Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
Proxy signatures for delegating signing operation
CCS '96 Proceedings of the 3rd ACM conference on Computer and communications security
Non-repudiation in electronic commerce
Non-repudiation in electronic commerce
Identity-Based Encryption from the Weil Pairing
SIAM Journal on Computing
ICICS '97 Proceedings of the First International Conference on Information and Communication Security
Efficient Identity Based Signature Schemes Based on Pairings
SAC '02 Revised Papers from the 9th Annual International Workshop on Selected Areas in Cryptography
Improved Online/Offline Signature Schemes
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
An Identity-Based Signature from Gap Diffie-Hellman Groups
PKC '03 Proceedings of the 6th International Workshop on Theory and Practice in Public Key Cryptography: Public Key Cryptography
Identity Based Proxy-Signcryption Scheme from Pairings
SCC '04 Proceedings of the 2004 IEEE International Conference on Services Computing
An Efficient ID-Based Proxy Signature Scheme from Pairings
Information Security and Cryptology
Cloud computing and SaaS as new computing platforms
Communications of the ACM
ID-Based proxy signature using bilinear pairings
ISPA'05 Proceedings of the 2005 international conference on Parallel and Distributed Processing and Applications
Efficient and provably-secure identity-based signatures and signcryption from bilinear maps
ASIACRYPT'05 Proceedings of the 11th international conference on Theory and Application of Cryptology and Information Security
Identity-based proxy signature from pairings
ATC'07 Proceedings of the 4th international conference on Autonomic and Trusted Computing
Identity-Based Proxy Signature for Cloud Service in SaaS
INCOS '12 Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems
Research trends in cloud, cluster and grid computing
Cluster Computing
Hi-index | 0.00 |
Cloud computing provides many kinds of application services for cloud users, but security problems have caused great impact on Software as a Service (SaaS). As a commercial model, SaaS is related among different participants who could be malicious or dishonest. This paper presents a Software Service Signature (S3) to deal with several security issues in SaaS and keep the interests and rights of all participants in safety. Our design is based on ID-based proxy signatures from pairings. The analysis shows that the proposed scheme can effectively strengthen the security through authentication in cloud computing.