2018
DOI: 10.1155/2018/5401890
|View full text |Cite
|
Sign up to set email alerts
|

An Efficient Identity‐Based Proxy Blind Signature for Semioffline Services

Abstract: Fog computing extends the cloud computing to the network edge and allows deploying a new type of semioffline services, which can provide real-time transactions between two entities, while the central cloud server is offline and network edge devices are online.For an e-payment system and e-voting with such feature, proxy blind signature is a cornerstone to protect users' privacy. However, the signature based on number theorem, such as hard mathematical problems on factoring problem, discrete logarithm problem, … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(6 citation statements)
references
References 41 publications
(42 reference statements)
0
6
0
Order By: Relevance
“…The scheme exhibits message recovery and caters to the requirements of low-bandwidth because it abbreviates the size of message signature. The efficient identity-based proxy blind signature scheme proposed by Zhu et al can even overcome a quantum computer a ack [40]. A designated verifier signature scheme is proposed by Jakobsson et al [41].…”
Section: Related Certificateless Blind Signature Schemesmentioning
confidence: 99%
“…The scheme exhibits message recovery and caters to the requirements of low-bandwidth because it abbreviates the size of message signature. The efficient identity-based proxy blind signature scheme proposed by Zhu et al can even overcome a quantum computer a ack [40]. A designated verifier signature scheme is proposed by Jakobsson et al [41].…”
Section: Related Certificateless Blind Signature Schemesmentioning
confidence: 99%
“…It shortens the size of message signature and is suitable for the applications with low bandwidth. Zhu et al proposed an efficient identity-based proxy blind signature scheme [26]. It is based on number theorem research unit lattice and can defeat quantum computer attack.…”
Section: Related Digital Signature Schemesmentioning
confidence: 99%
“…Sun et al [14] subscribe a scheme over encrypted cloud data which can achieve effective user revocation in a multiple users and multiple contributor scenario. Sun et al [14] also put forward a fine-grained search scheme which conducts search authorization on the file level by utilizing CP-ABE technique [28]- [34]. Bao et al [35] formulate a system model to research searchable encryption in actual multi-user settings, and obtains results included a set of security concepts for multi-user searchable encryption, which can be proved security.…”
Section: Authorized Searchmentioning
confidence: 99%
“…So the semi-trusted Cloud Server cannot successfully identify any information about indexes from the ciphertexts. The documents are encrypted by symmetric keys which are conserved by CP-ABE [28]. So the confidentiality of documents is based on symmetric encryption and CP-ABE.…”
Section: Security Analysis a Confidentiality Of Indexes And Docummentioning
confidence: 99%
See 1 more Smart Citation