Slight Homomorphic Signature for Access Controlling in Cloud Computing

被引:10
作者
Wang, Zhiwei [1 ,2 ]
Sha, Kewei [3 ]
Lv, Wei [1 ]
机构
[1] Nanjing Univ Posts & Telecommun, Coll Comp, Nanjing 210003, Peoples R China
[2] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing 100190, Peoples R China
[3] Oklahoma City Univ, Dept Comp Sci, Oklahoma City, OK 73106 USA
基金
中国国家自然科学基金;
关键词
Slight homomorphic signature; Identity authentication; Cloud computing; Boneh-Boyen signature; q-SDH assumption;
D O I
10.1007/s11277-012-0977-8
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
With the popularity of cloud computing, how to securely authenticate a user while not releasing user's sensitive information becomes a challenge. In this paper, we introduce a slight homomorphic signature, which is suitable to implement an access controlling service in cloud computing. In slight homomorphic signature, each user in cloud computing who have a set of identity attributes, firstly computes a full signature on all his identity attributes, and sends it to a semi-trusted access controlling server. The access controlling server verifies the full signature for all identity attributes. After then, if the user wants to require a cloud service, which may have a special requirement on one of the identity attributes, the user only needs to securely send the cloud service's name to the access controlling server. The access controlling server which does not know the secret key can compute a partial signature on this special identity attribute, and then sends it to the cloud server for authentication. In the paper, we give a formal secure definition of this slight homomorphic signature, and construct a scheme from Boneh-Boyen signature. We prove that our scheme is secure under q-SDH problem with a weak adversary.
引用
收藏
页码:51 / 61
页数:11
相关论文
共 23 条
[1]  
[Anonymous], 2009, STANFORD U
[2]  
[Anonymous], P 13 INT C PRACT THE
[3]  
Ateniese G., 2005, P ESORICS 05
[4]   Transitive signatures: New schemes and proofs [J].
Bellare, M ;
Neven, G .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2005, 51 (06) :2133-2151
[5]  
Bertino E., 2009, IEEE DATA ENG B, V32, P21
[6]   Short signatures from the Weil pairing [J].
Boneh, D ;
Lynn, B ;
Shacham, H .
JOURNAL OF CRYPTOLOGY, 2004, 17 (04) :297-319
[7]  
Boneh D., 2009, P 12 INT C PRACT THE
[8]  
Boneh D., 2010, P 13 INT C PRACT THE
[9]  
Boneh D., 2011, P EUR 2011
[10]   Short signatures without random oracles and the SDH assumption in bilinear groups [J].
Boneh, Dan ;
Boyen, Xavier .
JOURNAL OF CRYPTOLOGY, 2008, 21 (02) :149-177