Full Text

Turn on search term navigation

© 2021 Li et al. This is an open access article distributed under the terms of the Creative Commons Attribution License: http://creativecommons.org/licenses/by/4.0/ (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.

Abstract

Despite various merits of cloud computing, however in practice, cloud servers are not entirely reliable [6–8]. Since if users directly delivery their data to cloud platforms, the important information in data will be leaked to cloud servers, which will lead to the exposure of users’ privacy. [...]the concern is how to secure the data and rely on the services in cloud. [...]the cloud server can finish the computation tasks without sacrificing data privacy [11]. [...]we implement the proposed algorithms in a personal computer by using java pairing-based cryptography library.

Details

Title
Obfuscating encrypted threshold signature algorithm and its applications in cloud computing
Author
Li, Yahong; Wei, Jianzhou; Wu, Bin; Wang, Chunli; Wang, Caifen; Zhang, Yulei; Yang, Xiaodong
First page
e0250259
Section
Research Article
Publication year
2021
Publication date
Apr 2021
Publisher
Public Library of Science
e-ISSN
19326203
Source type
Scholarly Journal
Language of publication
English
ProQuest document ID
2513668521
Copyright
© 2021 Li et al. This is an open access article distributed under the terms of the Creative Commons Attribution License: http://creativecommons.org/licenses/by/4.0/ (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.