###
计算机系统应用英文版:2023,32(1):281-287
本文二维码信息
码上扫一扫!
云存储中无证书的可净化签名方案
(长安大学 信息工程学院, 西安 710064)
Certificateless Sanitizable Signature Scheme in Cloud Storage
(School of Information Engineering, Chang’an University, Xi’an 710064, China)
摘要
图/表
参考文献
相似文献
本文已被:浏览 409次   下载 865
Received:May 10, 2022    Revised:June 15, 2022
中文摘要: 在云存储环境中, 数据所有者不仅能够借助云服务器存储数据, 而且可以通过云服务器与其他用户共享数据. 但是, 当数据所有者通过云服务器存储和共享数据时, 可能存在一些安全问题. 首先, 数据所有者需要保证其数据的可认证性. 其次, 数据所有者的数据中可能包含其敏感信息, 比如姓名、年龄等信息. 因此, 数据所有者在与其他用户共享数据时, 可能会泄露自己的敏感信息. 为了解决上述问题, 本文提出了一个无证书的可净化签名方案, 用于解决云存储环境下共享数据的可认证性与敏感信息隐藏. 具体而言, 所提方案基于无证书密码学, 避免了传统公钥基础设施中昂贵的证书管理开销, 消除了基于身份密码学中复杂的密钥托管缺陷. 此外, 所提方案加入了访问控制, 使得存储在云服务器中的数据只能被授权用户访问. 最后, 安全分析说明了所提方案的安全性; 性能分析体现了所提方案的高效性.
Abstract:In the cloud storage environment, data owners can store and share data through cloud servers, but the following security issues may exist. First, data owners need to guarantee the authentication of their data. Secondly, the data may contain the data owner’s sensitive information, such as name, age, and other information. Therefore, data owners may reveal their sensitive information when sharing data with other users. To solve the above problems, this study proposes a certificateless sanitizable signature scheme to ensure the authentication of shared data and the sensitive information hiding in cloud storage environments. Specifically, the proposed scheme is based on certificateless cryptography, which avoids the high certificate management overhead in traditional public key infrastructure and eliminates the key escrow defect in identity-based cryptography. In addition, the scheme adds access control, so that the data stored in the cloud server can only be accessed by authorized users. Finally, the security analysis shows the security of the scheme and the performance analysis reflects the efficiency of the scheme.
文章编号:     中图分类号:    文献标志码:
基金项目:
引用文本:
张维鑫,严翌瑄,武忆涵,胡佳烨.云存储中无证书的可净化签名方案.计算机系统应用,2023,32(1):281-287
ZHANG Wei-Xin,YAN Yi-Xuan,WU Yi-Han,HU Jia-Ye.Certificateless Sanitizable Signature Scheme in Cloud Storage.COMPUTER SYSTEMS APPLICATIONS,2023,32(1):281-287