{"created":"2023-06-19T10:29:34.494511+00:00","id":9491,"links":{},"metadata":{"_buckets":{"deposit":"dca08c2d-e2d5-4fa1-9212-67ea55e4a9c3"},"_deposit":{"created_by":18,"id":"9491","owners":[18],"pid":{"revision_id":0,"type":"depid","value":"9491"},"status":"published"},"_oai":{"id":"oai:muroran-it.repo.nii.ac.jp:00009491","sets":["216:316","216:352","46"]},"author_link":["38719","39157","54497","21131","54495","54496"],"item_79_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicIssueDates":{"bibliographicIssueDate":"2016-05-12","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"16","bibliographicPageEnd":"3789","bibliographicPageStart":"3777","bibliographicVolumeNumber":"9","bibliographic_titles":[{"bibliographic_title":"Security and Communication Networks","bibliographic_titleLang":"en"}]}]},"item_79_description_23":{"attribute_name":"フォーマット","attribute_value_mlt":[{"subitem_description":"application/pdf","subitem_description_type":"Other"}]},"item_79_description_7":{"attribute_name":"抄録","attribute_value_mlt":[{"subitem_description":"Since the technology of mobile cloud computing has brought a lot of benefits to information world, many applications in mobile devices based on cloud have emerged and boomed in the last years. According to the storage limitation, data owners would like to upload and further share the data through the cloud. Due to the safety requirements, mobile data owners are requested to provide credentials such as authentication tags along with the data. However, it is impossible to require mobile data owners to provide every authenticated computational results. The solution that signers’ privilege is outsourced to the cloud would be a promising way. To solve this problem, we propose three secure multi-entities delegated authentication protocols (MEDAPs) in mobile cloud computing, which enables the multiple mobile data owners to authorize a group designated cloud servers with the signing rights. The security of MEDAPs is constructed on three cryptographic primitive identity-based multi-proxy signature (IBMPS), identity-based proxy multi-signature (IBPMS), and identity-based multi-proxy multi-signature (IBMPMS), relied on the cubic residues, equaling to the integer factorization assumption. We also give the formal security proof under adaptively chosen message attacks and chosen identity/warrant attacks. Furthermore,compared with the pairing based protocol, MEDAPs are quite efficient and the communication overhead is nearly not a linear growth with the number of cloud servers. Copyright⃝c 2015 John Wiley & Sons, Ltd.","subitem_description_language":"en","subitem_description_type":"Abstract"}]},"item_79_link_17":{"attribute_name":"出版者版へのリンク","attribute_value_mlt":[{"subitem_link_text":"10.1002/sec.1490","subitem_link_url":"https://doi.org/10.1002/sec.1490"}]},"item_79_link_5":{"attribute_name":"室蘭工業大学研究者データベースへのリンク","attribute_value_mlt":[{"subitem_link_text":"董 冕雄(DONG Mianxiong)","subitem_link_url":"http://rdsoran.muroran-it.ac.jp/html/100000145_ja.html"},{"subitem_link_text":"太田 香(OTA Kaoru)","subitem_link_url":"http://rdsoran.muroran-it.ac.jp/html/100000140_ja.html"}]},"item_79_relation_18":{"attribute_name":"DOI","attribute_value_mlt":[{"subitem_relation_type":"isVersionOf","subitem_relation_type_id":{"subitem_relation_type_id_text":"10.1002/sec.1490","subitem_relation_type_select":"DOI"}}]},"item_79_rights_19":{"attribute_name":"権利","attribute_value_mlt":[{"subitem_rights":"This is the peer reviewed version of the following article: [MEDAPs: secure multi-entities delegated authentication protocols for mobile cloud computing], which has been published in final form at [http://dx.doi.org/10.1002/sec.1490]. This article may be used for non-commercial purposes in accordance with Wiley Terms and Conditions for Self-Archiving.","subitem_rights_language":"en"}]},"item_79_source_id_12":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"1939-0122","subitem_source_identifier_type":"PISSN"}]},"item_79_subject_9":{"attribute_name":"日本十進分類法","attribute_value_mlt":[{"subitem_subject":"007.3","subitem_subject_scheme":"NDC"}]},"item_79_version_type_21":{"attribute_name":"著者版フラグ","attribute_value_mlt":[{"subitem_version_resource":"http://purl.org/coar/version/c_ab4af688f83e57aa","subitem_version_type":"AM"}]},"item_access_right":{"attribute_name":"アクセス権","attribute_value_mlt":[{"subitem_access_right":"open access","subitem_access_right_uri":"http://purl.org/coar/access_right/c_abf2"}]},"item_creator":{"attribute_name":"著者","attribute_type":"creator","attribute_value_mlt":[{"creatorAffiliations":[{"affiliationNameIdentifiers":[],"affiliationNames":[{"affiliationName":""}]}],"creatorNames":[{"creatorName":"ZHANG, Lei","creatorNameLang":"en"}],"familyNames":[{}],"givenNames":[{}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"WEI, Lifei","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"HUANG, Dongmei","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"ZHANG, Kai","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorAffiliations":[{"affiliationNameIdentifiers":[{}],"affiliationNames":[{},{}]}],"creatorNames":[{"creatorName":"DONG, Mianxiong","creatorNameLang":"en"},{"creatorName":"トウ, メンユウ","creatorNameLang":"ja-Kana"},{"creatorName":"董, 冕雄","creatorNameLang":"ja"}],"familyNames":[{},{},{}],"givenNames":[{},{},{}],"nameIdentifiers":[{},{}]},{"creatorAffiliations":[{"affiliationNameIdentifiers":[{}],"affiliationNames":[{},{}]}],"creatorNames":[{"creatorName":"OTA, Kaoru","creatorNameLang":"en"},{"creatorName":"太田, 香","creatorNameLang":"ja"},{"creatorName":"オオタ, カオル","creatorNameLang":"ja-Kana"}],"familyNames":[{},{},{}],"givenNames":[{},{},{}],"nameIdentifiers":[{},{}]}]},"item_files":{"attribute_name":"ファイル情報","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_date","date":[{"dateType":"Available","dateValue":"2017-08-25"}],"displaytype":"detail","filename":"SCN_9_16_3777–3789.pdf","filesize":[{"value":"329.2 kB"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"label":"SCN_9_16_3777–3789","objectType":"fulltext","url":"https://muroran-it.repo.nii.ac.jp/record/9491/files/SCN_9_16_3777–3789.pdf"},"version_id":"36553061-c702-46e3-b927-4daa5c99db97"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"mobile data owners","subitem_subject_language":"en","subitem_subject_scheme":"Other"},{"subitem_subject":"delegated authentication","subitem_subject_language":"en","subitem_subject_scheme":"Other"},{"subitem_subject":"multi-authentication","subitem_subject_language":"en","subitem_subject_scheme":"Other"},{"subitem_subject":"provable secure","subitem_subject_language":"en","subitem_subject_scheme":"Other"},{"subitem_subject":"mobile cloud computing","subitem_subject_language":"en","subitem_subject_scheme":"Other"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"eng"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourcetype":"journal article","resourceuri":"http://purl.org/coar/resource_type/c_6501"}]},"item_title":"MEDAPs: secure multi-entities delegated authentication protocols for mobile cloud computing","item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"MEDAPs: secure multi-entities delegated authentication protocols for mobile cloud computing","subitem_title_language":"en"}]},"item_type_id":"79","owner":"18","path":["46","316","352"],"pubdate":{"attribute_name":"PubDate","attribute_value":"2017-08-25"},"publish_date":"2017-08-25","publish_status":"0","recid":"9491","relation_version_is_last":true,"title":["MEDAPs: secure multi-entities delegated authentication protocols for mobile cloud computing"],"weko_creator_id":"18","weko_shared_id":-1},"updated":"2024-01-30T01:12:28.480865+00:00"}