Nothing Special   »   [go: up one dir, main page]

Yin et al., 2014 - Google Patents

PKI-based cryptography for secure cloud data storage using ECC

Yin et al., 2014

Document ID
2869264256281727499
Author
Yin X
Liu Z
Lee Y
Lee H
Publication year
Publication venue
2014 International Conference on Information and Communication Technology Convergence (ICTC)

External Links

Snippet

It is widely accepted cloud storage provides a lot of benefits to its users by significantly reducing the burden of storage and computation. However unlike traditional data storage systems, cloud data is produced, transferred and stored at off-premise multi-tenant storage …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0822Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key

Similar Documents

Publication Publication Date Title
US11108565B2 (en) Secure communications providing forward secrecy
US11323276B2 (en) Mutual authentication of confidential communication
US7657037B2 (en) Apparatus and method for identity-based encryption within a conventional public-key infrastructure
JP4527358B2 (en) An authenticated individual cryptographic system that does not use key escrow
Al-Riyami Cryptographic schemes based on elliptic curve pairings
Yin et al. An efficient and secured data storage scheme in cloud computing using ECC-based PKI
CN106713349B (en) Inter-group proxy re-encryption method capable of resisting attack of selecting cipher text
Nair et al. A hybrid PKI-IBC based ephemerizer system
Yin et al. PKI-based cryptography for secure cloud data storage using ECC
Doshi An enhanced approach for CP-ABE with proxy re-encryption in IoT paradigm
Mishra et al. A certificateless authenticated key agreement protocol for digital rights management system
Guesmi et al. Improved data storage confidentiality in cloud computing using identity-based cryptography
Chen et al. The comparisons between public key and symmetric key cryptography in protecting storage systems
JP2010113181A (en) Key management method, key generation method, encryption processing method, decryption processing method, access control method, communication network system
Abdalla et al. Anonymous Pairing-Free and Certificateless Key Exchange Protocol for DRM System.
Surya et al. Single sign on mechanism using attribute based encryption in distributed computer networks
Vijayalakshmi et al. Authentication of data storage using decentralized access control in clouds
Batamuliza Certificateless secure anonymous key distribution scheme for smart grid
RU2771928C2 (en) Secure data exchange ensuring direct secrecy
Chen et al. A Novel Hybrid Encryption Scheme Using RSA-Co-CP-ABE for Ciphertext Transmission in Cloud Environment
Paar et al. Key Management
Gairaboina et al. A Trusted Cryptography Key Framework for User Data Storage in Cloud Environment
Nandagiri et al. Secure Data Sharing Using Certificate less Encryption for Providing Efficiency in Public Clouds
Danisha et al. SECURE HYBRID ENCRYPTION USING ECC IN CLOUDS.
Gopularam et al. Data Confidentiality in Public Cloud: A Method for Inclusion of ID-PKC Schemes in OpenStack Cloud