Aiming at the privacy protection problem in the cloud computing environment, a signature algorithm based on the Decision Diffie-Hellman (DDH) assumption and the discrete logarithm problem is designed when studying the Certificateless Homomorphic Signature (CLHS) technology. Our algorithm can resist pollution attacks from cloud computing users, collusion attacks from semi-honest participants, and malicious attacks from key generation centers. While protecting user privacy, our algorithm also ensures the efficient development of cloud computation server services.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.