Journal on Communications

• Cloud Security • Previous Articles     Next Articles

Verifiable outsourcing private key generation algorithm in an identity-based encryption scheme

  

  • Online:2015-11-27 Published:2015-11-27

Abstract: An identity-based encryption scheme with verifiable outsourcing private key generation algorithm was proposed where the PKG outsourcers the task of private key generation to the server, and could verify the correctness of the outsourcing result effectively. The distinguish ability of the cipher text and verifiability of the outsourcing result was proved without random oracles, and the proposed scheme was realized in a simulation environment. The experiment shows that the cost of the PKG is smaller than that of the servers, and it is much smaller than that of computing the private keys of all users directly.

Key words: cloud computing; big data; identity-based encryption; verifiable outsourcing computing; groups of composite order

No Suggested Reading articles found!