On secure outsourcing of cryptographic computations to cloud.
Lakshmi KuppusamyJothi RangasamyPraveen GauravaramPublished in: SCC@ASIACCS (2014)
Keyphrases
- security protocols
- key management
- encryption key
- cryptographic protocols
- public key encryption
- cloud computing
- digital signature
- smart card
- security properties
- secure communication
- service providers
- cryptographic algorithms
- encryption scheme
- stream cipher
- information technology
- security requirements
- private cloud
- business process
- public key cryptography
- security issues
- security mechanisms
- cloud storage
- security analysis
- encryption decryption
- advanced encryption standard
- information systems
- lightweight
- homomorphic encryption
- data center
- security services
- authentication scheme
- cloud services
- formal model
- security model
- authentication protocol
- elliptic curve
- data management
- diffie hellman
- elliptic curve cryptography
- data encryption
- digital rights management
- digital content
- secret key