Public Key Encryption in the Cloud Computing Environments: Trust and untrust

Author(s):  
Herlino Nanang ◽  
Yusuf Durachman ◽  
Ahmad F Misman ◽  
Zahidah Zulkifli ◽  
Husni Teja Sukmana
2013 ◽  
Vol 475-476 ◽  
pp. 1144-1149
Author(s):  
Xian Yong Meng ◽  
Zhong Chen ◽  
Xiang Yu Meng

In this paper, a novel decentralized key-policy attribute-based signcryption (ABS) scheme is proposed, where each authority can generate secret-public key pair for the user independently without any cooperation and a centralized authority. In the proposed scheme, each authority can join or leave the system randomly without reinitializing the system,and issue secret-public keys to user respectively. Therefore, it is clear that the multi-authority attribute-based access control scheme can reduce the communication cost and the collaborative computing cost. Additionally, the attribute-based signcryption scheme is efficient in terms of both the identification authentication and the confidential communication, and can realize security secret sharing in cloud computing environments.


2019 ◽  
Author(s):  
Madhusudhana H. S.

Authentication is the first and foremost security principle that involves validation of identity of an user or a machine. The successful authentication is required for authorization and secure data exchanges. A common classification of authentication system based on factors – something you know, something you own, something you did and something you are – is explained. Well-known and used password schemes employed in practice is described along with standards. A description Kerberos of authentication system based on symmetric key encryption and SSL based authentication which is based on public key encryption is given. Related Single-Sign-On technologies are explained. A brief overview of authentication for cloud computing, IoT and UIDAI is presented.


IEEE Access ◽  
2020 ◽  
Vol 8 ◽  
pp. 152551-152564
Author(s):  
Raylin Tso ◽  
Kaibin Huang ◽  
Yu-Chi Chen ◽  
Sk Md Mizanur Rahman ◽  
Tsu-Yang Wu

Author(s):  
L houssain El Fadil ◽  
Abdelkader MOUMEN ◽  
Mohamed BOUYE

Multi-receiver encryption enables a sender to encrypt a message and transmit the ciphertext to a set of authorized users, while no one out this group of authorized users can decrypt the message. Multi-receiver encryption is of great importance in many sectors such as broadcast communication, cloud computing, wireless communications, networking applications, e-voting, lottery, and medical applications. This paper proposes an efficient multi-receiver public key encryption scheme based on Lucas sequences. The results of the computational analysis show that, projected scheme is better against renown attacks and prevailing anonymous multireceiver algorithms


Author(s):  
Ganesh Gopal Deverajan ◽  
V. Muthukumaran ◽  
Ching‐Hsien Hsu ◽  
Marimuthu Karuppiah ◽  
Yeh‐Ching Chung ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document