Abstract
Current cloud computing causes serious restrictions to safeguarding users’ data privacy. Since users’ sensitive data is submitted in unencrypted forms to remote machines possessed and operated by untrusted service providers, users’ sensitive data may be leaked by service providers. Program obfuscation shows the unique advantages that it can provide for cloud computing. In this paper, we construct an encrypted threshold signature functionality, which can outsource the threshold signing rights of users to cloud server securely by applying obfuscation, while revealing no more sensitive information. The obfuscator is proven to satisfy the average case virtual black box property and existentially unforgeable under the decisional linear (DLIN) assumption and computational Diffie-Hellman (CDH) assumption in the standard model. Moreover, we implement our scheme using the Java pairing-based cryptography library on a laptop.
Funder
National Natural Science Foundation of China
Nationa Key R&D Program of China
Publisher
Public Library of Science (PLoS)
Reference40 articles.
1. Cloud security issues and challenges: A survey;A Singh;Journal of Network and Computer Applications,2017
2. SDN/NFV-Empowered Future IoV With Enhanced Communication, Computing, and Caching;W Zhuang;Proceedings of the IEEE,2019
3. He H, Shan H, Huang A, Ye Q, Zhang W. Edge-Aided Computing and Transmission Scheduling for LTE-U-Enabled IoT. IEEE Transactions on Wireless Communications, to appear. https://doi.org/10.1109/GLOCOM.2018.8647178
4. End-to-End Quality of Service in 5G Networks: Examining the Effectiveness of a Network Slicing Framework;Q Ye;IEEE Vehicular Technology Magazine,2018
5. HealthDep: An Efficient and Secure Deduplication Scheme for Cloud-Assisted eHealth Systems;Y Zhang;IEEE Transactions on Industrial Informatics,2018
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献