Current cloud computing causes serious restrictions to safeguarding users' data privacy. Since users' sensitive data is submitted in unencrypted forms to remote machines possessed and operated by untrusted service providers, users' sensitive data may be leaked by service providers. Program obfuscation shows the unique advantages that it can provide for cloud computing. In this paper, we construct an encrypted threshold signature functionality, which can outsource the threshold signing rights of users to cloud server securely by applying obfuscation, while revealing no more sensitive information. The obfuscator is proven to satisfy the average case virtual black box property and existentially unforgeable under the decisional linear (DLIN) assumption and computational Diffie-Hellman (CDH) assumption in the standard model. Moreover, we implement our scheme using the Java pairing-based cryptography library on a laptop.

Download full-text PDF

Source
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC8051800PMC
http://journals.plos.org/plosone/article?id=10.1371/journal.pone.0250259PLOS

Publication Analysis

Top Keywords

cloud computing
12
encrypted threshold
8
threshold signature
8
users' sensitive
8
sensitive data
8
service providers
8
obfuscating encrypted
4
signature algorithm
4
algorithm applications
4
cloud
4

Similar Publications

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!