Cost-effective authentic and anonymous data sharing with forward security

Huang, Xinyi, Liu, Joseph K., Tang, Shaohua, Xiang, Yang, Liang, Kaitai, Xu, Li and Zhou, Jianying 2015, Cost-effective authentic and anonymous data sharing with forward security, IEEE transactions on computers, vol. 64, no. 4, pp. 971-983, doi: 10.1109/TC.2014.2315619.

Attached Files
Name Description MIMEType Size Downloads

Title Cost-effective authentic and anonymous data sharing with forward security
Author(s) Huang, Xinyi
Liu, Joseph K.
Tang, Shaohua
Xiang, YangORCID iD for Xiang, Yang
Liang, Kaitai
Xu, Li
Zhou, Jianying
Journal name IEEE transactions on computers
Volume number 64
Issue number 4
Start page 971
End page 983
Total pages 13
Publisher IEEE
Place of publication Piscataway, N.J.
Publication date 2015-04-01
ISSN 0018-9340
Keyword(s) Science & Technology
Computer Science, Hardware & Architecture
Engineering, Electrical & Electronic
Computer Science
data sharing
cloud computing
forward security
smart grid
Summary Data sharing has never been easier with the advances of cloud computing, and an accurate analysis on the shared data provides an array of benefits to both the society and individuals. Data sharing with a large number of participants must take into account several issues, including efficiency, data integrity and privacy of data owner. Ring signature is a promising candidate to construct an anonymous and authentic data sharing system. It allows a data owner to anonymously authenticate his data which can be put into the cloud for storage or analysis purpose. Yet the costly certificate verification in the traditional public key infrastructure (PKI) setting becomes a bottleneck for this solution to be scalable. Identity-based (ID-based) ring signature, which eliminates the process of certificate verification, can be used instead. In this paper, we further enhance the security of ID-based ring signature by providing forward security: If a secret key of any user has been compromised, all previous generated signatures that include this user still remain valid. This property is especially important to any large scale data sharing system, as it is impossible to ask all data owners to re-authenticate their data even if a secret key of one single user has been compromised. We provide a concrete and efficient instantiation of our scheme, prove its security and provide an implementation to show its practicality.
Language eng
DOI 10.1109/TC.2014.2315619
Field of Research 0803 Computer Software
0805 Distributed Computing
1006 Computer Hardware
080402 Data Encryption
Socio Economic Objective 970108 Expanding Knowledge in the Information and Computing Sciences
HERDC Research category C1 Refereed article in a scholarly journal
ERA Research output type C Journal article
Copyright notice ©2015, IEEE
Persistent URL

Document type: Journal Article
Collections: School of Information Technology
2018 ERA Submission
Connect to link resolver
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Version Filter Type
Citation counts: TR Web of Science Citation Count  Cited 27 times in TR Web of Science
Scopus Citation Count Cited 42 times in Scopus
Google Scholar Search Google Scholar
Access Statistics: 113 Abstract Views, 3 File Downloads  -  Detailed Statistics
Created: Thu, 17 Mar 2016, 12:09:21 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact