Elliptic curve qu-vanstone based signcryption schemes with proxy re-encryption for secure cloud data storage

3Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Data storage in cloud computing leads to several security issues such as data privacy, integrity, and authentication. Efficiency for the user to upload and download the data in a secure way plays an important role, as users are nowadays performing these actions on all types of devices, including e.g. smartphones. Signing and encryption of the sensitive data before hosting can solve potential security breaches. In this chapter, we propose two highly efficient identity based signcryption schemes. One of them is used as a building block for a proxy re-encryption scheme. This scheme allows users to store signed and encrypted data in the cloud, where the cloud server provider is able to check the authentication but not to derive the content of the message. When another user requests data access, the originator of the message first checks the authorization and then provides the cloud server with an encryption key to re-encrypt the stored data, enabling the requesting party to decrypt the resulting ciphertext and to validate the signature. The proposed scheme is based on elliptic curve operations and does not use computationally intensive pairing operations, like previous proposals.

Cite

CITATION STYLE

APA

Shabisha, P., Braeken, A., Touhafi, A., & Steenhaut, K. (2019). Elliptic curve qu-vanstone based signcryption schemes with proxy re-encryption for secure cloud data storage. In Lecture Notes in Networks and Systems (Vol. 49, pp. 1–18). Springer. https://doi.org/10.1007/978-3-319-97719-5_1

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free