QuSigS: A quantum Signcryption scheme to recover key escrow problem and key revocation problem in cloud computing
Multimedia Tools and Applications, 2022•Springer
In recent years, cloud computing plays a vital role in IT industries. Cloud computing is the
sum of software as a service (SaaS) and utility computing (hardware). Elliptic Curve
Cryptography provides more efficient performance and security for a cloud environment. The
usage of Attribute-Based Encryption (ABE) has escrow and revocation problems. These
problems make a burden on the cloud and create access failure to the cloud users.
Therefore, we use a novel signcryption technique Zheng to recover the escrow and …
sum of software as a service (SaaS) and utility computing (hardware). Elliptic Curve
Cryptography provides more efficient performance and security for a cloud environment. The
usage of Attribute-Based Encryption (ABE) has escrow and revocation problems. These
problems make a burden on the cloud and create access failure to the cloud users.
Therefore, we use a novel signcryption technique Zheng to recover the escrow and …
Abstract
In recent years, cloud computing plays a vital role in IT industries. Cloud computing is the sum of software as a service (SaaS) and utility computing (hardware). Elliptic Curve Cryptography provides more efficient performance and security for a cloud environment. The usage of Attribute-Based Encryption (ABE) has escrow and revocation problems. These problems make a burden on the cloud and create access failure to the cloud users. Therefore, we use a novel signcryption technique Zheng to recover the escrow and revocation problems from the cloud/edge. We proposed “A Qu antum Sig ncryption S cheme (QuSigS) to Recover Key Escrow Problem (KEP) (Niu et al. , Zhang et al. , Chen and Ma ) and Key Revocation Problem (KRP) (Al-Dahhan et al. Sens Multidiscipl Digit Publish Inst 19(7):1–22 , Li et al. IEEE Access 8:176738–176749 ) in cloud computing”. Our proposed QuSigS scheme reduced communication and computational overheads, memory storage, and execution time, at the user side and at the server side. Our applied techniques for the user side is signcryption and for the server side is unsigncryption. The efficient result calculation from in percentage for the user side and server side is 16.66% for 112 bits, 13.04% for 160 bits, 16.66% for 256 bits on the user side and the server side it is 9.52% respectively. The efficiency of our scheme is 4.17% for signcryption and 9.52% for unsigncryption as compared to existing schemes.
Springer