin xuebao |
spelling | doaj-art-3ad37442402543c7bfb1377107d6ccef2025-01-14T06:34:50ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2013-03-013411111859670864Constructing fair-exchange protocols for cloud computingCai-hui LANCai-fen WANGThe existing fair-exchange protocols can't be run in cloud servers, because the user's data aren't stored in local computers, but be escrowed to ‘clound'. An anonymous conditional proxy re-encryption scheme was constructed and its security was proved in random oracle model based on modified decisional bilinear Diffie-Hellman problem. At the same time, a fair-exchange protocol based on their scheme was designed, it can be employed when two users exchange their data information in cloud.http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436x.2013.03.014/cloud computingfair-exchange protocolsconditional proxy re-encryptionCCA security |
spellingShingle | Cai-hui LAN Cai-fen WANG Constructing fair-exchange protocols for cloud computing Tongxin xuebao cloud computing fair-exchange protocols conditional proxy re-encryption CCA security |
title | Constructing fair-exchange protocols for cloud computing |
title_full | Constructing fair-exchange protocols for cloud computing |
title_fullStr | Constructing fair-exchange protocols for cloud computing |
title_full_unstemmed | Constructing fair-exchange protocols for cloud computing |
title_short | Constructing fair-exchange protocols for cloud computing |
title_sort | constructing fair exchange protocols for cloud computing |
topic | cloud computing fair-exchange protocols conditional proxy re-encryption CCA security |
url | http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436x.2013.03.014/ |
work_keys_str_mv | AT caihuilan constructingfairexchangeprotocolsforcloudcomputing AT caifenwang constructingfairexchangeprotocolsforcloudcomputing |