J4 ›› 2012, Vol. 47 ›› Issue (9): 7-14.

• Articles • Previous Articles     Next Articles

Scheme of hierarchical content extraction signature based on non-credible PKG identity-based signature

JING Xu1,2,3, HE Dong-jian1*   

  1. 1.College of Mechanical and Electronic Engineering, Northwest A & F University, Yangling 712100, Shaanxi, China;
    2. College of Information Engineering, Northwest A & F University, Yangling 712100, Shaanxi, China;
    3. Hangzhou Key Lab of EBusiness and Information Security, Hangzhou Normal University,
     Hangzhou 310036, Zhejiang, China
  • Received:2012-07-03 Online:2012-09-20 Published:2012-09-24

Abstract:

To meet the requirement of privacy protection in doing hierarchical business after signing the whole one in management-type software as a service application, a scheme of hierarchical content extraction signature was proposed based on the identity-based signature of non-credible private key generator. The extraction of both fragment and signature was in control by the hierarchical extraction policy. The complexity of certificate in public key infrastructure was avoided based on the identity-based signature. In some extent, the noncredible private key generator problem was weakened whose part independently generated by service provider and tenant. The analyzing results show that the scheme has the specialties of user’s private key’s privacy, un-forge and privacy of CES. It can be applied to online office and book sale.

Key words: software as a service application; content extraction signature; hierarchical extraction; identity-based signature; privacy protection

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!