Journal on Communications ›› 2013, Vol. 34 ›› Issue (3): 111-118.doi: 10.3969/j.issn.1000-436x.2013.03.014

• academic paper • Previous Articles     Next Articles

Constructing fair-exchange protocols for cloud computing

Cai-hui LAN1,2,Cai-fen WANG1   

  1. 1 College of Mathematics and Information Science, Northwest Normal University, Lanzhou 730070, China
    2 College of Information Project, Lanzhou City University, Lanzhou 730070, China
  • Online:2013-03-25 Published:2017-07-20
  • Supported by:
    The National Natural Science Foundation of China;The National Natural Science Foundation of China;The Natural Science Foundation of Gansu Province

Abstract:

The existing fair-exchange protocols can't be run in cloud servers, because the user's data aren't stored in local computers, but be escrowed to ‘clound'. An anonymous conditional proxy re-encryption scheme was constructed and its security was proved in random oracle model based on modified decisional bilinear Diffie-Hellman problem. At the same time, a fair-exchange protocol based on their scheme was designed, it can be employed when two users exchange their data information in cloud.

Key words: cloud computing, fair-exchange protocols, conditional proxy re-encryption, CCA security

No Suggested Reading articles found!