A SECURE AUTHENTICATION SCHEME FOR MOBILE CLOUD COMPUTING AGAINST CCA

被引:0
|
作者
Hossain, Md Jakir [1 ]
Xu, Chunxiang [1 ]
Li, Chuang [1 ]
机构
[1] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 611731, Peoples R China
基金
中国国家自然科学基金;
关键词
Learning-parity with noise; Chosen ciphertext attacks; Identity-based encryption; Private key generator;
D O I
10.1109/ICCWAMTIP51612.2020.9317383
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Authentication schemes employing identity-based encryption are widely used in mobile cloud computing environments. It enables users to get umpteen services from different cloud servers by registering only once with a third-party. However, in existing schemes, the security against chosen-ciphertext attacks and malicious private key generator is not well-considered. These security pitfalls may cause security and privacy issues in some application scenarios since an active attacker can send a number of adaptively chosen ciphertext and tries to distinguish the target ciphertext; succeeds may cause the exposure of the underlying secret key. In this paper, we propose a secure and efficient authentication scheme for mobile cloud computing with security against chosen-ciphertext attacks and malicious private key generator based on adaptive one-wayness trapdoor function and learning-parity with noise hardness assumption. Our comprehensive security proof demonstrates that our scheme is indistinguishable against chosen-ciphertext attacks.
引用
收藏
页码:266 / 270
页数:5
相关论文
共 50 条
  • [1] New Authentication Scheme to Secure against the Phishing Attack in the Mobile Cloud Computing
    Munivel, E.
    Kannammal, A.
    SECURITY AND COMMUNICATION NETWORKS, 2019, 2019
  • [2] A provable and secure mobile user authentication scheme for mobile cloud computing services
    Irshad, Azeem
    Chaudhry, Shehzad Ashraf
    Shafiq, Muhammad
    Usman, Muhammad
    Asif, Muhammad
    Ghani, Anwar
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2019, 32 (14)
  • [3] An Enhanced Secure Authentication Scheme with User Anonymity in Mobile Cloud Computing
    Madhusudhan, R.
    Suvidha, K. S.
    2017 INTERNATIONAL CONFERENCE ON PUBLIC KEY INFRASTRUCTURE AND ITS APPLICATIONS (PKIA 2017), 2017, : 17 - 22
  • [4] A new secure authentication scheme for cloud computing environment
    Namasudra, Suyel
    Roy, Pinki
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2017, 29 (20):
  • [5] On the Design of Provably Secure Lightweight Remote User Authentication Scheme for Mobile Cloud Computing Services
    Roy, Sandip
    Chatterjee, Santanu
    Das, Ashok Kumar
    Chattopadhyay, Samiran
    Kumar, Neeraj
    Vasilakos, Athanasios V.
    IEEE ACCESS, 2017, 5 : 25808 - 25825
  • [6] AMLT: A Mutual Authentication Scheme for Mobile Cloud Computing
    Dey, Saurabh
    Ye, Qiang
    Sampalli, Srinivas
    IEEE 2018 INTERNATIONAL CONGRESS ON CYBERMATICS / 2018 IEEE CONFERENCES ON INTERNET OF THINGS, GREEN COMPUTING AND COMMUNICATIONS, CYBER, PHYSICAL AND SOCIAL COMPUTING, SMART DATA, BLOCKCHAIN, COMPUTER AND INFORMATION TECHNOLOGY, 2018, : 700 - 705
  • [7] An Efficient Authentication Scheme for Mobile Cloud Computing Services
    Audithan, Sivaraman
    Vijayasaro, Vijayaregunathan
    Vijayakumar, Pandi
    Vijayakumar, Varadarajan
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2017, 33 (03) : 727 - 741
  • [8] A lightweight anonymous authentication scheme for secure cloud computing services
    Hamza Hammami
    Sadok Ben Yahia
    Mohammad S. Obaidat
    The Journal of Supercomputing, 2021, 77 : 1693 - 1713
  • [9] A lightweight anonymous authentication scheme for secure cloud computing services
    Hammami, Hamza
    Ben Yahia, Sadok
    Obaidat, Mohammad S.
    JOURNAL OF SUPERCOMPUTING, 2021, 77 (02): : 1693 - 1713
  • [10] Implementation of Secure Authentication Scheme and Access Control in Cloud Computing
    Pawar, Prativesh
    Sheikh, Rashid
    PROCEEDINGS OF 2016 INTERNATIONAL CONFERENCE ON ICT IN BUSINESS INDUSTRY & GOVERNMENT (ICTBIG), 2016,