Obfuscating encrypted threshold signature algorithm and its applications in cloud computing

5Citations
Citations of this article
12Readers
Mendeley users who have this article in their library.

Abstract

Current cloud computing causes serious restrictions to safeguarding users’ data privacy. Since users’ sensitive data is submitted in unencrypted forms to remote machines possessed and operated by untrusted service providers, users’ sensitive data may be leaked by service providers. Program obfuscation shows the unique advantages that it can provide for cloud computing. In this paper, we construct an encrypted threshold signature functionality, which can outsource the threshold signing rights of users to cloud server securely by applying obfuscation, while revealing no more sensitive information. The obfuscator is proven to satisfy the average case virtual black box property and existentially unforgeable under the decisional linear (DLIN) assumption and computational Diffie-Hellman (CDH) assumption in the standard model. Moreover, we implement our scheme using the Java pairing-based cryptography library on a laptop.

References Powered by Scopus

How to Share a Secret

11140Citations
N/AReaders
Get full text

Identity-based encryption from the weil pairing

6088Citations
N/AReaders
Get full text

Short Group Signatures

1533Citations
N/AReaders
Get full text

Cited by Powered by Scopus

Application of Edge Computing and Blockchain in Smart Agriculture System

7Citations
N/AReaders
Get full text

An Enhanced Cloud Network Integrity and Fair Compensation Scheme Through Data Structures and Blockchain Enforcement

0Citations
N/AReaders
Get full text

SecureCloudX: An Innovative Approach to Enhance Data Security Through Advanced File Encryption

0Citations
N/AReaders
Get full text

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Li, Y., Wei, J., Wu, B., Wang, C., Wang, C., Zhang, Y., & Yang, X. (2021). Obfuscating encrypted threshold signature algorithm and its applications in cloud computing. PLoS ONE, 16(4 April). https://doi.org/10.1371/journal.pone.0250259

Readers over time

‘21‘22‘23‘24‘2502468

Readers' Seniority

Tooltip

PhD / Post grad / Masters / Doc 3

60%

Researcher 2

40%

Readers' Discipline

Tooltip

Agricultural and Biological Sciences 1

25%

Social Sciences 1

25%

Computer Science 1

25%

Economics, Econometrics and Finance 1

25%

Save time finding and organizing research with Mendeley

Sign up for free
0