Journal on Communications ›› 2014, Vol. 35 ›› Issue (9): 99-111.doi: 10.3969/j.issn.1000-436x.2014.09.010

• PaperⅡ • Previous Articles     Next Articles

Scheme on user identity attribute preserving based on ring signcryption for cloud computing

Shuan-bao LI1,2,3,Jian-ming FU1,2,Huan-guo ZHANG1,2,Jing CHEN1,2,Jing WANG1,2,Bi-jun REN3   

  1. 1 Key Lab of Aerospace Information Security and Trusted Computing Ministry of Education,Wuhan University,Wuhan 430072,China
    2 School of Computer,Wuhan University,Wuhan 430072,China
    3 Department of Information Engineering,Henan College of Finance and Taxation,Zhengzhou 451464,China
  • Online:2014-09-25 Published:2017-06-14
  • Supported by:
    The National Natural Science Foundation of China;The National Natural Science Foundation of China;The National Natural Science Foundation of China;The Specialized Research Fund for the Universities Doctoral Discipline Ministry of Education;The Soft Science Scheme of Henan Province;The Soft Science Scheme of Henan Province

Abstract:

Identity attribute leak as the most severe security threat of cloud computing,in order to solve this problem,a protection scheme of identity attributes based on ring signcryption was proposed.Focused on digital identity management in cloud service,which discusses user key parting management with decentralization.Users can choose some seeds for generation and storage of key,then integrated user key cannot be acquired by registrar,based on this payload on certifica-tion management is reduced.In addition,access-centric blindness ring signcryption verification for identity attribute is designed,which constitutes ring of users and CSP,combined with own attribute users can accomplish ring-oriented sub-linear blindness signcryption and non-interactive public ciphertext verifiability for messages so that integrity and confidentiality of identity attribute can be protected avoiding identity attribute leakage in collusion of multi-CSP.At last,strong blindness and unforgeability of ciphertext and attribute is proved in proposed model,three private key components can be generated by users and identity forgeability of ring member can be prevented successfully on the condition of DBDH difficult assumption and adaptive chosen-ciphertex tattacking.Effectiveness of proposed mechanism is verified via performance evaluation of blindness ring signcryption algorithm based on comprehensive payload in identity attribute protection,and optimization is confirmed compared with similar algorithms.

Key words: digital identity management, certificateless, strong unforgeability, blindness

No Suggested Reading articles found!