Protecting Your Own Private Key in Cloud: Security, Scalability and Performance.
Wenqian YuPing YuJunyuan WangChangzheng WeiLu GongWeigang LiBo CuiHari K. TadepalliBrian WillPublished in: CNS (2018)
Keyphrases
- private key
- public key
- security analysis
- signature scheme
- key distribution
- secret key
- digital signature
- cloud computing
- mutual authentication
- image encryption
- signcryption scheme
- encryption scheme
- secret sharing scheme
- ciphertext
- access control
- security requirements
- smart card
- information security
- key management
- fault tolerant
- standard model
- mobile agents