Abstract

With the advancements of cloud services, sharing of information has never ever been easier, and intelligent prediction of shared information provides a slew of advantages also to individuals and society. When sharing data with a huge group of people, several factors must be considered, which include effectiveness, authentication, and the confidentiality of the cloud provider. A viable target for constructing an unidentified and genuine interoperability system is ring signature. It enables an owner to privately configure the data that can then be stored or analyzed in the cloud. However, in a conventional Public-Key-Infrastructure (PKI) setting, the expensive credential authentication becomes a limiting factor for this solution's scalability. Instead, an Identity based Ring Signature can be used, which eliminates the need for document verification. We enhance the safety of identity based ring signatures in this paper by adding forward protection: If a user's secret key is corrupted, all previously stored confirmations containing this user are still valid. The whole product is extremely crucial in any big information sharing system, because it is pointless to force all digital assets to conceptual metaphor their data if a single user's secret key is compromised. We demonstrate the practicality of our scheme by providing a tangible as well as efficient implementation and proving its security in good manner.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.