Table of Contents Author Guidelines Submit a Manuscript
Security and Communication Networks
Volume 2017, Article ID 6758618, 14 pages
https://doi.org/10.1155/2017/6758618
Research Article

Certificateless Public Auditing Protocol with Constant Verification Time

Center for Information Security Technologies (CIST), Korea University, Anam-dong, Seongbuk-gu, Seoul 136-713, Republic of Korea

Correspondence should be addressed to Ik Rae Jeong; rk.ca.aerok@gnoejri

Received 18 August 2016; Accepted 7 November 2016; Published 30 January 2017

Academic Editor: Muhammad Khurram Khan

Copyright © 2017 Dongmin Kim and Ik Rae Jeong. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. P. Mell and T. Grance, The NIST Definition of Cloud Computing, 2011, http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-145.pdf.
  2. G. Ateniese, R. Burns, R. Curtmola et al., “Provable data possession at untrusted stores,” in Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS '07), pp. 598–610, November 2007. View at Publisher · View at Google Scholar · View at Scopus
  3. A. Juels and B. S. Kaliski Jr., “PORs: proofs of retrievability for large files,” in Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS '07), pp. 584–597, Alexandria, Va, USA, November 2007. View at Publisher · View at Google Scholar · View at Scopus
  4. H. Shacham and B. Waters, “Compact proofs of retrievability,” in International Conference on the Theory and Application of Cryptology and Information Security: ASIACRYPT 2008: Advances in Cryptology—ASIACRYPT, vol. 5350 of Lecture Notes in Computer Science, pp. 90–107, Springer, Berlin, Germany, 2008. View at Publisher · View at Google Scholar
  5. C. Erway, A. Küpçü, C. Papamanthou, and R. Tamassia, “Dynamic provable data possession,” in Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS '09), pp. 213–222, Chicago, Ill, USA, November 2009. View at Publisher · View at Google Scholar · View at Scopus
  6. B. Wang, B. Li, and H. Li, “Oruta: privacy-preserving public auditing for shared data in the cloud,” in Proceedings of the IEEE 5th International Conference on Cloud Computing (CLOUD '12), pp. 295–302, June 2012. View at Publisher · View at Google Scholar · View at Scopus
  7. C. Wang, S. S. M. Chow, Q. Wang, K. Ren, and W. Lou, “Privacy-preserving public auditing for secure cloud storage,” IEEE Transactions on Computers, vol. 62, no. 2, pp. 362–375, 2013. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  8. B. Wang, B. Li, and H. Li, “Public auditing for shared data with efficient user revocation in the cloud,” in Proceedings of the 32nd IEEE Conference on Computer Communications (INFOCOM '13), pp. 2904–2912, April 2013. View at Publisher · View at Google Scholar · View at Scopus
  9. S. G. Worku, C. Xu, J. Zhao, and X. He, “Secure and efficient privacy-preserving public auditing scheme for cloud storage,” Computers & Electrical Engineering, vol. 40, no. 5, pp. 1703–1713, 2014. View at Google Scholar
  10. T. Jiang, X. Chen, and J. Ma, “Public integrity auditing for shared dynamic cloud data with group user revocation,” IEEE Transactions on Computers, vol. 65, no. 8, pp. 2363–2373, 2016. View at Publisher · View at Google Scholar
  11. C. Ellison and B. Schneier, “Ten risks of PKI: what you're not being told about public key infrastructure,” Computer Security Journal, vol. 16, no. 1, pp. 1–7, 2000. View at Google Scholar · View at Scopus
  12. P. Gutmann, “PKI: it's not dead, just resting,” Computer, vol. 35, no. 8, pp. 41–49, 2002. View at Publisher · View at Google Scholar · View at Scopus
  13. A. Shamir, “Identity-based Cryptosystems and Signature Schemes,” in Proceedings of the CRYPTO: Advances in Cryptology, pp. 47–53, 1984.
  14. D. Boneh and M. Franklin, “Identity-based encryption from the Weil pairing,” in Annual International Cryptology Conference: CRYPTO 2001: Advances in Cryptology—CRYPTO 2001, vol. 2139 of Lecture Notes in Computer Science, pp. 213–229, Springer, Berlin, Germany, 2001. View at Google Scholar
  15. D. Boneh, R. Canetti, and S. Halevi, “Chosen-Ciphertext Security from Identity-Based Encryption,” in EUROCRYPT 2004: Advances in Cryptology, vol. 3027 of Lecture Notes in Computer Science, pp. 207–222, 2004. View at Publisher · View at Google Scholar
  16. D. Boneh and X. Boyen, “Efficient selective-id secure identity based encryption without random oracles,” in International Conference on the Theory and Applications of Cryptographic Techniques EUROCRYPT 2004: Advances in Cryptology—EUROCRYPT 2004, vol. 3027 of Lecture Notes in Computer Science, pp. 223–238, Springer, Berlin, Germany, 2004. View at Publisher · View at Google Scholar
  17. B. Waters, “Efficient identity based encryption without random oracles,” in Annual International Conference on the Theory and Applications of Cryptographic Techniques: UROCRYPT 2005: Advances in Cryptology—EUROCRYPT 2005, vol. 3494 of Lecture Notes in Computer Science, pp. 114–127, Springer, Berlin, Germany, 2005. View at Publisher · View at Google Scholar
  18. H. Wang, J. Domingo-Ferrer, Q. Wu, and B. Qin, “Identity-based remote data possession checking in public clouds,” IET Information Security, vol. 8, no. 2, pp. 114–121, 2014. View at Publisher · View at Google Scholar · View at Scopus
  19. H. Wang, “Identity-based distributed provable data possession in multicloud storage,” IEEE Transactions on Services Computing, vol. 8, no. 2, pp. 328–340, 2015. View at Publisher · View at Google Scholar · View at Scopus
  20. Y. Yu, Y. Zhang, Y. Mu, W. Susilo, and H. Liu, “Provably secure identity based provable data possession,” in Provable Security: 9th International Conference, ProvSec 2015, Kanazawa, Japan, November 24–26, 2015, Proceedings, vol. 9451 of Lecture Notes in Computer Science, pp. 310–325, Springer, Berlin, Germany, 2015. View at Publisher · View at Google Scholar
  21. S. S. Al-Riyami and K. G. Paterson, “Certificateless public key cryptography,” in Advances in Cryptology—ASIACRYPT 2003, C.-S. Laih, Ed., vol. 2894 of Lecture Notes in Computer Science, pp. 452–473, Springer, Berlin, Germany, 2003. View at Publisher · View at Google Scholar
  22. B. Libert and J.-J. Quisquater, “On constructing certificateless cryptosystems from the identity based encryption,” in International Workshop on Public Key Cryptography PKC 2006: Public Key Cryptography—PKC 2006, vol. 3958 of Lecture Notes in Computer Science, pp. 474–490, Springer, Berlin, Germany, 2006. View at Publisher · View at Google Scholar
  23. A. Dent, B. W. Libert, and K. Paterson, “Certificateless encryption schemes storngly secure in the standard model,” in Proceedings of the International Conference on the Theory and Practice of Public-Key Cryptography (PKC '08), vol. 4939 of Lecture Notes in Computer Science, pp. 344–359, 2008.
  24. X. Huang, Y. Mu, W. Susilo, D. S. Wong, and W. Wu, “Certificateless signature revisited,” in Information Security and Privacy, J. Pieprzyk, H. Ghodosi, and E. Dawson, Eds., vol. 4586 of Lecture Notes in Computer Science, pp. 308–322, Springer, Berlin, Germany, 2007. View at Publisher · View at Google Scholar
  25. D. He, J. Chen, and R. Zhang, “An efficient and provably-secure certificateless signature scheme without bilinear pairings,” International Journal of Communication Systems, vol. 25, no. 11, pp. 1432–1442, 2012. View at Publisher · View at Google Scholar · View at Scopus
  26. D. He, Y. Chen, and J. Chen, “An efficient certificateless proxy signature scheme without pairing,” Mathematical and Computer Modelling, vol. 57, no. 9-10, pp. 2510–2518, 2013. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  27. D. He, B. Huang, and J. Chen, “New certificateless short signature scheme,” IET Information Security, vol. 7, no. 2, pp. 113–117, 2013. View at Publisher · View at Google Scholar · View at Scopus
  28. B. Wang, B. Li, H. Li, and F. Li, “Certificateless public auditing for data integrity in the cloud,” in Proceedings of the 1st IEEE International Conference on Communications and Network Security (CNS '13), pp. 136–144, National Harbo, Md, USA, October 2013. View at Publisher · View at Google Scholar · View at Scopus
  29. D. He, S. Zeadally, and L. Wu, “Certificateless public auditing scheme for cloud-assisted wireless body area networks,” IEEE Systems Journal, no. 99, pp. 1–10, 2015. View at Publisher · View at Google Scholar · View at Scopus
  30. J. Liu, Z. Zhang, X. Chen, and K. S. Kwak, “Certificateless remote anonymous authentication schemes for wirelessbody area networks,” IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 2, pp. 332–342, 2014. View at Publisher · View at Google Scholar · View at Scopus
  31. Z. Zhao, “An efficient anonymous authentication scheme for wireless body area networks using elliptic curve cryptosystem,” Journal of Medical Systems, vol. 38, no. 2, article 13, 2014. View at Publisher · View at Google Scholar · View at Scopus
  32. X. Hu, “Cost-effective scalable and anonymous certificateless remote authentication protocol,” IEEE Transactions on Information Forensics and Security, vol. 9, no. 2, pp. 2327–2339, 2014. View at Google Scholar
  33. S. Chatterjee, A. K. Das, and J. K. Sing, “A novel and efficient user access control scheme for wireless body area sensor networks,” Journal of King Saud University—Computer and Information Sciences, vol. 26, no. 2, pp. 181–201, 2014. View at Publisher · View at Google Scholar
  34. A. K. Das, S. Chatterjee, and J. K. Sing, “A new biometric-based remote user authentication scheme in hierarchical wireless body area sensor networks,” Ad-Hoc and Sensor Wireless Networks, vol. 28, no. 3-4, pp. 221–256, 2015. View at Google Scholar · View at Scopus
  35. M. H. Ibrahim, S. Kumari, A. K. Das, M. Wazid, and V. Odelu, “Secure anonymous mutual authentication for star two-tier wireless body area networks,” Computer Methods and Programs in Biomedicine, vol. 135, pp. 37–50, 2016. View at Publisher · View at Google Scholar
  36. F. Bao, R. H. Deng, and H. Zhu, “Variations of diffie-hellman problem,” in Proceedings of the 5th International Conference of Information and Communications Security (ICICS '03), pp. 301–312, 2003.
  37. D. Pointcheval and J. Stern, “Security arguments for digital signatures and blind signatures,” Journal of Cryptology, vol. 13, no. 3, pp. 361–396, 2000. View at Publisher · View at Google Scholar · View at Scopus
  38. M. Scott, N. Costigan, and W. Abdulwahab, “Implementing cryptographic pairings on smartcards,” in International Workshop on Cryptographic Hardware and Embedded Systems: CHES 2006: Cryptographic Hardware and Embedded Systems—CHES 2006, Lecture Notes in Computer Science, pp. 134–147, Springer, Berlin, Germany, 2006. View at Publisher · View at Google Scholar