was read the article
array:23 [ "pii" => "S166564231530002X" "issn" => "16656423" "doi" => "10.1016/S1665-6423(15)30002-X" "estado" => "S300" "fechaPublicacion" => "2015-02-01" "aid" => "73029" "copyright" => "Universidad Nacional Autónoma de México" "copyrightAnyo" => "2015" "documento" => "article" "licencia" => "http://creativecommons.org/licenses/by-nc-nd/4.0/" "subdocumento" => "fla" "cita" => "Journal of Applied Research and Technology. 2015;13:20-31" "abierto" => array:3 [ "ES" => true "ES2" => true "LATM" => true ] "gratuito" => true "lecturas" => array:2 [ "total" => 2094 "formatos" => array:3 [ "EPUB" => 41 "HTML" => 1552 "PDF" => 501 ] ] "itemSiguiente" => array:18 [ "pii" => "S1665642315300031" "issn" => "16656423" "doi" => "10.1016/S1665-6423(15)30003-1" "estado" => "S300" "fechaPublicacion" => "2015-02-01" "aid" => "73030" "copyright" => "Universidad Nacional Autónoma de México" "documento" => "article" "licencia" => "http://creativecommons.org/licenses/by-nc-nd/4.0/" "subdocumento" => "fla" "cita" => "Journal of Applied Research and Technology. 2015;13:32-44" "abierto" => array:3 [ "ES" => true "ES2" => true "LATM" => true ] "gratuito" => true "lecturas" => array:2 [ "total" => 3783 "formatos" => array:3 [ "EPUB" => 47 "HTML" => 3104 "PDF" => 632 ] ] "en" => array:11 [ "idiomaDefecto" => true "titulo" => "Exploring and Measuring Possible Co-Existences between DVB-T2-Lite and LTE Systems in Ideal and Portable Fading Channels" "tienePdf" => "en" "tieneTextoCompleto" => "en" "tieneResumen" => "en" "paginas" => array:1 [ 0 => array:2 [ "paginaInicial" => "32" "paginaFinal" => "44" ] ] "contieneResumen" => array:1 [ "en" => true ] "contieneTextoCompleto" => array:1 [ "en" => true ] "contienePdf" => array:1 [ "en" => true ] "resumenGrafico" => array:2 [ "original" => 0 "multimedia" => array:7 [ "identificador" => "fig0035" "etiqueta" => "Figure 7" "tipo" => "MULTIMEDIAFIGURA" "mostrarFloat" => true "mostrarDisplay" => false "figura" => array:1 [ 0 => array:4 [ "imagen" => "gr7.jpeg" "Alto" => 636 "Ancho" => 1850 "Tamanyo" => 182211 ] ] "descripcion" => array:1 [ "en" => "<p id="spar0035" class="elsevierStyleSimplePara elsevierViewall">EVM dependency of the QPSK, 16QAM and 64QAM modulations (using in the LTE system) on the level of frequency overlap between the DVB-T2-Lite and LTE services, working abreast in the same frequency band at ideal (a) and portable fading channel conditions (b).</p>" ] ] ] "autores" => array:1 [ 0 => array:2 [ "autoresLista" => "L. Polak, O. Kaller, L. Klozar, J. Sebesta, T. Kratochvil" "autores" => array:5 [ 0 => array:2 [ "nombre" => "L." "apellidos" => "Polak" ] 1 => array:2 [ "nombre" => "O." "apellidos" => "Kaller" ] 2 => array:2 [ "nombre" => "L." "apellidos" => "Klozar" ] 3 => array:2 [ "nombre" => "J." "apellidos" => "Sebesta" ] 4 => array:2 [ "nombre" => "T." "apellidos" => "Kratochvil" ] ] ] ] ] "idiomaDefecto" => "en" "EPUB" => "https://multimedia.elsevier.es/PublicationsMultimediaV1/item/epub/S1665642315300031?idApp=UINPBA00004N" "url" => "/16656423/0000001300000001/v1_201504070131/S1665642315300031/v1_201504070131/en/main.assets" ] "itemAnterior" => array:18 [ "pii" => "S1665642315300018" "issn" => "16656423" "doi" => "10.1016/S1665-6423(15)30001-8" "estado" => "S300" "fechaPublicacion" => "2015-02-01" "aid" => "73028" "copyright" => "Universidad Nacional Autónoma de México" "documento" => "article" "licencia" => "http://creativecommons.org/licenses/by-nc-nd/4.0/" "subdocumento" => "fla" "cita" => "Journal of Applied Research and Technology. 2015;13:7-19" "abierto" => array:3 [ "ES" => true "ES2" => true "LATM" => true ] "gratuito" => true "lecturas" => array:2 [ "total" => 1266 "formatos" => array:3 [ "EPUB" => 39 "HTML" => 803 "PDF" => 424 ] ] "en" => array:11 [ "idiomaDefecto" => true "titulo" => "A Novel “Single-Path” vs. “Few-Path” Test Based on Higher Order Statistics to Possibly Start-Up Coherent Combining" "tienePdf" => "en" "tieneTextoCompleto" => "en" "tieneResumen" => "en" "paginas" => array:1 [ 0 => array:2 [ "paginaInicial" => "7" "paginaFinal" => "19" ] ] "contieneResumen" => array:1 [ "en" => true ] "contieneTextoCompleto" => array:1 [ "en" => true ] "contienePdf" => array:1 [ "en" => true ] "resumenGrafico" => array:2 [ "original" => 0 "multimedia" => array:7 [ "identificador" => "fig0005" "etiqueta" => "Figure 1" "tipo" => "MULTIMEDIAFIGURA" "mostrarFloat" => true "mostrarDisplay" => false "figura" => array:1 [ 0 => array:4 [ "imagen" => "gr1.jpeg" "Alto" => 761 "Ancho" => 1420 "Tamanyo" => 117463 ] ] "descripcion" => array:1 [ "en" => "<p id="spar0005" class="elsevierStyleSimplePara elsevierViewall">Rationale of the Rakeness test to possibly start-up coherent combining at the receiver side.</p>" ] ] ] "autores" => array:1 [ 0 => array:2 [ "autoresLista" => "F. Benedetto, G. Giunta, E. Guzzon" "autores" => array:3 [ 0 => array:2 [ "nombre" => "F." "apellidos" => "Benedetto" ] 1 => array:2 [ "nombre" => "G." "apellidos" => "Giunta" ] 2 => array:2 [ "nombre" => "E." "apellidos" => "Guzzon" ] ] ] ] ] "idiomaDefecto" => "en" "EPUB" => "https://multimedia.elsevier.es/PublicationsMultimediaV1/item/epub/S1665642315300018?idApp=UINPBA00004N" "url" => "/16656423/0000001300000001/v1_201504070131/S1665642315300018/v1_201504070131/en/main.assets" ] "en" => array:16 [ "idiomaDefecto" => true "titulo" => "Privacy-preserving security solution for cloud services" "tieneTextoCompleto" => true "paginas" => array:1 [ 0 => array:2 [ "paginaInicial" => "20" "paginaFinal" => "31" ] ] "autores" => array:1 [ 0 => array:3 [ "autoresLista" => "L. Malina, J. Hajny, P. Dzurenda, V. Zeman" "autores" => array:4 [ 0 => array:3 [ "nombre" => "L." "apellidos" => "Malina" "email" => array:1 [ 0 => "malina@feec.vutbr.cz" ] ] 1 => array:2 [ "nombre" => "J." "apellidos" => "Hajny" ] 2 => array:2 [ "nombre" => "P." "apellidos" => "Dzurenda" ] 3 => array:2 [ "nombre" => "V." "apellidos" => "Zeman" ] ] "afiliaciones" => array:1 [ 0 => array:2 [ "entidad" => "Department od Telecommunications, Brno University of Technology, Brno, Czech Republic" "identificador" => "aff0005" ] ] ] ] "resumenGrafico" => array:2 [ "original" => 0 "multimedia" => array:7 [ "identificador" => "fig0015" "etiqueta" => "Figure 3" "tipo" => "MULTIMEDIAFIGURA" "mostrarFloat" => true "mostrarDisplay" => false "figura" => array:1 [ 0 => array:4 [ "imagen" => "gr3.jpeg" "Alto" => 949 "Ancho" => 1168 "Tamanyo" => 94324 ] ] "descripcion" => array:1 [ "en" => "<p id="spar0015" class="elsevierStyleSimplePara elsevierViewall">Influence of the length of the blacklist on the total time of verification.</p>" ] ] ] "textoCompleto" => "<span class="elsevierStyleSections"><span id="sec0005" class="elsevierStyleSection elsevierViewall"><span class="elsevierStyleLabel">1</span><span class="elsevierStyleSectionTitle" id="sect0015">Introduction</span><p id="par0005" class="elsevierStylePara elsevierViewall">Cloud services are becoming indisputable parts of modern information and communication systems and step into our daily lives. Some cloud services such as Amazon's Simple Storage Service, Box.net, Cloud Safe etc. use user identity, personal data and/or the location of clients.Therefore, these cloud computing services open a number of security and privacy concerns. The current research challenge in cloud services is the secure and privacy-preserving authentication of users. Users, who store their sensitive information like financial information, health records, etc., have a fundamental right of privacy. There are few cryptographic tools and schemes like anonymous authentication schemes, group signatures, zero knowledge protocols that can both hide user identity and provide authentication. The providers of cloud services need to control the authentication process to permit the access of only valid clients to their services. Further, they must be able to revoke malicious clients and reveal their identities.</p><p id="par0010" class="elsevierStylePara elsevierViewall">In practice, hundreds of users can access cloud services at the same time. Hence, the verification process of user access must be as efficient as possible and the computational cryptographic overhead must be minimal.</p><p id="par0015" class="elsevierStylePara elsevierViewall">We propose a novel security solution for cloud services that offers anonymous authentication based on group signatures. We aim mainly on the efficiency of the authentication process and user privacy. Our solution also provides the confidentiality and integrity of transmitted data between users and cloud service providers. Moreover, we implement our solution as a proof-of-concept application and compare the performance of our solution with related schemes. Our results show that our solution is more efficient than the related solutions.</p><p id="par0020" class="elsevierStylePara elsevierViewall">The paper is organized as follow: The next section presents the related work. Then, we analyse cryptographic privacy-preserving schemes used in cloud computing. In section 4, we describe group signatures. In section 5, wepresent our solution and we introduce our novel privacy-preserving cryptographic scheme for cloud services in section 6. Section 7 contains our experimental results and the performance analysis and comparison. Finally, the conclusion of our work is presented.<a name="p21"></a></p></span><span id="sec0010" class="elsevierStyleSection elsevierViewall"><span class="elsevierStyleLabel">2</span><span class="elsevierStyleSectionTitle" id="sect0020">Related work</span><p id="par0025" class="elsevierStylePara elsevierViewall">Privacy-preserving cloud computing solutions have been developed from theoretical recommendations to concrete cryptographic proposals.</p><p id="par0030" class="elsevierStylePara elsevierViewall">There are many works which deal with general security issues in cloud computing but only few works deal also with user privacy.</p><p id="par0035" class="elsevierStylePara elsevierViewall">The authors [<a class="elsevierStyleCrossRef" href="#bib0005">1</a>] explore the cost of common cryptographic primitives (AES, MD5, SHA-1, RSA, DSA, and ECDSA) and their viability for cloudsecurity purposes. The authors deal with the encryption of cloud storage but do not mention privacy-preserving access to a cloud storage.</p><p id="par0040" class="elsevierStylePara elsevierViewall">The work [<a class="elsevierStyleCrossRef" href="#bib0010">2</a>] employs a pairing based signature scheme BLS to make the privacy-preserving security audit of cloud storage data by the Third Party Auditor (TPA). The solution uses batch verification to reduce communication overhead from cloud server and computation cost on TPA side.Further, the paper [<a class="elsevierStyleCrossRef" href="#bib0015">3</a>] introduces the verification protocols that can accommodate dynamic data files. The paper explores the problem of providing simultaneous public auditability and data dynamics for remote data integrity check in Cloud Computing in a privacy-preserving way.These solutions [<a class="elsevierStyleCrossRef" href="#bib0010">2</a>] and [<a class="elsevierStyleCrossRef" href="#bib0015">3</a>] provide privacy-preserving public audit but do not offer the anonymous access of users to cloud services.</p><p id="par0045" class="elsevierStylePara elsevierViewall">The work [<a class="elsevierStyleCrossRef" href="#bib0020">4</a>] establishes requirements for a secure and anonymous communication system that uses a cloud architecture (Tor and Freenet). Nevertheless, the author does not outline any cryptographic solution. Another non-cryptographic solution ensuring user privacy in cloud scenarios is presented in [<a class="elsevierStyleCrossRef" href="#bib0025">5</a>]. The authors propose a client-based privacy manager which reduces the risk of the leakage of user private information.In the paper [<a class="elsevierStyleCrossRef" href="#bib0030">6</a>], authors use a non-cryptographic approach to obtain the benefits of the public cloud storagewithout exposing the content of files. The approach is based on redundancy techniques including an information dispersal algorithm (IDA). Nevertheless, these solutions do not protect against the linkability of user sessions which can cause unauthorized user profiling.</p><p id="par0050" class="elsevierStylePara elsevierViewall">Jensen et al. [<a class="elsevierStyleCrossRef" href="#bib0035">7</a>] propose an anonymous and accountable access method to cloud based on ring and group signatures. Nevertheless, their proposal uses a group signature scheme [<a class="elsevierStyleCrossRef" href="#bib0080">8</a>] which is inefficient because the signature size grows with the number of users.</p><p id="par0055" class="elsevierStylePara elsevierViewall">The work [<a class="elsevierStyleCrossRef" href="#bib0045">9</a>] presents a security approach which uses zero-knowledge proofs providing user anonymous authentication. The main drawback of the proposal is a large communication overhead between a user and a cloud server due to the Fiat-Shamir identification scheme [<a class="elsevierStyleCrossRef" href="#bib0050">10</a>]. In the work [<a class="elsevierStyleCrossRef" href="#bib0055">11</a>], the author uses the CLsignature scheme [<a class="elsevierStyleCrossRef" href="#bib0060">12</a>] and zero-knowledge proofs of knowledge to achieve user's anonymous access to services like digital newspapers, digital libraries, music collections, etc.</p><p id="par0060" class="elsevierStylePara elsevierViewall">The work [<a class="elsevierStyleCrossRef" href="#bib0065">13</a>] presents a cryptographic scheme to ensure anonymous user access to information and the confidentiality of sensitive documents in cloud storages. The work[<a class="elsevierStyleCrossRef" href="#bib0070">14</a>]deals with anonymity and unlinkability in cloud services by provided group signature schemes[<a class="elsevierStyleCrossRef" href="#bib0075">15</a>]. In the next section, we analyze the solutions [<a class="elsevierStyleCrossRef" href="#bib0055">11</a>], [<a class="elsevierStyleCrossRef" href="#bib0065">13</a>] and [<a class="elsevierStyleCrossRef" href="#bib0070">14</a>].</p></span><span id="sec0015" class="elsevierStyleSection elsevierViewall"><span class="elsevierStyleLabel">3</span><span class="elsevierStyleSectionTitle" id="sect0025">Performance analysis of cryptographic privacy-preserving solutions used in cloud computing</span><p id="par0065" class="elsevierStylePara elsevierViewall">In this section, we investigate the current cryptographic solutions which provide the anonymous or pseudonymous access to cloud services and shared storages. We aim on the authentication phases used in privacy-preserving cloud services. In the following performance analysis, we take into account only expensive operations like bilinear pairings (p), modular exponentiation (e) and multiplication (m). According to the results of works [<a class="elsevierStyleCrossRef" href="#bib0080">16</a>], [<a class="elsevierStyleCrossRef" href="#bib0085">17</a>], we omit the fast operations like addition, subtraction or hash functions which have a minimal impact on the overall performance. The times of expensive pairing operations have been measured for example in [<a class="elsevierStyleCrossRef" href="#bib0125">25</a>].</p><p id="par0070" class="elsevierStylePara elsevierViewall"><a class="elsevierStyleCrossRef" href="#tbl0005">Table 1</a> shows the performance analysis of the Blantom solution [<a class="elsevierStyleCrossRef" href="#bib0055">11</a>], the Lu et al. solution [<a class="elsevierStyleCrossRef" href="#bib0065">13</a>], the Chow et al. solution [<a class="elsevierStyleCrossRef" href="#bib0070">14</a>] and our scheme described in Section6. Blantom in [<a class="elsevierStyleCrossRef" href="#bib0055">11</a>] proposes a solution<a name="p22"></a> using the CL signatures [<a class="elsevierStyleCrossRef" href="#bib0060">12</a>]. To establish anonymous authentication, the CL signature is combined with a Zero Knowledge Proof of Knowledge (ZKPK) protocols. The computational complexity of Blantom solution depends on the subscription type and is variable. Lu et al. [<a class="elsevierStyleCrossRef" href="#bib0065">13</a>] propose a pairing-based cryptographic scheme ensuring anonymous authentication of users accessing cloud services. A user has to sign a challenge received from a server and then he/she sends it back to verify it. Chow et al. [14]employ group signature schemes proposed by Boyen and Waters in [<a class="elsevierStyleCrossRef" href="#bib0075">15</a>]and [<a class="elsevierStyleCrossRef" href="#bib0090">18</a>](BW schemes). The BW scheme [<a class="elsevierStyleCrossRef" href="#bib0090">18</a>]is used to make a group signature which provides the anonymous authentication of users. Nevertheless, these solutions have 6 pairing operations in verification. In the next section, we present our solution that does not use expensive pairing operations.</p><elsevierMultimedia ident="tbl0005"></elsevierMultimedia></span><span id="sec0020" class="elsevierStyleSection elsevierViewall"><span class="elsevierStyleLabel">4</span><span class="elsevierStyleSectionTitle" id="sect0030">Group signatures as a basic part in privacy enhancing cloud services</span><p id="par0075" class="elsevierStylePara elsevierViewall">Group signature schemes are used in many privacy enhancing cryptographic protections that are applied in cloud services. Group signatures were introduced by Chaum and Heyst [<a class="elsevierStyleCrossRef" href="#bib0040">8</a>] in 1991. Their main purpose is to allow members of a group sign messages on behalf of the group. Every group member can sign a message by own group member secret key <span class="elsevierStyleItalic">gsk[i]</span> that is usually issued by a group manager. A verifier checks the validity of the signature with a group public key <span class="elsevierStyleItalic">gpk</span>. The verifier is able to verify that the signer is indeed the member of the group while the signer's identity is not released. The identities of the members are traceable only in certain circumstances, e.g. breaking the rules.</p><p id="par0080" class="elsevierStylePara elsevierViewall">Revocation can be done by the group manager or a revocation manager who owns group manager's secret key <span class="elsevierStyleItalic">gmsk</span>. The group signature schemes usually employ the following entities: <ul class="elsevierStyleList" id="lis0005"><li class="elsevierStyleListItem" id="lsti0005"><span class="elsevierStyleLabel">•</span><p id="par0085" class="elsevierStylePara elsevierViewall"><span class="elsevierStyleBold">Group manager</span> – this entity adds group members into a group, and generates and issues the secret keys of group members.</p></li><li class="elsevierStyleListItem" id="lsti0010"><span class="elsevierStyleLabel">•</span><p id="par0090" class="elsevierStylePara elsevierViewall"><span class="elsevierStyleBold">Revocation manager</span> – this entity disclosures the identity of dishonest members.</p></li><li class="elsevierStyleListItem" id="lsti0015"><span class="elsevierStyleLabel">•</span><p id="par0095" class="elsevierStylePara elsevierViewall"><span class="elsevierStyleBold">User</span> – a group member who owns the group member secret key <span class="elsevierStyleItalic">gsk[i]</span>. The user can sign a message on behalf of the group.</p></li><li class="elsevierStyleListItem" id="lsti0020"><span class="elsevierStyleLabel">•</span><p id="par0100" class="elsevierStylePara elsevierViewall"><span class="elsevierStyleBold">Verifier</span> – this entity verifies the validity of the signature by using the group public key <span class="elsevierStyleItalic">gpk</span>.</p></li></ul></p><p id="par0105" class="elsevierStylePara elsevierViewall">Currently, there are many variants of group signatures schemes which differ mainly in their properties such as the level of anonymity, security, efficiency and the length of signature. Group signatures can be understood as a subset of attribute authentication systems, which contain only one attribute representing a membership in a group. Group signatures schemes usually provide the following properties: <ul class="elsevierStyleList" id="lis0010"><li class="elsevierStyleListItem" id="lsti0025"><span class="elsevierStyleLabel">•</span><p id="par0110" class="elsevierStylePara elsevierViewall"><span class="elsevierStyleBold">Unforgeability</span> – only an unrevoked group member can create a valid signature on behalf of the group.</p></li><li class="elsevierStyleListItem" id="lsti0030"><span class="elsevierStyleLabel">•</span><p id="par0115" class="elsevierStylePara elsevierViewall"><span class="elsevierStyleBold">Anonymity</span> – a verifier is not able to determine the identity of a signer.</p></li><li class="elsevierStyleListItem" id="lsti0035"><span class="elsevierStyleLabel">•</span><p id="par0120" class="elsevierStylePara elsevierViewall"><span class="elsevierStyleBold">Complete anonymity</span> – if an attacker obtains a valid signature and knows <span class="elsevierStyleItalic">gpk</span> and all keys of group members' <span class="elsevierStyleItalic">gsk[i]</span>, he is not able to determine the identity of a signer.</p></li><li class="elsevierStyleListItem" id="lsti0040"><span class="elsevierStyleLabel">•</span><p id="par0125" class="elsevierStylePara elsevierViewall"><span class="elsevierStyleBold">Traceability</span> – all members can be tracked by the group manager or the revocation manager by member's signed message.</p></li><li class="elsevierStyleListItem" id="lsti0045"><span class="elsevierStyleLabel">•</span><p id="par0130" class="elsevierStylePara elsevierViewall"><span class="elsevierStyleBold">Unlinkability</span>- a verifier and other members are not able to link two signatures which have been signed by one member of the group.</p></li><li class="elsevierStyleListItem" id="lsti0050"><span class="elsevierStyleLabel">•</span><p id="par0135" class="elsevierStylePara elsevierViewall"><span class="elsevierStyleBold">Coalition-resistance</span> – it is impossible to create a valid signature by a subgroup of users.<a name="p23"></a></p></li><li class="elsevierStyleListItem" id="lsti0055"><span class="elsevierStyleLabel">•</span><p id="par0140" class="elsevierStylePara elsevierViewall"><span class="elsevierStyleBold">Exculpability</span> – even group manager is not able to create a valid signature of a group member.</p></li><li class="elsevierStyleListItem" id="lsti0060"><span class="elsevierStyleLabel">•</span><p id="par0145" class="elsevierStylePara elsevierViewall"><span class="elsevierStyleBold">Correctness</span> – every correct signature of the group member has to be always accepted during verification.</p></li><li class="elsevierStyleListItem" id="lsti0065"><span class="elsevierStyleLabel">•</span><p id="par0150" class="elsevierStylePara elsevierViewall"><span class="elsevierStyleBold">Revocation</span>-a revoked member is not able to create valid signatures on behalf of the group.</p></li><li class="elsevierStyleListItem" id="lsti0070"><span class="elsevierStyleLabel">•</span><p id="par0155" class="elsevierStylePara elsevierViewall"><span class="elsevierStyleBold">Differentiation of group members</span> – all members of the group must have a different <span class="elsevierStyleItalic">gsk[i]</span>.</p></li><li class="elsevierStyleListItem" id="lsti0075"><span class="elsevierStyleLabel">•</span><p id="par0160" class="elsevierStylePara elsevierViewall"><span class="elsevierStyleBold">Immediate-revocation</span> – if a group member is revoked, his capability of creating the group signatures is disabled immediately.</p></li></ul></p></span><span id="sec0025" class="elsevierStyleSection elsevierViewall"><span class="elsevierStyleLabel">5</span><span class="elsevierStyleSectionTitle" id="sect0035">Our solution</span><p id="par0165" class="elsevierStylePara elsevierViewall">In this chapter, we introduce our security solution for privacy-preserving cloud services. We outline our system model depicted in <a class="elsevierStyleCrossRef" href="#fig0005">Figure 1</a>, security requirements, cryptography background and cryptographic protocols.</p><elsevierMultimedia ident="fig0005"></elsevierMultimedia><span id="sec0030" class="elsevierStyleSection elsevierViewall"><span class="elsevierStyleLabel">5.1</span><span class="elsevierStyleSectionTitle" id="sect0040">System Model</span><p id="par0170" class="elsevierStylePara elsevierViewall">Our solution consists of three fundamental parties:</p><p id="par0175" class="elsevierStylePara elsevierViewall"><span class="elsevierStyleBold">Cloud Service Provider (CSP)</span>. CSP manages cloud services and shared storages. CSP isusually a company which behaves as a partly trusted party. CSP provides cloud services, authenticates users when they access a cloud service. CSP also issues access attributes to users. Nevertheless, when CSP needs to revoke and identify a malicious user then CSP must collaborate with a revocation manager.</p><p id="par0180" class="elsevierStylePara elsevierViewall"><span class="elsevierStyleBold">Revocation Manager (RM)</span>. RM is a partly trusted party, e.g. government authority, who decides if the revocation of a user identity is rightful or not. Only the cooperation between CSP and RM can reveal the user identity. RM also cooperates with CSP during user registration when the user's access attributes are issued.</p><p id="par0185" class="elsevierStylePara elsevierViewall"><span class="elsevierStyleBold">User (U)</span>. U is an ordinary customer who accesses into a cloud and uses cloud services, shared storages, etc. Users are anonymous if they properly follow the rules of CSP. To increase security, users use tamper-resistant devices or protected local storages.</p></span><span id="sec0035" class="elsevierStyleSection elsevierViewall"><span class="elsevierStyleLabel">5.2</span><span class="elsevierStyleSectionTitle" id="sect0045">Requirements</span><p id="par0190" class="elsevierStylePara elsevierViewall">Our solution provides the following security requirements: <ul class="elsevierStyleList" id="lis0015"><li class="elsevierStyleListItem" id="lsti0080"><span class="elsevierStyleLabel">•</span><p id="par0195" class="elsevierStylePara elsevierViewall"><span class="elsevierStyleItalic">Anonymity</span>. Every honest user stays anonymous when uses cloud services. User identities are hidden if users behave honestly and do not break rules.</p></li><li class="elsevierStyleListItem" id="lsti0085"><span class="elsevierStyleLabel">•</span><p id="par0200" class="elsevierStylePara elsevierViewall"><span class="elsevierStyleItalic">Confidentiality</span>. Every user's session to CSP is confidential. No one without a secret session key is able to obtain data transmitted between U and CSP.</p></li><li class="elsevierStyleListItem" id="lsti0090"><span class="elsevierStyleLabel">•</span><p id="par0205" class="elsevierStylePara elsevierViewall"><span class="elsevierStyleItalic">Integrity</span>. Data sent in user's session cannot be modified without a secret session key</p></li><li class="elsevierStyleListItem" id="lsti0095"><span class="elsevierStyleLabel">•</span><p id="par0210" class="elsevierStylePara elsevierViewall"><span class="elsevierStyleItalic">Unlinkability</span>. The user's sessions to cloud services are unlinkable. No one besides CSP collaborating with RM is able to link two or more sessions between a certain U and CSP.</p></li><li class="elsevierStyleListItem" id="lsti0100"><span class="elsevierStyleLabel">•</span><p id="par0215" class="elsevierStylePara elsevierViewall"><span class="elsevierStyleItalic">Untraceability</span>. Other users are unable to trace user's authentication and concrete users' communication.</p></li><li class="elsevierStyleListItem" id="lsti0105"><span class="elsevierStyleLabel">•</span><p id="par0220" class="elsevierStylePara elsevierViewall"><span class="elsevierStyleItalic">Revocation</span>. Every user can be revoked by the collaboration of CSP and RM.</p></li></ul></p></span><span id="sec0040" class="elsevierStyleSection elsevierViewall"><span class="elsevierStyleLabel">5.3</span><span class="elsevierStyleSectionTitle" id="sect0050">Cryptography Used</span><p id="par0225" class="elsevierStylePara elsevierViewall">In our solution, we use discrete logarithm commitments described in the work [<a class="elsevierStyleCrossRef" href="#bib0095">19</a>]. We have<a name="p24"></a> transformed the scheme [<a class="elsevierStyleCrossRef" href="#bib0095">19</a>] into a group signature scheme mode.Further, the solution employs Σ-protocols [<a class="elsevierStyleCrossRef" href="#bib0100">20</a>]to prove of discrete logarithm knowledge, representation and equivalence [<a class="elsevierStyleCrossRef" href="#bib0105">21</a>]. To revoke a user, we use the Okamoto-Uchiyama Trapdoor One-Way Function described in [<a class="elsevierStyleCrossRef" href="#bib0110">22</a>]. For more details about the used basic cryptographic blocks see prior works [<a class="elsevierStyleCrossRef" href="#bib0095">19</a>] and [<a class="elsevierStyleCrossRef" href="#bib0115">23</a>].</p></span></span><span id="sec0045" class="elsevierStyleSection elsevierViewall"><span class="elsevierStyleLabel">6</span><span class="elsevierStyleSectionTitle" id="sect0055">Ourproposed protocol</span><p id="par0230" class="elsevierStylePara elsevierViewall">Our protocol consists of five phases: initialization, registration, anonymous access, secure communication and revocation. The basic principle of the proposed protocol is depicted in <a class="elsevierStyleCrossRef" href="#fig0010">Figure 2</a>.</p><elsevierMultimedia ident="fig0010"></elsevierMultimedia><p id="par0235" class="elsevierStylePara elsevierViewall">• {tc “1 The Basic Principle of the Proposed Protocol.” \f f}</p><span id="sec0050" class="elsevierStyleSection elsevierViewall"><span class="elsevierStyleLabel">6.1</span><span class="elsevierStyleSectionTitle" id="sect0060">Initialization</span><p id="par0240" class="elsevierStylePara elsevierViewall">The initialization phase is run by Cloud Service Provider (CSP) and Revocation Manager (RM). CSP generates a group <span class="elsevierStyleItalic">H</span> defined by a large prime modulus <span class="elsevierStyleItalic">p</span>, generators <span class="elsevierStyleItalic">h</span><span class="elsevierStyleInf">1</span>, <span class="elsevierStyleItalic">h</span><span class="elsevierStyleInf">2</span> of prime order <span class="elsevierStyleItalic">q</span> and <span class="elsevierStyleItalic">q</span>|<span class="elsevierStyleItalic">p</span> - 1. CSP generates a RSA key pair and stores own private key <span class="elsevierStyleItalic">K</span><span class="elsevierStyleInf">CSP</span>.</p><p id="par0245" class="elsevierStylePara elsevierViewall">M generates a group <span class="elsevierStyleItalic">G</span> defined by a large modulus <span class="elsevierStyleItalic">n</span><span class="elsevierStyleHsp" style=""></span>=<span class="elsevierStyleHsp" style=""></span><span class="elsevierStyleItalic">r</span><span class="elsevierStyleSup">2</span><span class="elsevierStyleItalic">s</span> where <span class="elsevierStyleItalic">r</span><span class="elsevierStyleHsp" style=""></span>=<span class="elsevierStyleHsp" style=""></span>2<span class="elsevierStyleItalic">r</span>′<span class="elsevierStyleHsp" style=""></span>+<span class="elsevierStyleHsp" style=""></span>1, <span class="elsevierStyleItalic">s</span><span class="elsevierStyleHsp" style=""></span>=<span class="elsevierStyleHsp" style=""></span>2<span class="elsevierStyleItalic">s</span>′<span class="elsevierStyleHsp" style=""></span>+<span class="elsevierStyleHsp" style=""></span>1 and <span class="elsevierStyleItalic">r</span>,<span class="elsevierStyleItalic">s</span>,<span class="elsevierStyleItalic">r</span>′,<span class="elsevierStyleItalic">s</span>′ are large primes. RM also generates a generator g1∈Rℤn* of orderord(<span class="elsevierStyleItalic">g</span><span class="elsevierStyleInf">1</span><span class="elsevierStyleItalic">modr</span><span class="elsevierStyleSup">2</span>) = <span class="elsevierStyleItalic">r</span>(<span class="elsevierStyleItalic">r</span> - 1) in ℤr2* and <span class="elsevierStyleItalic">ord</span>(<span class="elsevierStyleItalic">g</span><span class="elsevierStyleInf">1</span>) = <span class="elsevierStyleItalic">rr</span>′<span class="elsevierStyleItalic">s</span>′ in ℤn* and randomly chooses secret values <span class="elsevierStyleItalic">S</span><span class="elsevierStyleInf">1</span>,<span class="elsevierStyleItalic">S</span><span class="elsevierStyleInf">2</span>,<span class="elsevierStyleItalic">S</span><span class="elsevierStyleInf">3</span>. RM computes authentication proof Aproof=g1S1<span class="elsevierStyleItalic">mod n</span> which is public and common for all entities in system. In our solution, the RM is able to issue more types of authentication proofs Aproof1…AproofN derived from S11…S1N that are related to different user rights in cloud services.</p><p id="par0250" class="elsevierStylePara elsevierViewall">Finally, RM computes generators g2=g1S2mod nandg3=g1S3mod n and stores secret values<span class="elsevierStyleItalic">r</span>,<span class="elsevierStyleItalic">s</span>as revocation key <span class="elsevierStyleItalic">K</span><span class="elsevierStyleInf">RK</span>.</p><p id="par0255" class="elsevierStylePara elsevierViewall">All public cryptographic parameters <span class="elsevierStyleItalic">q</span>,<span class="elsevierStyleItalic">p</span>,<span class="elsevierStyleItalic">n</span>,<span class="elsevierStyleItalic">g</span><span class="elsevierStyleInf">1</span>,<span class="elsevierStyleItalic">g</span><span class="elsevierStyleInf">2</span>,<span class="elsevierStyleItalic">g</span><span class="elsevierStyleInf">3</span>,<span class="elsevierStyleItalic">h</span><span class="elsevierStyleInf">1</span>,<span class="elsevierStyleItalic">h</span><span class="elsevierStyleInf">2</span>,<span class="elsevierStyleItalic">A</span><span class="elsevierStyleInf"><span class="elsevierStyleItalic">proof</span></span> are published and shared.<a name="p25"></a></p></span><span id="sec0055" class="elsevierStyleSection elsevierViewall"><span class="elsevierStyleLabel">6.2</span><span class="elsevierStyleSectionTitle" id="sect0065">Registration</span><p id="par0260" class="elsevierStylePara elsevierViewall">In the registration phase, a user registers and requests a user master key which they use in anonymous access to cloud services.</p><p id="par0265" class="elsevierStylePara elsevierViewall">Firstly, U must physically register on CSP. CSP checks user's ID. Then, U generates secret values <span class="elsevierStyleItalic">ω</span><span class="elsevierStyleInf">1</span>,<span class="elsevierStyleItalic">ω</span><span class="elsevierStyleInf">2</span> and makes the commitment: CCSP=h1ω1h2ω2mod p. U digitally signs <span class="elsevierStyleItalic">C</span><span class="elsevierStyleInf"><span class="elsevierStyleItalic">csp</span></span>, e.g. by RSA, and sends this signature <span class="elsevierStyleItalic">Sig</span><span class="elsevierStyleInf"><span class="elsevierStyleItalic">u</span></span>(<span class="elsevierStyleItalic">C</span><span class="elsevierStyleInf"><span class="elsevierStyleItalic">CSP</span></span>) with the construction of correctness proof PK{<span class="elsevierStyleItalic">ω</span><span class="elsevierStyleInf">1</span>,<span class="elsevierStyleItalic">ω</span><span class="elsevierStyleInf">2</span>: <span class="elsevierStyleItalic">C</span><span class="elsevierStyleInf"><span class="elsevierStyleItalic">CSP</span></span> = <span class="elsevierStyleItalic">h1ω1h2ω2</span> to CSP, by notation of Camenisch and Stadler [<a class="elsevierStyleCrossRef" href="#bib0105">21</a>]. CSP checks the user's proof and the signature. Then, CSP stores the pair<span class="elsevierStyleItalic">C</span><span class="elsevierStyleInf"><span class="elsevierStyleItalic">CSP</span></span>,<span class="elsevierStyleItalic">Sig</span><span class="elsevierStyleInf">u</span>(<span class="elsevierStyleItalic">C</span><span class="elsevierStyleInf"><span class="elsevierStyleItalic">CSP</span></span>), signs the commitment <span class="elsevierStyleItalic">Sig</span><span class="elsevierStyleInf"><span class="elsevierStyleItalic">CSP</span></span>(<span class="elsevierStyleItalic">C</span><span class="elsevierStyleInf"><span class="elsevierStyleItalic">CSP</span></span>)and sends it back to U.</p><p id="par0270" class="elsevierStylePara elsevierViewall">Secondly, U requests a user master key from RM. U computesA′proof=g1ω1g2ω2 mod n and sends it with <span class="elsevierStyleItalic">C</span><span class="elsevierStyleInf"><span class="elsevierStyleItalic">CSP</span></span>,<span class="elsevierStyleItalic">Sig</span><span class="elsevierStyleInf"><span class="elsevierStyleItalic">CSP</span></span>(<span class="elsevierStyleItalic">C</span><span class="elsevierStyleInf"><span class="elsevierStyleItalic">CSP</span></span>) and the construction of correctness proof PK{ω1,ω2:CCSP=h1ω1h2ω2∧A′proof=g1ω1g2ω2 to RM. RM checks the proof, CSP's signature<span class="elsevierStyleItalic">Sig</span><span class="elsevierStyleInf"><span class="elsevierStyleItalic">csp</span></span>(<span class="elsevierStyleItalic">C</span><span class="elsevierStyleInf"><span class="elsevierStyleItalic">CSP</span></span>) and computes a secret contribution <span class="elsevierStyleItalic">ω</span><span class="elsevierStyleInf"><span class="elsevierStyleItalic">RM</span></span> such that Aproof=g1ω1g2ω2g3ωRM mod n holds. After this step, U obtains own user master key <span class="elsevierStyleItalic">K</span><span class="elsevierStyleInf"><span class="elsevierStyleItalic">u</span></span> which is triplet(<span class="elsevierStyleItalic">ω</span><span class="elsevierStyleInf">1</span>,<span class="elsevierStyleItalic">ω</span><span class="elsevierStyleInf">2</span>,<span class="elsevierStyleItalic">ω</span><span class="elsevierStyleInf">RM</span>). U gets value <span class="elsevierStyleItalic">ω</span><span class="elsevierStyleInf"><span class="elsevierStyleItalic">RM</span></span> only with cooperation with RM which knows the factorization of <span class="elsevierStyleItalic">n</span>. To prevent the collusion attack, user's <span class="elsevierStyleItalic">ω</span><span class="elsevierStyleInf">1</span>,<span class="elsevierStyleItalic">ω</span><span class="elsevierStyleInf">2</span> is not visible outwardly to a user because <span class="elsevierStyleItalic">ω</span><span class="elsevierStyleInf">1</span>,<span class="elsevierStyleItalic">ω</span><span class="elsevierStyleInf">2</span> is stored in a tamper-resistant memory. This device which stores the user secret key should be also protected against a key estimation by side channel attacks, such as in [<a class="elsevierStyleCrossRef" href="#bib0120">24</a>]. Further, U cannot make own user master key because only RM knows <span class="elsevierStyleItalic">K</span><span class="elsevierStyleInf"><span class="elsevierStyleItalic">RK</span></span>. Any honest user can repeat the request for the user master key or demand other authentication proofs if CSP agrees with that.</p></span><span id="sec0060" class="elsevierStyleSection elsevierViewall"><span class="elsevierStyleLabel">6.3</span><span class="elsevierStyleSectionTitle" id="sect0070">Anonymous Access</span><p id="par0275" class="elsevierStylePara elsevierViewall">In this phase, the <span class="elsevierStyleItalic">i</span>-th user <span class="elsevierStyleItalic">U</span><span class="elsevierStyleInf"><span class="elsevierStyleItalic">i</span></span> anonymously accesses Cloud Service Provider (CSP). This phase consists of two-messages used to authenticate <span class="elsevierStyleItalic">U</span><span class="elsevierStyleInf"><span class="elsevierStyleItalic">i</span></span> and establish a secret key between <span class="elsevierStyleItalic">U</span><span class="elsevierStyleInf"><span class="elsevierStyleItalic">i</span></span> and CSP.</p><p id="par0280" class="elsevierStylePara elsevierViewall"><ul class="elsevierStyleList" id="lis0020"><li class="elsevierStyleListItem" id="lsti0110"><span class="elsevierStyleLabel">•</span><p id="par0285" class="elsevierStylePara elsevierViewall"><span class="elsevierStyleItalic">U</span><span class="elsevierStyleInf"><span class="elsevierStyleItalic">i</span></span> generates a random value andom∈R{0,1}lsym. The parameter <span class="elsevierStyleItalic">l</span><span class="elsevierStyleInf"><span class="elsevierStyleItalic">sym</span></span> denotes the size of a shared secret key for the symmetric cipher.</p></li><li class="elsevierStyleListItem" id="lsti0115"><span class="elsevierStyleLabel">•</span><p id="par0290" class="elsevierStylePara elsevierViewall"><span class="elsevierStyleItalic">U</span><span class="elsevierStyleInf"><span class="elsevierStyleItalic">i</span></span> encrypts<span class="elsevierStyleItalic">random</span> by the RSA public key of CSP.</p></li><li class="elsevierStyleListItem" id="lsti0120"><span class="elsevierStyleLabel">•</span><p id="par0295" class="elsevierStylePara elsevierViewall">The encrypted Enc_PK_server(<span class="elsevierStyleItalic">random</span>) is signed by the <span class="elsevierStyleBold">Auth_proof_sign</span> algorithm in the group signature modewhich ensures user anonymous authentication. We assume that cryptographic parameters such as <span class="elsevierStyleItalic">q</span>,<span class="elsevierStyleItalic">p</span>,<span class="elsevierStyleItalic">n</span>,<span class="elsevierStyleItalic">g</span><span class="elsevierStyleInf">1</span>,<span class="elsevierStyleItalic">g</span><span class="elsevierStyleInf">2</span>,<span class="elsevierStyleItalic">g</span>3,<span class="elsevierStyleItalic">h</span><span class="elsevierStyleInf">1</span>,<span class="elsevierStyleItalic">h</span><span class="elsevierStyleInf">2</span> and authentication proof Aproof=g1ω1g2ω2g3ωRM mod n are made public and <span class="elsevierStyleItalic">ℋ</span> is a secure hash function. To prove the knowledge of the secret user key and sign<span class="elsevierStyleItalic">random</span>, <span class="elsevierStyleItalic">U</span><span class="elsevierStyleInf"><span class="elsevierStyleItalic">i</span></span> performs the <span class="elsevierStyleBold">Auth_proof_sign</span> algorithm: <elsevierMultimedia ident="eq0005"></elsevierMultimedia></p></li></ul></p><p id="par0300" class="elsevierStylePara elsevierViewall">Finally, the signature elements A,A¯,Aproof¯C1,C2,C1¯,C2¯,z1,z2,z3,zs, Enc_PK_server(<span class="elsevierStyleItalic">random</span>) are sent to CSP as a request message.</p><p id="par0305" class="elsevierStylePara elsevierViewall"><ul class="elsevierStyleList" id="lis0025"><li class="elsevierStyleListItem" id="lsti0125"><span class="elsevierStyleLabel">•</span><p id="par0900" class="elsevierStylePara elsevierViewall">CSP verifies the signed request message that consists of the signature elements: Enc_PK_server(<span class="elsevierStyleItalic">random</span>),A,A¯,Aproof¯,C1,C2,C1¯,C2¯,z1,z2,z3,zs,<a name="p26"></a>. Then, CSP does the <span class="elsevierStyleBold">Auth_proof_verify</span> algorithm: <elsevierMultimedia ident="eq0010"></elsevierMultimedia></p></li></ul></p><p id="par0310" class="elsevierStylePara elsevierViewall">If above equations hold then CSP continues in the next step. Otherwise, CSP stops the algorithm. <ul class="elsevierStyleList" id="lis0030"><li class="elsevierStyleListItem" id="lsti0130"><span class="elsevierStyleLabel">•</span><p id="par0315" class="elsevierStylePara elsevierViewall">CSP decrypts a value Enc_PK_server (<span class="elsevierStyleItalic">random</span>) by its RSA private key to obtain <span class="elsevierStyleItalic">random</span>.</p></li><li class="elsevierStyleListItem" id="lsti0135"><span class="elsevierStyleLabel">•</span><p id="par0320" class="elsevierStylePara elsevierViewall">CSP randomly generates shared secret key K_sym and uses eXclusive OR (XOR) function to compute <span class="elsevierStyleItalic">random</span>⊕<span class="elsevierStyleItalic">K</span>_sym.</p></li><li class="elsevierStyleListItem" id="lsti0140"><span class="elsevierStyleLabel">•</span><p id="par0325" class="elsevierStylePara elsevierViewall">CSP sends a response message (<span class="elsevierStyleItalic">random</span>⊕<span class="elsevierStyleItalic">K</span>_sym) back to <span class="elsevierStyleItalic">U</span><span class="elsevierStyleInf"><span class="elsevierStyleItalic">i</span></span>.</p></li></ul></p></span><span id="sec0065" class="elsevierStyleSection elsevierViewall"><span class="elsevierStyleLabel">6.4</span><span class="elsevierStyleSectionTitle" id="sect0075">Secure Communication</span><p id="par0330" class="elsevierStylePara elsevierViewall">If the anonymous access phase is successful, the user <span class="elsevierStyleItalic">U</span><span class="elsevierStyleInf"><span class="elsevierStyleItalic">i</span></span> can upload and download data from CSP. Data confidentiality and integrity are secured by a symmetric cipher. We propose to use AES which is well know cipher and is supported by many types of software and hardware platforms. To encrypt and decrypt transmitted data, <span class="elsevierStyleItalic">U</span><span class="elsevierStyleInf"><span class="elsevierStyleItalic">i</span></span> and CSP use the AES secret key <span class="elsevierStyleItalic">K</span>_sym established in the previous phase.</p></span><span id="sec0070" class="elsevierStyleSection elsevierViewall"><span class="elsevierStyleLabel">6.5</span><span class="elsevierStyleSectionTitle" id="sect0080">Revocation</span><p id="par0335" class="elsevierStylePara elsevierViewall">Depending on the case of rule breaking, the revocation phase can revoke a user and/or user anonymity.</p><p id="par0340" class="elsevierStylePara elsevierViewall">If users misuse a cloud service, they get revoked by RM. Because RM knows the factorization of <span class="elsevierStyleItalic">n</span>, RM is able to extractω<span class="elsevierStyleInf"><span class="elsevierStyleItalic">RM</span></span>. Firstly, RM extracts the random session value <span class="elsevierStyleItalic">K</span><span class="elsevierStyleInf"><span class="elsevierStyleItalic">S</span></span> from <span class="elsevierStyleItalic">C</span><span class="elsevierStyleInf"><span class="elsevierStyleItalic">2</span></span> and the secret RM contribution value <span class="elsevierStyleItalic">ω</span><span class="elsevierStyleInf"><span class="elsevierStyleItalic">RM</span></span> from <span class="elsevierStyleItalic">C</span><span class="elsevierStyleInf">1</span>.</p><p id="par0345" class="elsevierStylePara elsevierViewall">Then, RM publishes ω<span class="elsevierStyleInf"><span class="elsevierStyleItalic">RM</span></span> into a public blacklist. If the user uses revoked key then the equation C1≡C2ωRMmodn holds and the user access to cloud services is denied.</p><p id="par0350" class="elsevierStylePara elsevierViewall">If a malicious user breaks the rules of CSP, this user can be identified by the collaboration of RM and CSP. Firstly, RM extracts <span class="elsevierStyleItalic">ω</span><span class="elsevierStyleInf"><span class="elsevierStyleItalic">RM</span></span> from the suspected session received by CSP. Then, RM finds the corresponding <span class="elsevierStyleItalic">C</span><span class="elsevierStyleInf"><span class="elsevierStyleItalic">CSP</span></span> in the database. If CSP provides to RM the explicit evidence of user's breach, then RM sends <span class="elsevierStyleItalic">C</span><span class="elsevierStyleInf"><span class="elsevierStyleItalic">CSP</span></span> to CSP. CSP is able to open the identity of a user from database but only with RM's help.</p></span></span><span id="sec0075" class="elsevierStyleSection elsevierViewall"><span class="elsevierStyleLabel">7</span><span class="elsevierStyleSectionTitle" id="sect0085">Experimental results</span><p id="par0355" class="elsevierStylePara elsevierViewall">In this section, we outline the experimental results of our solution. We compare our solution with related solutions and output the performance evaluation.</p><span id="sec0080" class="elsevierStyleSection elsevierViewall"><span class="elsevierStyleLabel">7.1</span><span class="elsevierStyleSectionTitle" id="sect0090">Performance Evaluation of Our Solution</span><p id="par0360" class="elsevierStylePara elsevierViewall">We have implemented our proposed solution in JAVA. In practice, we expect that U as an end node uses devices with reasonable computational power such as a personal computer, a laptop, a tablet or a smartphone. On the other hand, we assume that CSP keeps servers with sufficient computational capacity to ensure hundreds sessions with end nodes in real time. We have tested our solution on a machine with Intel(R) Xeon(R) CPU X3440 @ 2.53GHz, 4 GB Ram. In our a proof-of-concept implementation, we choose the 1024-bit length of modulo. The main important part of our solution is the Anonymous Access phase. In this phase, a user (U) communicate with a Cloud Service Provider (CSP). The computation process on the user side is marked as the Sing/Authenticate process. The computation process on the CSP side is marked as the Verify process. We have measured the total time of the Sing/Authenticate process and the Verify process. In the Verify process, <a class="elsevierStyleCrossRef" href="#tbl0010">Table 2</a> shows two scenarios: with an empty black list and with the black list that contains the revoked values <span class="elsevierStyleItalic">rev</span><span class="elsevierStyleHsp" style=""></span>=<span class="elsevierStyleHsp" style=""></span>10. The influence of the size of blacklist on the total time of the Verify process is depicted in <a class="elsevierStyleCrossRef" href="#fig0015">Figure 3</a>.<a name="p27"></a></p><elsevierMultimedia ident="tbl0010"></elsevierMultimedia><elsevierMultimedia ident="fig0015"></elsevierMultimedia></span><span id="sec0085" class="elsevierStyleSection elsevierViewall"><span class="elsevierStyleLabel">7.2</span><span class="elsevierStyleSectionTitle" id="sect0095">Comparison with Related Work</span><p id="par0365" class="elsevierStylePara elsevierViewall">We compare our Anonymous Access phase with the authentication phase of related solutions: Blantom solution [<a class="elsevierStyleCrossRef" href="#bib0060">12</a>], Lu et al. solution [<a class="elsevierStyleCrossRef" href="#bib0065">13</a>] and Chow et al. solution [<a class="elsevierStyleCrossRef" href="#bib0070">14</a>]. To ensure objectivity, we compare the number of atomical cryptographic and math operations for each solution.</p><p id="par0370" class="elsevierStylePara elsevierViewall">Firstly, we compare the Sign/Authenticate process that runs on the user side. In the Sign/Authenticate process, Lu et al. solution [<a class="elsevierStyleCrossRef" href="#bib0065">13</a>] takes 14 exp + 10<span class="elsevierStyleHsp" style=""></span>mul, Chow et al. solution [<a class="elsevierStyleCrossRef" href="#bib0070">14</a>] takes 14 exp + 15<span class="elsevierStyleHsp" style=""></span>mul and Blantom's solution [<a class="elsevierStyleCrossRef" href="#bib0060">12</a>]takes tens of pairing and exponentiation operations. The number of operations in Blantom's solution [<a class="elsevierStyleCrossRef" href="#bib0060">12</a>] depends on the subscription type and is variable. Our Sign/Authenticate process takes only 8 exp + 5<span class="elsevierStyleHsp" style=""></span>mul and is the most efficient from compared solutions.</p><p id="par0375" class="elsevierStylePara elsevierViewall">The Verify process on the CSP side has 10 exp + 6<span class="elsevierStyleHsp" style=""></span>mul in our solution. We emphasize that our solution has 0 paring operations. Lu et al. solution [<a class="elsevierStyleCrossRef" href="#bib0065">13</a>], Chow et al. solution [<a class="elsevierStyleCrossRef" href="#bib0070">14</a>] and Blantom solution [<a class="elsevierStyleCrossRef" href="#bib0060">12</a>] are pairing based and contain 6 pairing operations in the Verify process. <a class="elsevierStyleCrossRef" href="#fig0020">Figure 4</a> depicts the performance of the verifyprocess of our and related solutions. The verify process of our solution is more efficient than related solutions in this comparison and takes only 28 % of the total time of Lu et al. solution [<a class="elsevierStyleCrossRef" href="#bib0065">13</a>] or Chow et al. solution [<a class="elsevierStyleCrossRef" href="#bib0070">14</a>].<a name="p28"></a></p><elsevierMultimedia ident="fig0020"></elsevierMultimedia></span><span id="sec0090" class="elsevierStyleSection elsevierViewall"><span class="elsevierStyleLabel">7.3</span><span class="elsevierStyleSectionTitle" id="sect0100">Comparison of our group signature scheme with the related work</span><p id="par0380" class="elsevierStylePara elsevierViewall">In this section, we analyze group signature schemes from open literatureandcompare them with ourgroup signature schemeused in our proposal, see <a class="elsevierStyleCrossRef" href="#tbl0015">Table 3</a>. In the following part, we analyze group signature schemes and describe their evolution.</p><elsevierMultimedia ident="tbl0015"></elsevierMultimedia><p id="par0385" class="elsevierStylePara elsevierViewall">Group signatures were introduced and first four schemes were presented in the work CHH91[<a class="elsevierStyleCrossRef" href="#bib0040">8</a>] in 1991. The main disadvantage of these schemes is long sizes of a group public key <span class="elsevierStyleItalic">gpk</span> and a signature. Sizes depend on the number of members in a group. If a new member is added to the group, it is necessary to modify <span class="elsevierStyleItalic">gpk</span>. These deficiencies are very impractical for large groups of members. Therefore, these schemes are not suitable in cloud services. In the work CS97[<a class="elsevierStyleCrossRef" href="#bib0130">26</a>], published in 1997, authors propose a scheme which using the constant size of <span class="elsevierStyleItalic">gpk</span> and signatures. New members can be added to the group without the need to generate a new key pair <span class="elsevierStyleItalic">gpk</span> and <span class="elsevierStyleItalic">gsk[i]</span>. The paper ACJT00[<a class="elsevierStyleCrossRef" href="#bib0135">27</a>], introduced in 2000, presents an efficient scheme which is resistant of coalition, i.e. it is impossible for a subset of the group members including the group manager to create a valid signature. The disadvantage of the scheme is missing of the revocation of group members and prevention to a revoked member generates the valid signatures on behalf of the group. The work AST02 [<a class="elsevierStyleCrossRef" href="#bib0140">28</a>], published in 2002, is based on the scheme ACJT00 [<a class="elsevierStyleCrossRef" href="#bib0135">27</a>] and adds the revocation of the group members without using a time stamp. This approach keeps a constant length of a signature, i.e. this length does not increase linearly with the number of revoked members. However, the scheme has more operations in signing and verification phases than related schemes.The scheme TX03 [<a class="elsevierStyleCrossRef" href="#bib0145">29</a>], published in 2003, provides the dynamic revocation of group members. Revoked members are no longer able to create a valid signature. On the other hand, the disadvantage is that, <span class="elsevierStyleItalic">gpk</span> has to be recalculated when a member is added to the group or remove from the group. This approach is highly inefficient in the real time systems working with large groups. The schemes BS04 [<a class="elsevierStyleCrossRef" href="#bib0150">30</a>] and BBS04 [<a class="elsevierStyleCrossRef" href="#bib0155">31</a>], published in 2004, allow to create short group signatures. These schemes are based on bilinear maps and produce short signatures which are suitable in systems where bandwidth is restricted.Unless as the previous schemes that are secure in the random oracle model, the scheme BMW03 [<a class="elsevierStyleCrossRef" href="#bib0160">32</a>], introduced in 2003, is secure in the standard model. Nevertheless, the scheme is designed for the static<a name="p29"></a> and small groups of users. Therefore, this scheme is not proper for cloud services.</p><p id="par0390" class="elsevierStylePara elsevierViewall">The scheme ACHM05 [<a class="elsevierStyleCrossRef" href="#bib0165">33</a>], introduced in 2005, is provable secure in the standard model and works with dynamic groups. The scheme provides anonymity, unforgeability, untraceability and exculpability, and is secure against a non-adaptive adversary who does not have <span class="elsevierStyleItalic">gsk[i]</span> of group members. The scheme BW06 [<a class="elsevierStyleCrossRef" href="#bib0075">15</a>] provides the provable security in the standard model. But, the size of the signature depends on the size of the group. The newer scheme BW07 [<a class="elsevierStyleCrossRef" href="#bib0090">18</a>], introduced in 2007, produces shorter and almost constantly sized signature in comparison with the previous schemes. The length of a signature increases logarithmically as the size of the group.</p><p id="par0395" class="elsevierStylePara elsevierViewall">The scheme LCSL07 [<a class="elsevierStyleCrossRef" href="#bib0170">34</a>] produces short signatures with constant lengths. This scheme offers full anonymity and full traceability, and the public key and signatures are shorter than in the previous schemes. The scheme G07 [<a class="elsevierStyleCrossRef" href="#bib0175">35</a>], published in 2007, ensures full anonymity in the standard model. The scheme is based on bilinear groups and produces the constant lengths of keys and signatures. The scheme also supports the dynamic addition of new members to the group.<a name="p30"></a></p><p id="par0400" class="elsevierStylePara elsevierViewall">We compare our scheme with the group signature schemes in <a class="elsevierStyleCrossRef" href="#tbl0015">Table 3</a>. Our scheme is based on non-bilinear assumptions and has only 10 exponentiations and 8 multiplications in the verification phase. Our scheme clearly outperforms the related schemes. The operations are abbreviated as bp- bilinearpairings, e - exponentiation, mul- multiplication, div - division, add - addition (subtraction), H-hash, k- length of identities in bits, m - length of message in bits, RL- members in a revocation list, EF - efficiently computable isomorphism from G2 to G1, T - the total time of a period.</p></span></span><span id="sec0095" class="elsevierStyleSection elsevierViewall"><span class="elsevierStyleLabel">8</span><span class="elsevierStyleSectionTitle" id="sect0105">Conclusion</span><p id="par0405" class="elsevierStylePara elsevierViewall">In this paper, we present our novel security solution for privacy-preserving cloud services. We propose the non-bilinear group signaturesscheme to ensure the anonymous authentication of cloud service clients. Our novel solution offers user anonymity in the authentication phase, data integrity and confidentiality and the fair revocation process for all users. Users use tamper resistant devices during the generation and storing of user keys to protect against collusion attacks.</p><p id="par0410" class="elsevierStylePara elsevierViewall">Our authentication phase, which is based on the non-bilinear group signature scheme, is more efficient than related solutions on the client side and also on the server side due to missing expensive bilinear pairing operations and fewer exponentiation operations.Thus, cloud service providers using our solution can authenticate more clients in the same time. We also analyze related group signature schemes. The group signature scheme used in our solution is more efficient than related group signature schemes in the verification phase and provides the efficient privacy-preserving access to cloud services.</p></span></span>" "textoCompletoSecciones" => array:1 [ "secciones" => array:12 [ 0 => array:3 [ "identificador" => "xres472012" "titulo" => "Abstract" "secciones" => array:1 [ 0 => array:1 [ "identificador" => "abst0005" ] ] ] 1 => array:2 [ "identificador" => "xpalclavsec494452" "titulo" => "Keywords" ] 2 => array:2 [ "identificador" => "sec0005" "titulo" => "Introduction" ] 3 => array:2 [ "identificador" => "sec0010" "titulo" => "Related work" ] 4 => array:2 [ "identificador" => "sec0015" "titulo" => "Performance analysis of cryptographic privacy-preserving solutions used in cloud computing" ] 5 => array:2 [ "identificador" => "sec0020" "titulo" => "Group signatures as a basic part in privacy enhancing cloud services" ] 6 => array:3 [ "identificador" => "sec0025" "titulo" => "Our solution" "secciones" => array:3 [ 0 => array:2 [ "identificador" => "sec0030" "titulo" => "System Model" ] 1 => array:2 [ "identificador" => "sec0035" "titulo" => "Requirements" ] 2 => array:2 [ "identificador" => "sec0040" "titulo" => "Cryptography Used" ] ] ] 7 => array:3 [ "identificador" => "sec0045" "titulo" => "Ourproposed protocol" "secciones" => array:5 [ 0 => array:2 [ "identificador" => "sec0050" "titulo" => "Initialization" ] 1 => array:2 [ "identificador" => "sec0055" "titulo" => "Registration" ] 2 => array:2 [ "identificador" => "sec0060" "titulo" => "Anonymous Access" ] 3 => array:2 [ "identificador" => "sec0065" "titulo" => "Secure Communication" ] 4 => array:2 [ "identificador" => "sec0070" "titulo" => "Revocation" ] ] ] 8 => array:3 [ "identificador" => "sec0075" "titulo" => "Experimental results" "secciones" => array:3 [ 0 => array:2 [ "identificador" => "sec0080" "titulo" => "Performance Evaluation of Our Solution" ] 1 => array:2 [ "identificador" => "sec0085" "titulo" => "Comparison with Related Work" ] 2 => array:2 [ "identificador" => "sec0090" "titulo" => "Comparison of our group signature scheme with the related work" ] ] ] 9 => array:2 [ "identificador" => "sec0095" "titulo" => "Conclusion" ] 10 => array:2 [ "identificador" => "xack143103" "titulo" => "Acknowledgments" ] 11 => array:1 [ "titulo" => "References" ] ] ] "pdfFichero" => "main.pdf" "tienePdf" => true "PalabrasClave" => array:1 [ "en" => array:1 [ 0 => array:4 [ "clase" => "keyword" "titulo" => "Keywords" "identificador" => "xpalclavsec494452" "palabras" => array:7 [ 0 => "Anonymous authentication" 1 => "Cloud services" 2 => "Cryptography" 3 => "Encryption" 4 => "Group signatures" 5 => "Privacy" 6 => "Security" ] ] ] ] "tieneResumen" => true "resumen" => array:1 [ "en" => array:2 [ "titulo" => "Abstract" "resumen" => "<span id="abst0005" class="elsevierStyleSection elsevierViewall"><p id="spar0040" class="elsevierStyleSimplePara elsevierViewall">We propose a novel privacy-preserving security solution for cloud services. Our solution is based on an efficient non-bilinear group signature scheme providing the anonymous access to cloud services and shared storage servers. The novel solution offers anonymous authenticationfor registered users. Thus, users' personal attributes (age, valid registration, successful payment) can be proven without revealing users' identity, and users can use cloud services without any threat of profiling their behavior. However, if a user breaks provider's rules, his access right is revoked. Our solution provides anonymous access, unlinkability and the confidentiality of transmitted data. We implement our solution as a proof of concept applicationand present the experimental results. Further, we analyzecurrent privacy preserving solutions for cloud services and group signature schemes as basic parts of privacy enhancing solutions in cloud services. We compare the performance of our solution with the related solutionsand schemes.</p></span>" ] ] "multimedia" => array:9 [ 0 => array:7 [ "identificador" => "fig0005" "etiqueta" => "Figure 1" "tipo" => "MULTIMEDIAFIGURA" "mostrarFloat" => true "mostrarDisplay" => false "figura" => array:1 [ 0 => array:4 [ "imagen" => "gr1.jpeg" "Alto" => 658 "Ancho" => 919 "Tamanyo" => 92984 ] ] "descripcion" => array:1 [ "en" => "<p id="spar0005" class="elsevierStyleSimplePara elsevierViewall">System model</p>" ] ] 1 => array:7 [ "identificador" => "fig0010" "etiqueta" => "Figure 2" "tipo" => "MULTIMEDIAFIGURA" "mostrarFloat" => true "mostrarDisplay" => false "figura" => array:1 [ 0 => array:4 [ "imagen" => "gr2.jpeg" "Alto" => 973 "Ancho" => 1410 "Tamanyo" => 115149 ] ] "descripcion" => array:1 [ "en" => "<p id="spar0010" class="elsevierStyleSimplePara elsevierViewall">The basic principle of the proposed protocol</p>" ] ] 2 => array:7 [ "identificador" => "fig0015" "etiqueta" => "Figure 3" "tipo" => "MULTIMEDIAFIGURA" "mostrarFloat" => true "mostrarDisplay" => false "figura" => array:1 [ 0 => array:4 [ "imagen" => "gr3.jpeg" "Alto" => 949 "Ancho" => 1168 "Tamanyo" => 94324 ] ] "descripcion" => array:1 [ "en" => "<p id="spar0015" class="elsevierStyleSimplePara elsevierViewall">Influence of the length of the blacklist on the total time of verification.</p>" ] ] 3 => array:7 [ "identificador" => "fig0020" "etiqueta" => "Figure 4" "tipo" => "MULTIMEDIAFIGURA" "mostrarFloat" => true "mostrarDisplay" => false "figura" => array:1 [ 0 => array:4 [ "imagen" => "gr4.jpeg" "Alto" => 891 "Ancho" => 1205 "Tamanyo" => 81888 ] ] "descripcion" => array:1 [ "en" => "<p id="spar0020" class="elsevierStyleSimplePara elsevierViewall">Performance of the verify process.</p>" ] ] 4 => array:7 [ "identificador" => "tbl0005" "etiqueta" => "Table 1" "tipo" => "MULTIMEDIATABLA" "mostrarFloat" => true "mostrarDisplay" => false "tabla" => array:1 [ "tablatextoimagen" => array:1 [ 0 => array:2 [ "tabla" => array:1 [ 0 => """ <table border="0" frame="\n \t\t\t\t\tvoid\n \t\t\t\t" class=""><thead title="thead"><tr title="table-row"><th class="td" title="table-head " align="left" valign="bottom" scope="col" style="border-bottom: 2px solid black">Solutions: \t\t\t\t\t\t\n \t\t\t\t</th><th class="td" title="table-head " align="left" valign="bottom" scope="col" style="border-bottom: 2px solid black">Communication overhead \t\t\t\t\t\t\n \t\t\t\t</th><th class="td" title="table-head " align="left" valign="bottom" scope="col" style="border-bottom: 2px solid black">Signing (Authenticate) \t\t\t\t\t\t\n \t\t\t\t</th><th class="td" title="table-head " align="left" valign="bottom" scope="col" style="border-bottom: 2px solid black">Verification \t\t\t\t\t\t\n \t\t\t\t</th></tr></thead><tbody title="tbody"><tr title="table-row"><td class="td" title="table-entry " align="left" valign="bottom">Blantom solution [<a class="elsevierStyleCrossRef" href="#bib0055">11</a>] \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="table-entry " align="left" valign="bottom">various \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="table-entry " align="left" valign="bottom">various (approx. 30p<span class="elsevierStyleHsp" style=""></span>+31e<span class="elsevierStyleHsp" style=""></span>+<span class="elsevierStyleHsp" style=""></span>12<span class="elsevierStyleHsp" style=""></span>m) \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="table-entry " align="left" valign="bottom">6p<span class="elsevierStyleHsp" style=""></span>+<span class="elsevierStyleHsp" style=""></span>17e<span class="elsevierStyleHsp" style=""></span>+<span class="elsevierStyleHsp" style=""></span>5<span class="elsevierStyleHsp" style=""></span>m \t\t\t\t\t\t\n \t\t\t\t</td></tr><tr title="table-row"><td class="td" title="table-entry " align="left" valign="bottom">Lu et al. solution [<a class="elsevierStyleCrossRef" href="#bib0065">13</a>] \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="table-entry " align="left" valign="bottom">5 elements \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="table-entry " align="left" valign="bottom">14e<span class="elsevierStyleHsp" style=""></span>+10<span class="elsevierStyleHsp" style=""></span>m \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="table-entry " align="left" valign="bottom">6p<span class="elsevierStyleHsp" style=""></span>+<span class="elsevierStyleHsp" style=""></span>1e<span class="elsevierStyleHsp" style=""></span>+<span class="elsevierStyleHsp" style=""></span>2<span class="elsevierStyleHsp" style=""></span>m \t\t\t\t\t\t\n \t\t\t\t</td></tr><tr title="table-row"><td class="td" title="table-entry " align="left" valign="bottom">Chow et al. solution [<a class="elsevierStyleCrossRef" href="#bib0065">13</a>] \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="table-entry " align="left" valign="bottom">6 elements \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="table-entry " align="left" valign="bottom">14e<span class="elsevierStyleHsp" style=""></span>+<span class="elsevierStyleHsp" style=""></span>15<span class="elsevierStyleHsp" style=""></span>m \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="table-entry " align="left" valign="bottom">6p<span class="elsevierStyleHsp" style=""></span>+<span class="elsevierStyleHsp" style=""></span>1e<span class="elsevierStyleHsp" style=""></span>+<span class="elsevierStyleHsp" style=""></span>6<span class="elsevierStyleHsp" style=""></span>m \t\t\t\t\t\t\n \t\t\t\t</td></tr><tr title="table-row"><td class="td" title="table-entry " align="left" valign="bottom">Our solution \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="table-entry " align="left" valign="bottom">12 elements \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="table-entry " align="left" valign="bottom">10e<span class="elsevierStyleHsp" style=""></span>+<span class="elsevierStyleHsp" style=""></span>8<span class="elsevierStyleHsp" style=""></span>m \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="table-entry " align="left" valign="bottom">12e<span class="elsevierStyleHsp" style=""></span>+<span class="elsevierStyleHsp" style=""></span>6<span class="elsevierStyleHsp" style=""></span>m \t\t\t\t\t\t\n \t\t\t\t</td></tr></tbody></table> """ ] "imagenFichero" => array:1 [ 0 => "xTab732022.png" ] ] ] ] "descripcion" => array:1 [ "en" => "<p id="spar0025" class="elsevierStyleSimplePara elsevierViewall">Performance Analysis of Solutions in Cloud Computing.</p>" ] ] 5 => array:7 [ "identificador" => "tbl0010" "etiqueta" => "Table 2" "tipo" => "MULTIMEDIATABLA" "mostrarFloat" => true "mostrarDisplay" => false "tabla" => array:1 [ "tablatextoimagen" => array:1 [ 0 => array:2 [ "tabla" => array:1 [ 0 => """ <table border="0" frame="\n \t\t\t\t\tvoid\n \t\t\t\t" class=""><thead title="thead"><tr title="table-row"><th class="td" title="table-head " align="left" valign="bottom" scope="col" style="border-bottom: 2px solid black">Sessions [#] \t\t\t\t\t\t\n \t\t\t\t</th><th class="td" title="table-head " align="left" valign="bottom" scope="col" style="border-bottom: 2px solid black">Sign/Authenticate Total time [ms] \t\t\t\t\t\t\n \t\t\t\t</th><th class="td" title="table-head " align="left" valign="bottom" scope="col" style="border-bottom: 2px solid black">Verify \t\t\t\t\t\t\n \t\t\t\t</th><th class="td" title="table-head " align="left" valign="bottom" scope="col" style="border-bottom: 2px solid black">Verify with <span class="elsevierStyleItalic">rev</span> = 10 \t\t\t\t\t\t\n \t\t\t\t</th></tr></thead><tbody title="tbody"><tr title="table-row"><td class="td" title="table-entry " align="left" valign="bottom">1 \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="table-entry " align="left" valign="bottom">54 \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="table-entry " align="left" valign="bottom">70 \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="table-entry " align="left" valign="bottom">106 \t\t\t\t\t\t\n \t\t\t\t</td></tr><tr title="table-row"><td class="td" title="table-entry " align="left" valign="bottom">10 \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="table-entry " align="left" valign="bottom">526 \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="table-entry " align="left" valign="bottom">721 \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="table-entry " align="left" valign="bottom">920 \t\t\t\t\t\t\n \t\t\t\t</td></tr><tr title="table-row"><td class="td" title="table-entry " align="left" valign="bottom">20 \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="table-entry " align="left" valign="bottom">1042 \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="table-entry " align="left" valign="bottom">1272 \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="table-entry " align="left" valign="bottom">1891 \t\t\t\t\t\t\n \t\t\t\t</td></tr><tr title="table-row"><td class="td" title="table-entry " align="left" valign="bottom">50 \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="table-entry " align="left" valign="bottom">2504 \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="table-entry " align="left" valign="bottom">3328 \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="table-entry " align="left" valign="bottom">4091 \t\t\t\t\t\t\n \t\t\t\t</td></tr></tbody></table> """ ] "imagenFichero" => array:1 [ 0 => "xTab732020.png" ] ] ] ] "descripcion" => array:1 [ "en" => "<p id="spar0030" class="elsevierStyleSimplePara elsevierViewall">Performance Evaluation of Our Solution.</p>" ] ] 6 => array:7 [ "identificador" => "tbl0015" "etiqueta" => "Table 3" "tipo" => "MULTIMEDIATABLA" "mostrarFloat" => true "mostrarDisplay" => false "tabla" => array:1 [ "tablatextoimagen" => array:1 [ 0 => array:2 [ "tabla" => array:1 [ 0 => """ <table border="0" frame="\n \t\t\t\t\tvoid\n \t\t\t\t" class=""><thead title="thead"><tr title="table-row"><th class="td" title="table-head " align="left" valign="bottom" scope="col" style="border-bottom: 2px solid black">Scheme \t\t\t\t\t\t\n \t\t\t\t</th><th class="td" title="table-head " align="left" valign="bottom" scope="col" style="border-bottom: 2px solid black">Signing operations \t\t\t\t\t\t\n \t\t\t\t</th><th class="td" title="table-head " align="left" valign="bottom" scope="col" style="border-bottom: 2px solid black">Verification operations \t\t\t\t\t\t\n \t\t\t\t</th><th class="td" title="table-head " align="left" valign="bottom" scope="col" style="border-bottom: 2px solid black">Size of signature \t\t\t\t\t\t\n \t\t\t\t</th><th class="td" title="table-head " align="left" valign="bottom" scope="col" style="border-bottom: 2px solid black">Size of group public key \t\t\t\t\t\t\n \t\t\t\t</th><th class="td" title="table-head " align="left" valign="bottom" scope="col" style="border-bottom: 2px solid black">Efficiency \t\t\t\t\t\t\n \t\t\t\t</th><th class="td" title="table-head " align="left" valign="bottom" scope="col" style="border-bottom: 2px solid black">Security model \t\t\t\t\t\t\n \t\t\t\t</th><th class="td" title="table-head " align="left" valign="bottom" scope="col" style="border-bottom: 2px solid black">Type \t\t\t\t\t\t\n \t\t\t\t</th></tr></thead><tbody title="tbody"><tr title="table-row"><td class="td" title="table-entry " align="left" valign="bottom">ACJTOO [<a class="elsevierStyleCrossRef" href="#bib0135">27</a>] \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="table-entry " align="left" valign="bottom">14e<span class="elsevierStyleHsp" style=""></span>+<span class="elsevierStyleHsp" style=""></span>1H-t-9mul + 2div+ 6add \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="table-entry " align="left" valign="bottom">15e<span class="elsevierStyleHsp" style=""></span>+<span class="elsevierStyleHsp" style=""></span>1H + 9<span class="elsevierStyleHsp" style=""></span>mul + 2div + 4sum \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="table-entry " align="left" valign="bottom">3636 b \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="table-entry " align="left" valign="bottom">6144 b \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="table-entry " align="left" valign="bottom">Constant <span class="elsevierStyleItalic">gpk</span> and sign. \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="table-entry " align="left" valign="bottom">Random Oracle \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="table-entry " align="left" valign="bottom">Non-bilinear \t\t\t\t\t\t\n \t\t\t\t</td></tr><tr title="table-row"><td class="td" title="table-entry " align="left" valign="bottom">NS04 [<a class="elsevierStyleCrossRef" href="#bib0180">36</a>] \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="table-entry " align="left" valign="bottom">3e<span class="elsevierStyleHsp" style=""></span>+<span class="elsevierStyleHsp" style=""></span>32<span class="elsevierStyleHsp" style=""></span>mul + 14add +1H \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="table-entry " align="left" valign="bottom">3p<span class="elsevierStyleHsp" style=""></span>+<span class="elsevierStyleHsp" style=""></span>2e + 14<span class="elsevierStyleHsp" style=""></span>mul + 8add + 1H \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="table-entry " align="left" valign="bottom">4776 b \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="table-entry " align="left" valign="bottom">2904 b \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="table-entry " align="left" valign="bottom">Constant <span class="elsevierStyleItalic">gpk</span> and sign. \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="table-entry " align="left" valign="bottom">Random Oracle \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="table-entry " align="left" valign="bottom">Bilinear \t\t\t\t\t\t\n \t\t\t\t</td></tr><tr title="table-row"><td class="td" title="table-entry " align="left" valign="bottom">BBS04 [<a class="elsevierStyleCrossRef" href="#bib0155">31</a>] \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="table-entry " align="left" valign="bottom">3p<span class="elsevierStyleHsp" style=""></span>+<span class="elsevierStyleHsp" style=""></span>12e + 10<span class="elsevierStyleHsp" style=""></span>mul + 8add +1H \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="table-entry " align="left" valign="bottom">5p<span class="elsevierStyleHsp" style=""></span>+<span class="elsevierStyleHsp" style=""></span>12e + 7<span class="elsevierStyleHsp" style=""></span>mul + 1div + 2add + 1H \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="table-entry " align="left" valign="bottom">3|G<span class="elsevierStyleInf">1</span>| + 6|Z<span class="elsevierStyleInf">p</span>| 1 553b \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="table-entry " align="left" valign="bottom">6|G<span class="elsevierStyleInf">1</span>| 1026 b \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="table-entry " align="left" valign="bottom">Constant <span class="elsevierStyleItalic">gpk</span> and sign. \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="table-entry " align="left" valign="bottom">Random Oracle \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="table-entry " align="left" valign="bottom">Bilinear \t\t\t\t\t\t\n \t\t\t\t</td></tr><tr title="table-row"><td class="td" title="table-entry " align="left" valign="bottom">BS04 [<a class="elsevierStyleCrossRef" href="#bib0150">30</a>] \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="table-entry " align="left" valign="bottom">3p<span class="elsevierStyleHsp" style=""></span>+<span class="elsevierStyleHsp" style=""></span>2EF + 8e +8<span class="elsevierStyleHsp" style=""></span>mul + 3add + 2H \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="table-entry " align="left" valign="bottom">(6 +|Ri-|)p + 8e<span class="elsevierStyleHsp" style=""></span>+<span class="elsevierStyleHsp" style=""></span>4<span class="elsevierStyleHsp" style=""></span>mul + 2div + 2H + 2EF \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="table-entry " align="left" valign="bottom">2|G<span class="elsevierStyleInf">1</span>|+5|Z<span class="elsevierStyleInf">p</span>| 1 192 b \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="table-entry " align="left" valign="bottom">3|G<span class="elsevierStyleInf">1</span>|513b \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="table-entry " align="left" valign="bottom">Constant <span class="elsevierStyleItalic">gpk</span> and sign. \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="table-entry " align="left" valign="bottom">Random Oracle \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="table-entry " align="left" valign="bottom">Bilinear \t\t\t\t\t\t\n \t\t\t\t</td></tr><tr title="table-row"><td class="td" title="table-entry " align="left" valign="bottom">ACHMO5[330] \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="table-entry " align="left" valign="bottom">8e<span class="elsevierStyleHsp" style=""></span>+<span class="elsevierStyleHsp" style=""></span>2div + 2add \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="table-entry " align="left" valign="bottom">10p<span class="elsevierStyleHsp" style=""></span>+<span class="elsevierStyleHsp" style=""></span>1e + 3<span class="elsevierStyleHsp" style=""></span>mul \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="table-entry " align="left" valign="bottom">6|G<span class="elsevierStyleInf">1</span>|+2|G<span class="elsevierStyleInf">2</span> 2052 b \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="table-entry " align="left" valign="bottom">2|G<span class="elsevierStyleInf">1</span>| + 4|G<span class="elsevierStyleInf">2</span>| + |G<span class="elsevierStyleInf">T</span> \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="table-entry " align="left" valign="bottom">Constant <span class="elsevierStyleItalic">gpk</span> and sign. \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="table-entry " align="left" valign="bottom">Standard \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="table-entry " align="left" valign="bottom">Bilinear \t\t\t\t\t\t\n \t\t\t\t</td></tr><tr title="table-row"><td class="td" title="table-entry " align="left" valign="bottom">BW06[<a class="elsevierStyleCrossRef" href="#bib0075">15</a>] \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="table-entry " align="left" valign="bottom">(5<span class="elsevierStyleHsp" style=""></span>k+ m + 5)e + (4<span class="elsevierStyleHsp" style=""></span>k+ m + 4}mul + (2<span class="elsevierStyleHsp" style=""></span>k-1) add \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="table-entry " align="left" valign="bottom">(3+2<span class="elsevierStyleHsp" style=""></span>k)<span class="elsevierStyleItalic">p</span> + <span class="elsevierStyleItalic">me</span> + (<span class="elsevierStyleItalic">m</span>+<span class="elsevierStyleItalic">k</span>)mul \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="table-entry " align="left" valign="bottom">(2<span class="elsevierStyleHsp" style=""></span><span class="elsevierStyleItalic">k</span> + 3)|G| \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="table-entry " align="left" valign="bottom">(<span class="elsevierStyleItalic">k</span>+ <span class="elsevierStyleItalic">m</span> + 3)|G|+|G<span class="elsevierStyleInf"><span class="elsevierStyleItalic">q</span></span>|+|+|+G<span class="elsevierStyleInf"><span class="elsevierStyleItalic">T</span></span>| \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="table-entry " align="left" valign="bottom">Logarithmic <span class="elsevierStyleItalic">gpk</span> and sign. \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="table-entry " align="left" valign="bottom">Standard \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="table-entry " align="left" valign="bottom">Bilinear \t\t\t\t\t\t\n \t\t\t\t</td></tr><tr title="table-row"><td class="td" title="table-entry " align="left" valign="bottom">ZL06 [<a class="elsevierStyleCrossRef" href="#bib0185">37</a>] \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="table-entry " align="left" valign="bottom">2p<span class="elsevierStyleHsp" style=""></span>+<span class="elsevierStyleHsp" style=""></span>17e + I7<span class="elsevierStyleHsp" style=""></span>mul + 7 sum + 2div + 1H \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="table-entry " align="left" valign="bottom">(3 + <span class="elsevierStyleItalic">RL</span>)p + 17e + 9<span class="elsevierStyleHsp" style=""></span>mul + 2div + 1H \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="table-entry " align="left" valign="bottom">8|Z<span class="elsevierStyleInf">p</span>|+5|G| 2215 b \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="table-entry " align="left" valign="bottom">(3 + T)|G| \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="table-entry " align="left" valign="bottom">Constant sign. \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="table-entry " align="left" valign="bottom">Random oracle \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="table-entry " align="left" valign="bottom">Bilinear \t\t\t\t\t\t\n \t\t\t\t</td></tr><tr title="table-row"><td class="td" title="table-entry " align="left" valign="bottom">BW07 [<a class="elsevierStyleCrossRef" href="#bib0065">13</a>] \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="table-entry " align="left" valign="bottom">(12<span class="elsevierStyleHsp" style=""></span>+<span class="elsevierStyleHsp" style=""></span>2<span class="elsevierStyleHsp" style=""></span>m)e + (11 + 2<span class="elsevierStyleHsp" style=""></span>)mul \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="table-entry " align="left" valign="bottom">6p+(3 + m)e + (4 + m)mul \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="table-entry " align="left" valign="bottom">6|G| 1026 b \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="table-entry " align="left" valign="bottom">(4 + m)|G| +|G<span class="elsevierStyleInf"><span class="elsevierStyleItalic">q</span></span>| + |G<span class="elsevierStyleInf">T</span>| \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="table-entry " align="left" valign="bottom">Logarithmic <span class="elsevierStyleItalic">gpk a</span> constant sign. \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="table-entry " align="left" valign="bottom">Standard \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="table-entry " align="left" valign="bottom">Bilinear \t\t\t\t\t\t\n \t\t\t\t</td></tr><tr title="table-row"><td class="td" title="table-entry " align="left" valign="bottom">LCSL07 [<a class="elsevierStyleCrossRef" href="#bib0170">34</a>] \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="table-entry " align="left" valign="bottom">12e<span class="elsevierStyleHsp" style=""></span>+<span class="elsevierStyleHsp" style=""></span>10<span class="elsevierStyleHsp" style=""></span>mul + 1div+ 1H + 1 add \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="table-entry " align="left" valign="bottom">6p<span class="elsevierStyleHsp" style=""></span>+<span class="elsevierStyleHsp" style=""></span>3e<span class="elsevierStyleHsp" style=""></span>+<span class="elsevierStyleHsp" style=""></span>4<span class="elsevierStyleHsp" style=""></span>mul \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="table-entry " align="left" valign="bottom">5|G| \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="table-entry " align="left" valign="bottom">3|G|+ |G<span class="elsevierStyleInf">q</span>| \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="table-entry " align="left" valign="bottom">Constant <span class="elsevierStyleItalic">gpk</span> and sign. \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="table-entry " align="left" valign="bottom">Standard \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="table-entry " align="left" valign="bottom">Bilinear \t\t\t\t\t\t\n \t\t\t\t</td></tr><tr title="table-row"><td class="td" title="table-entry " align="left" valign="bottom">Our scheme \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="table-entry " align="left" valign="bottom">10e<span class="elsevierStyleHsp" style=""></span>+<span class="elsevierStyleHsp" style=""></span>8<span class="elsevierStyleHsp" style=""></span>m \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="table-entry " align="left" valign="bottom">12e<span class="elsevierStyleHsp" style=""></span>+<span class="elsevierStyleHsp" style=""></span>6<span class="elsevierStyleHsp" style=""></span>m \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="table-entry " align="left" valign="bottom">8835 b \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="table-entry " align="left" valign="bottom">5950 b \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="table-entry " align="left" valign="bottom">Constant \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="table-entry " align="left" valign="bottom">Random Oracle \t\t\t\t\t\t\n \t\t\t\t</td><td class="td" title="table-entry " align="left" valign="bottom">Non-bilinear \t\t\t\t\t\t\n \t\t\t\t</td></tr></tbody></table> """ ] "imagenFichero" => array:1 [ 0 => "xTab732021.png" ] ] ] ] "descripcion" => array:1 [ "en" => "<p id="spar0035" class="elsevierStyleSimplePara elsevierViewall">Comparison of Group Signatures Schemes with Our Solution.</p>" ] ] 7 => array:5 [ "identificador" => "eq0005" "tipo" => "MULTIMEDIAFORMULA" "mostrarFloat" => false "mostrarDisplay" => true "Formula" => array:5 [ "Matematica" => "KS∈R{0,1}lA=Aproofks mod nC1=g3KsωRM mod nC2=g3ks mod nr1,r2∈R{0,1}m+k+3lr3∈R{0,1}m+k+4.5.lrs∈R{0,1}m+k+lAproof¯=g1r1g2r2g3r3 mod nA¯=Aproofrs mod nC1¯=g3r3 mod nC2¯=g3rs mod nc=ℋ(Enc_PK_server(randam),A,A,¯Aproof,¯C1,C2,C1¯,C2¯)z1=r1−cKsω1z2=r2−cKsω2z3=r3−cKsωRMzS=rS−cKS" "Fichero" => "si15.jpeg" "Tamanyo" => 18610 "Alto" => 449 "Ancho" => 192 ] ] 8 => array:5 [ "identificador" => "eq0010" "tipo" => "MULTIMEDIAFORMULA" "mostrarFloat" => false "mostrarDisplay" => true "Formula" => array:5 [ "Matematica" => "                C1C2rev mod nAproof¯≡Aeg1z1g2z2g3z3 mod n          A¯≡AeAproofzS mod n               C1¯≡C1eg3z3 mod               C2¯≡C2eg3zS mod n" "Fichero" => "si18.jpeg" "Tamanyo" => 6793 "Alto" => 119 "Ancho" => 235 ] ] ] "bibliografia" => array:2 [ "titulo" => "References" "seccion" => array:1 [ 0 => array:2 [ "identificador" => "bibs0005" "bibliografiaReferencia" => array:37 [ 0 => array:3 [ "identificador" => "bib0005" "etiqueta" => "[1]" "referencia" => array:1 [ 0 => array:2 [ "contribucion" => array:1 [ 0 => array:2 [ "titulo" => "On securing untrusted clouds with cryptography" "autores" => array:1 [ 0 => array:2 [ "etal" => false "autores" => array:2 [ 0 => "Y. Chen" 1 => "R. Sion" ] ] ] ] ] "host" => array:1 [ 0 => array:1 [ "LibroEditado" => array:4 [ "titulo" => "Proceedings of the 9th annual ACM workshop on Privacy in the electronic society" "paginaInicial" => "109" "paginaFinal" => "114" "serieFecha" => "2010" ] ] ] ] ] ] 1 => array:3 [ "identificador" => "bib0010" "etiqueta" => "[2]" "referencia" => array:1 [ 0 => array:2 [ "contribucion" => array:1 [ 0 => array:2 [ "titulo" => "Privacy-preserving public auditing for data storage security in cloud computing" "autores" => array:1 [ 0 => array:2 [ "etal" => true "autores" => array:1 [ 0 => "C. Wang" ] ] ] ] ] "host" => array:1 [ 0 => array:1 [ "LibroEditado" => array:4 [ "titulo" => "INFOCOM" "paginaInicial" => "1" "paginaFinal" => "9" "serieFecha" => "2010" ] ] ] ] ] ] 2 => array:3 [ "identificador" => "bib0015" "etiqueta" => "[3]" "referencia" => array:1 [ 0 => array:2 [ "contribucion" => array:1 [ 0 => array:2 [ "titulo" => "Enabling public auditability and data dynamics for storage security in cloud computing" "autores" => array:1 [ 0 => array:2 [ "etal" => true "autores" => array:1 [ 0 => "Q. Wang" ] ] ] ] ] "host" => array:1 [ 0 => array:1 [ "Revista" => array:6 [ "tituloSerie" => "Parallel and Distributed Systems, IEEE Transactions on" "fecha" => "2011" "volumen" => "22" "numero" => "5" "paginaInicial" => "847" "paginaFinal" => "859" ] ] ] ] ] ] 3 => array:3 [ "identificador" => "bib0020" "etiqueta" => "[4]" "referencia" => array:1 [ 0 => array:2 [ "contribucion" => array:1 [ 0 => array:2 [ "titulo" => "Secure and anonymous communication in the cloud" "autores" => array:1 [ 0 => array:2 [ "etal" => false "autores" => array:1 [ 0 => "R. Laurikainen" ] ] ] ] ] "host" => array:1 [ 0 => array:1 [ "LibroEditado" => array:4 [ "titulo" => "Aalto University School of Science and Technology, Department of Computer Science and Engineering" "paginaInicial" => "1" "paginaFinal" => "5" "serieFecha" => "2010" ] ] ] ] ] ] 4 => array:3 [ "identificador" => "bib0025" "etiqueta" => "[5]" "referencia" => array:1 [ 0 => array:2 [ "contribucion" => array:1 [ 0 => array:2 [ "titulo" => "A client-based privacy manager for cloud computing" "autores" => array:1 [ 0 => array:2 [ "etal" => false "autores" => array:2 [ 0 => "M. Mowbray" 1 => "S. Pearson" ] ] ] ] ] "host" => array:1 [ 0 => array:1 [ "LibroEditado" => array:4 [ "titulo" => "Proceedings of the Fourth International ICST Conference on COMmunication System softWAre and middle waRE, ser. COMSWARE '09" "paginaInicial" => "5:1" "paginaFinal" => "5:8" "serieFecha" => "2009" ] ] ] ] ] ] 5 => array:3 [ "identificador" => "bib0030" "etiqueta" => "[6]" "referencia" => array:1 [ 0 => array:2 [ "contribucion" => array:1 [ 0 => array:2 [ "titulo" => "A Comparison of Redundancy Techniques for Private and Hybrid Cloud Storage" "autores" => array:1 [ 0 => array:2 [ "etal" => true "autores" => array:1 [ 0 => "E.M. Hernandez-Ramirez" ] ] ] ] ] "host" => array:1 [ 0 => array:1 [ "Revista" => array:6 [ "tituloSerie" => "JART Journal of Applied Research and Technology" "fecha" => "2012" "volumen" => "10" "numero" => "6" "paginaInicial" => "1" "paginaFinal" => "9" ] ] ] ] ] ] 6 => array:3 [ "identificador" => "bib0035" "etiqueta" => "[7]" "referencia" => array:1 [ 0 => array:2 [ "contribucion" => array:1 [ 0 => array:2 [ "titulo" => "Towards an anonymous access control and accountability scheme for cloud computing" "autores" => array:1 [ 0 => array:2 [ "etal" => true "autores" => array:1 [ 0 => "M. Jensen" ] ] ] ] ] "host" => array:1 [ 0 => array:1 [ "LibroEditado" => array:5 [ "titulo" => "Cloud Computing (CLOUD)" "paginaInicial" => "540" "paginaFinal" => "541" "conferencia" => "2010 IEEE 3rd International Conference on" "serieFecha" => "2010" ] ] ] ] ] ] 7 => array:3 [ "identificador" => "bib0040" "etiqueta" => "[8]" "referencia" => array:1 [ 0 => array:2 [ "contribucion" => array:1 [ 0 => array:2 [ "titulo" => "Group signatures" "autores" => array:1 [ 0 => array:2 [ "etal" => false "autores" => array:2 [ 0 => "D. Chaum" 1 => "E. Van Heyst" ] ] ] ] ] "host" => array:1 [ 0 => array:1 [ "LibroEditado" => array:4 [ "titulo" => "Advances inCryptologyEUROCRYPT91" "paginaInicial" => "257" "paginaFinal" => "265" "serieFecha" => "1991" ] ] ] ] ] ] 8 => array:3 [ "identificador" => "bib0045" "etiqueta" => "[9]" "referencia" => array:1 [ 0 => array:2 [ "contribucion" => array:1 [ 0 => array:2 [ "titulo" => "An entity-centric approach for privacy and identity management in cloud computing" "autores" => array:1 [ 0 => array:2 [ "etal" => true "autores" => array:1 [ 0 => "P. Angin" ] ] ] ] ] "host" => array:1 [ 0 => array:1 [ "LibroEditado" => array:4 [ "titulo" => "Reliable Distributed Systems, 201029th IEEE Symposium on" "paginaInicial" => "177" "paginaFinal" => "183" "serieFecha" => "2010" ] ] ] ] ] ] 9 => array:3 [ "identificador" => "bib0050" "etiqueta" => "[10]" "referencia" => array:1 [ 0 => array:2 [ "contribucion" => array:1 [ 0 => array:2 [ "titulo" => "How to prove yourself: practical solutions to identification and signature problems" "autores" => array:1 [ 0 => array:2 [ "etal" => false "autores" => array:2 [ 0 => "A. Fiat" 1 => "A. Shamir" ] ] ] ] ] "host" => array:1 [ 0 => array:1 [ "LibroEditado" => array:4 [ "titulo" => "Advances in Cryptology-Crypto86" "paginaInicial" => "186" "paginaFinal" => "194" "serieFecha" => "1987" ] ] ] ] ] ] 10 => array:3 [ "identificador" => "bib0055" "etiqueta" => "[11]" "referencia" => array:1 [ 0 => array:2 [ "contribucion" => array:1 [ 0 => array:2 [ "titulo" => "Online subscriptions with anonymous access" "autores" => array:1 [ 0 => array:2 [ "etal" => false "autores" => array:1 [ 0 => "M. Blanton" ] ] ] ] ] "host" => array:1 [ 0 => array:1 [ "LibroEditado" => array:4 [ "titulo" => "Proceedings of the 2008 ACM symposium on Information, computer and communications security, ser. ASIACCS '08" "paginaInicial" => "217" "paginaFinal" => "227" "serieFecha" => "2008" ] ] ] ] ] ] 11 => array:3 [ "identificador" => "bib0060" "etiqueta" => "[12]" "referencia" => array:1 [ 0 => array:2 [ "contribucion" => array:1 [ 0 => array:2 [ "titulo" => "Signature schemes and anonymous credentials from bilinear maps" "autores" => array:1 [ 0 => array:2 [ "etal" => false "autores" => array:2 [ 0 => "J. Camenisch" 1 => "A. Lysyanskaya" ] ] ] ] ] "host" => array:1 [ 0 => array:1 [ "LibroEditado" => array:5 [ "titulo" => "Advances in Cryptology- CRYPTO2004" "paginaInicial" => "56" "paginaFinal" => "72" "conferencia" => "24th Annual International Cryptology Conference" "serieFecha" => "2004" ] ] ] ] ] ] 12 => array:3 [ "identificador" => "bib0065" "etiqueta" => "[13]" "referencia" => array:1 [ 0 => array:2 [ "contribucion" => array:1 [ 0 => array:2 [ "titulo" => "Secure provenance: the essential of bread and butter of data forensics in cloud computing" "autores" => array:1 [ 0 => array:2 [ "etal" => true "autores" => array:1 [ 0 => "R. Lu" ] ] ] ] ] "host" => array:1 [ 0 => array:1 [ "LibroEditado" => array:4 [ "titulo" => "Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ser. ASIACCS '10" "paginaInicial" => "282" "paginaFinal" => "292" "serieFecha" => "2010" ] ] ] ] ] ] 13 => array:3 [ "identificador" => "bib0070" "etiqueta" => "[14]" "referencia" => array:1 [ 0 => array:2 [ "contribucion" => array:1 [ 0 => array:2 [ "titulo" => "Spice-simple privacy-preserving identity-management for cloud environment" "autores" => array:1 [ 0 => array:2 [ "etal" => true "autores" => array:1 [ 0 => "S. Chow" ] ] ] ] ] "host" => array:1 [ 0 => array:1 [ "LibroEditado" => array:4 [ "titulo" => "Applied Cryptography and Network Security" "paginaInicial" => "526" "paginaFinal" => "543" "serieFecha" => "2012" ] ] ] ] ] ] 14 => array:3 [ "identificador" => "bib0075" "etiqueta" => "[15]" "referencia" => array:1 [ 0 => array:2 [ "contribucion" => array:1 [ 0 => array:2 [ "titulo" => "Compact group signatures without random oracles" "autores" => array:1 [ 0 => array:2 [ "etal" => false "autores" => array:2 [ 0 => "X. Boyen" 1 => "B. Waters" ] ] ] ] ] "host" => array:1 [ 0 => array:1 [ "LibroEditado" => array:4 [ "titulo" => "Advances in Cryptology-EUROCRYPT 2006" "paginaInicial" => "427" "paginaFinal" => "444" "serieFecha" => "2006" ] ] ] ] ] ] 15 => array:3 [ "identificador" => "bib0080" "etiqueta" => "[16]" "referencia" => array:1 [ 0 => array:2 [ "contribucion" => array:1 [ 0 => array:2 [ "titulo" => "Accelerated modular arithmetic for low-performance devices" "autores" => array:1 [ 0 => array:2 [ "etal" => false "autores" => array:2 [ 0 => "L. Malina" 1 => "J. Hajny" ] ] ] ] ] "host" => array:1 [ 0 => array:1 [ "LibroEditado" => array:5 [ "titulo" => "Telecommunications and Signal Processing (TSP), 2011" "paginaInicial" => "131" "paginaFinal" => "135" "conferencia" => "34th International Conference on" "serieFecha" => "2011" ] ] ] ] ] ] 16 => array:3 [ "identificador" => "bib0085" "etiqueta" => "[17]" "referencia" => array:1 [ 0 => array:2 [ "contribucion" => array:1 [ 0 => array:2 [ "titulo" => "Efficient modular multiplication for programmable smart-cards" "autores" => array:1 [ 0 => array:2 [ "etal" => false "autores" => array:2 [ 0 => "L. Malina" 1 => "J. Hajny" ] ] ] ] ] "host" => array:1 [ 0 => array:1 [ "LibroEditado" => array:4 [ "titulo" => "TelSys. Telecommunication Systems" "paginaInicial" => "1" "paginaFinal" => "8" "serieFecha" => "2013" ] ] ] ] ] ] 17 => array:3 [ "identificador" => "bib0090" "etiqueta" => "[18]" "referencia" => array:1 [ 0 => array:2 [ "contribucion" => array:1 [ 0 => array:2 [ "titulo" => "Full-domain subgroup hiding and constant-size group signatures" "autores" => array:1 [ 0 => array:2 [ "etal" => false "autores" => array:2 [ 0 => "X. Boyen" 1 => "B. Waters" ] ] ] ] ] "host" => array:1 [ 0 => array:1 [ "Libro" => array:6 [ "titulo" => "Public Key Cryptography-PKC 2007" "fecha" => "2007" "paginaInicial" => "1" "paginaFinal" => "15" "editorial" => "Beijing" "editorialLocalizacion" => "China" ] ] ] ] ] ] 18 => array:3 [ "identificador" => "bib0095" "etiqueta" => "[19]" "referencia" => array:1 [ 0 => array:2 [ "contribucion" => array:1 [ 0 => array:1 [ "autores" => array:1 [ 0 => array:2 [ "etal" => false "autores" => array:2 [ 0 => "J. Hajny" 1 => "L. Malina" ] ] ] ] ] "host" => array:1 [ 0 => array:1 [ "LibroEditado" => array:5 [ "titulo" => "Unlinkable attribute-based credentials with practical revocation on smart-cards" "paginaInicial" => "62" "paginaFinal" => "76" "conferencia" => "Proceedings of the 11th international conference on Smart Card Research and Advanced Applications, ser. CARDIS'12" "serieFecha" => "2013" ] ] ] ] ] ] 19 => array:3 [ "identificador" => "bib0100" "etiqueta" => "[20]" "referencia" => array:1 [ 0 => array:2 [ "contribucion" => array:1 [ 0 => array:1 [ "autores" => array:1 [ 0 => array:2 [ "etal" => false "autores" => array:1 [ 0 => "R. Cramer" ] ] ] ] ] "host" => array:1 [ 0 => array:1 [ "Libro" => array:3 [ "titulo" => "Modular design of secure, yet practical cryptographic protocols" "fecha" => "1996" "editorial" => "University of Amsterdam" ] ] ] ] ] ] 20 => array:3 [ "identificador" => "bib0105" "etiqueta" => "[21]" "referencia" => array:1 [ 0 => array:2 [ "contribucion" => array:1 [ 0 => array:1 [ "autores" => array:1 [ 0 => array:2 [ "etal" => false "autores" => array:2 [ 0 => "J. Camenisch" 1 => "M. Stadler" ] ] ] ] ] "host" => array:1 [ 0 => array:1 [ "Libro" => array:2 [ "titulo" => "Proof systems for general statements about discrete logarithms" "fecha" => "1997" ] ] ] ] ] ] 21 => array:3 [ "identificador" => "bib0110" "etiqueta" => "[22]" "referencia" => array:1 [ 0 => array:2 [ "contribucion" => array:1 [ 0 => array:2 [ "titulo" => "A new public-key crypto system as secure as factoring" "autores" => array:1 [ 0 => array:2 [ "etal" => false "autores" => array:2 [ 0 => "T. Okamoto" 1 => "S. Uchiyama" ] ] ] ] ] "host" => array:1 [ 0 => array:1 [ "LibroEditado" => array:4 [ "titulo" => "Advances in Cryptology - EUROCRYPT 98, ser. Lecture Notes in Computer Science" "paginaInicial" => "308" "paginaFinal" => "318" "serieFecha" => "1998" ] ] ] ] ] ] 22 => array:3 [ "identificador" => "bib0115" "etiqueta" => "[23]" "referencia" => array:1 [ 0 => array:2 [ "contribucion" => array:1 [ 0 => array:2 [ "titulo" => "Practical revocable anonymous credentials" "autores" => array:1 [ 0 => array:2 [ "etal" => false "autores" => array:2 [ 0 => "J. Hajny" 1 => "L. Malina" ] ] ] ] ] "host" => array:1 [ 0 => array:1 [ "LibroEditado" => array:4 [ "titulo" => "Communications and Multimedia Security" "paginaInicial" => "211" "paginaFinal" => "213" "serieFecha" => "2012" ] ] ] ] ] ] 23 => array:3 [ "identificador" => "bib0120" "etiqueta" => "[24]" "referencia" => array:1 [ 0 => array:2 [ "contribucion" => array:1 [ 0 => array:2 [ "titulo" => "Optimization of differential poweranalysis" "autores" => array:1 [ 0 => array:2 [ "etal" => true "autores" => array:1 [ 0 => "Z. Martinasek" ] ] ] ] ] "host" => array:1 [ 0 => array:1 [ "Revista" => array:6 [ "tituloSerie" => "Przeglad elektrotechniczny" "fecha" => "2011" "volumen" => "87" "numero" => "12" "paginaInicial" => "140" "paginaFinal" => "144" ] ] ] ] ] ] 24 => array:3 [ "identificador" => "bib0125" "etiqueta" => "[25]" "referencia" => array:1 [ 0 => array:2 [ "contribucion" => array:1 [ 0 => array:2 [ "titulo" => "Achieving Identity-Based Cryptography in a Personal Digital Assistant Device" "autores" => array:1 [ 0 => array:2 [ "etal" => true "autores" => array:1 [ 0 => "L. Martínez-Ramos" ] ] ] ] ] "host" => array:1 [ 0 => array:1 [ "Revista" => array:6 [ "tituloSerie" => "JART. Journal of Applied Research and Technology" "fecha" => "2011" "volumen" => "9" "numero" => "3" "paginaInicial" => "1" "paginaFinal" => "11" ] ] ] ] ] ] 25 => array:3 [ "identificador" => "bib0130" "etiqueta" => "[26]" "referencia" => array:1 [ 0 => array:2 [ "contribucion" => array:1 [ 0 => array:2 [ "titulo" => "Eficient group signatures chemes for large groups" "autores" => array:1 [ 0 => array:2 [ "etal" => false "autores" => array:2 [ 0 => "J. Camenisch" 1 => "M. Stadler" ] ] ] ] ] "host" => array:1 [ 0 => array:1 [ "LibroEditado" => array:4 [ "titulo" => "Advances in Cryptology — CRYPTO '97" "paginaInicial" => "410" "paginaFinal" => "424" "serieFecha" => "1997" ] ] ] ] ] ] 26 => array:3 [ "identificador" => "bib0135" "etiqueta" => "[27]" "referencia" => array:1 [ 0 => array:2 [ "contribucion" => array:1 [ 0 => array:2 [ "titulo" => "A practical and provably secure group signature scheme" "autores" => array:1 [ 0 => array:2 [ "etal" => true "autores" => array:1 [ 0 => "G. Ateniese" ] ] ] ] ] "host" => array:1 [ 0 => array:1 [ "LibroEditado" => array:4 [ "titulo" => "proceedings of CRYPTO '00" "paginaInicial" => "255" "paginaFinal" => "270" "serieFecha" => "2000" ] ] ] ] ] ] 27 => array:3 [ "identificador" => "bib0140" "etiqueta" => "[28]" "referencia" => array:1 [ 0 => array:2 [ "contribucion" => array:1 [ 0 => array:2 [ "titulo" => "Quasi-efficient revocation in group signatures" "autores" => array:1 [ 0 => array:2 [ "etal" => true "autores" => array:1 [ 0 => "G. Ateniese" ] ] ] ] ] "host" => array:1 [ 0 => array:1 [ "LibroEditado" => array:4 [ "titulo" => "proceedings of Financial Cryptography '02" "paginaInicial" => "183" "paginaFinal" => "197" "serieFecha" => "2002" ] ] ] ] ] ] 28 => array:3 [ "identificador" => "bib0145" "etiqueta" => "[29]" "referencia" => array:1 [ 0 => array:2 [ "contribucion" => array:1 [ 0 => array:2 [ "titulo" => "Accumulating composites and improved group signing" "autores" => array:1 [ 0 => array:2 [ "etal" => false "autores" => array:2 [ 0 => "G. Tsudik" 1 => "S. Xu" ] ] ] ] ] "host" => array:1 [ 0 => array:1 [ "LibroEditado" => array:4 [ "titulo" => "proceedings of ASIACRYPT '03" "paginaInicial" => "269" "paginaFinal" => "286" "serieFecha" => "2003" ] ] ] ] ] ] 29 => array:3 [ "identificador" => "bib0150" "etiqueta" => "[30]" "referencia" => array:1 [ 0 => array:2 [ "contribucion" => array:1 [ 0 => array:2 [ "titulo" => "Group signatures with verifier-local revocation" "autores" => array:1 [ 0 => array:2 [ "etal" => false "autores" => array:2 [ 0 => "D. Boneh" 1 => "H. Shacham" ] ] ] ] ] "host" => array:1 [ 0 => array:1 [ "LibroEditado" => array:5 [ "titulo" => "Conference on Computer and Communications Security" "paginaInicial" => "168" "paginaFinal" => "177" "conferencia" => "Proceedings of the 11th ACM conference on Computer and communications security" "serieFecha" => "2004" ] ] ] ] ] ] 30 => array:3 [ "identificador" => "bib0155" "etiqueta" => "[31]" "referencia" => array:1 [ 0 => array:2 [ "contribucion" => array:1 [ 0 => array:2 [ "titulo" => "Short group signatures" "autores" => array:1 [ 0 => array:2 [ "etal" => true "autores" => array:1 [ 0 => "D. Boneh" ] ] ] ] ] "host" => array:1 [ 0 => array:1 [ "LibroEditado" => array:4 [ "titulo" => "Advances in Cryptology - CRYPTO 2004" "paginaInicial" => "41" "paginaFinal" => "55" "serieFecha" => "2004" ] ] ] ] ] ] 31 => array:3 [ "identificador" => "bib0160" "etiqueta" => "[32]" "referencia" => array:1 [ 0 => array:2 [ "contribucion" => array:1 [ 0 => array:2 [ "titulo" => "Foundations of group signatures: Formal definitions, simplified requirements, and a construction based on general assumptions" "autores" => array:1 [ 0 => array:2 [ "etal" => true "autores" => array:1 [ 0 => "M. Bellare" ] ] ] ] ] "host" => array:1 [ 0 => array:1 [ "LibroEditado" => array:4 [ "titulo" => "Advances in Cryptology – EUROCRYPT '03" "paginaInicial" => "614" "paginaFinal" => "629" "serieFecha" => "2003" ] ] ] ] ] ] 32 => array:3 [ "identificador" => "bib0165" "etiqueta" => "[33]" "referencia" => array:1 [ 0 => array:2 [ "contribucion" => array:1 [ 0 => array:2 [ "titulo" => "Practical group signatures without random oracles" "autores" => array:1 [ 0 => array:2 [ "etal" => true "autores" => array:1 [ 0 => "G. Ateniese" ] ] ] ] ] "host" => array:1 [ 0 => array:1 [ "Libro" => array:4 [ "titulo" => "IACR Cryptology ePrint Archive" "fecha" => "2005" "paginaInicial" => "1" "paginaFinal" => "31" ] ] ] ] ] ] 33 => array:3 [ "identificador" => "bib0170" "etiqueta" => "[34]" "referencia" => array:1 [ 0 => array:2 [ "contribucion" => array:1 [ 0 => array:2 [ "titulo" => "Short group signature without random oracles" "autores" => array:1 [ 0 => array:2 [ "etal" => true "autores" => array:1 [ 0 => "X. Liang" ] ] ] ] ] "host" => array:1 [ 0 => array:1 [ "LibroEditado" => array:4 [ "titulo" => "Information and Communications Security" "paginaInicial" => "69" "paginaFinal" => "82" "serieFecha" => "2007" ] ] ] ] ] ] 34 => array:3 [ "identificador" => "bib0175" "etiqueta" => "[35]" "referencia" => array:1 [ 0 => array:2 [ "contribucion" => array:1 [ 0 => array:2 [ "titulo" => "Fully anonymous group signatures without random oracles" "autores" => array:1 [ 0 => array:2 [ "etal" => false "autores" => array:1 [ 0 => "J. Groth" ] ] ] ] ] "host" => array:1 [ 0 => array:1 [ "LibroEditado" => array:4 [ "titulo" => "Advances in Cryptology – ASIACRYPT 2007" "paginaInicial" => "164" "paginaFinal" => "180" "serieFecha" => "2007" ] ] ] ] ] ] 35 => array:3 [ "identificador" => "bib0180" "etiqueta" => "[36]" "referencia" => array:1 [ 0 => array:2 [ "contribucion" => array:1 [ 0 => array:2 [ "titulo" => "Efficient and Provably Secure Trapdoor-free Group Signature Schemes from Bilinear Pairings" "autores" => array:1 [ 0 => array:2 [ "etal" => false "autores" => array:2 [ 0 => "L. Nguyen" 1 => "R. Safavi-Naini" ] ] ] ] ] "host" => array:1 [ 0 => array:1 [ "LibroEditado" => array:4 [ "titulo" => "Advances in Cryptology – ASIACRYPT 2004" "paginaInicial" => "372" "paginaFinal" => "386" "serieFecha" => "2004" ] ] ] ] ] ] 36 => array:3 [ "identificador" => "bib0185" "etiqueta" => "[37]" "referencia" => array:1 [ 0 => array:2 [ "contribucion" => array:1 [ 0 => array:2 [ "titulo" => "A shorter group signature with verifier-location revocation and backward unlinkability" "autores" => array:1 [ 0 => array:2 [ "etal" => false "autores" => array:2 [ 0 => "S. Zhou" 1 => "D. Lin" ] ] ] ] ] "host" => array:1 [ 0 => array:1 [ "Libro" => array:4 [ "titulo" => "CryptologyePrint Archive" "fecha" => "2006" "paginaInicial" => "1" "paginaFinal" => "10" ] ] ] ] ] ] ] ] ] ] "agradecimientos" => array:1 [ 0 => array:4 [ "identificador" => "xack143103" "titulo" => "Acknowledgments" "texto" => "<p id="par0415" class="elsevierStylePara elsevierViewall">This research work is funded by project SIX CZ.1.05/2.1.00/03.0072; the Technology Agency of the Czech Republic projects TA02011260 and TA03010818; the Ministry of Industry and Trade of the Czech Republic project FR-TI4/647.</p>" "vista" => "all" ] ] ] "idiomaDefecto" => "en" "url" => "/16656423/0000001300000001/v1_201504070131/S166564231530002X/v1_201504070131/en/main.assets" "Apartado" => null "PDF" => "https://static.elsevier.es/multimedia/16656423/0000001300000001/v1_201504070131/S166564231530002X/v1_201504070131/en/main.pdf?idApp=UINPBA00004N&text.app=https://www.elsevier.es/" "EPUB" => "https://multimedia.elsevier.es/PublicationsMultimediaV1/item/epub/S166564231530002X?idApp=UINPBA00004N" ]
Year/Month | Html | Total | |
---|---|---|---|
2024 October | 43 | 1 | 44 |
2024 September | 77 | 15 | 92 |
2024 August | 69 | 20 | 89 |
2024 July | 39 | 5 | 44 |
2024 June | 44 | 8 | 52 |
2024 May | 45 | 10 | 55 |
2024 April | 85 | 7 | 92 |
2024 March | 44 | 5 | 49 |
2024 February | 57 | 10 | 67 |
2024 January | 51 | 12 | 63 |
2023 December | 65 | 9 | 74 |
2023 November | 65 | 13 | 78 |
2023 October | 92 | 22 | 114 |
2023 September | 53 | 10 | 63 |
2023 August | 56 | 14 | 70 |
2023 July | 66 | 7 | 73 |
2023 June | 87 | 9 | 96 |
2023 May | 126 | 17 | 143 |
2023 April | 61 | 9 | 70 |
2023 March | 68 | 12 | 80 |
2023 February | 74 | 18 | 92 |
2023 January | 97 | 41 | 138 |
2022 December | 68 | 7 | 75 |
2022 November | 73 | 17 | 90 |
2022 October | 46 | 19 | 65 |
2022 September | 47 | 13 | 60 |
2022 August | 57 | 20 | 77 |
2022 July | 45 | 8 | 53 |
2022 June | 48 | 23 | 71 |
2022 May | 37 | 12 | 49 |
2022 April | 42 | 18 | 60 |
2022 March | 67 | 20 | 87 |
2022 February | 52 | 24 | 76 |
2022 January | 69 | 10 | 79 |
2021 December | 45 | 19 | 64 |
2021 November | 49 | 17 | 66 |
2021 October | 65 | 18 | 83 |
2021 September | 41 | 28 | 69 |
2021 August | 51 | 13 | 64 |
2021 July | 36 | 16 | 52 |
2021 June | 28 | 12 | 40 |
2021 May | 45 | 10 | 55 |
2021 April | 64 | 25 | 89 |
2021 March | 21 | 13 | 34 |
2021 February | 25 | 9 | 34 |
2021 January | 45 | 18 | 63 |
2020 December | 24 | 10 | 34 |
2020 November | 45 | 9 | 54 |
2020 October | 32 | 9 | 41 |
2020 September | 24 | 18 | 42 |
2020 August | 38 | 7 | 45 |
2020 July | 32 | 10 | 42 |
2020 June | 25 | 8 | 33 |
2020 May | 28 | 4 | 32 |
2020 April | 20 | 5 | 25 |
2020 March | 35 | 17 | 52 |
2020 February | 47 | 21 | 68 |
2020 January | 40 | 9 | 49 |
2019 December | 31 | 8 | 39 |
2019 November | 33 | 11 | 44 |
2019 October | 39 | 8 | 47 |
2019 September | 42 | 5 | 47 |
2019 August | 45 | 7 | 52 |
2019 July | 32 | 15 | 47 |
2019 June | 44 | 9 | 53 |
2019 May | 53 | 3 | 56 |
2019 April | 59 | 11 | 70 |
2019 March | 27 | 8 | 35 |
2019 February | 35 | 11 | 46 |
2019 January | 18 | 4 | 22 |
2018 December | 25 | 2 | 27 |
2018 November | 26 | 4 | 30 |
2018 October | 33 | 17 | 50 |
2018 September | 21 | 7 | 28 |
2018 August | 27 | 3 | 30 |
2018 July | 31 | 4 | 35 |
2018 June | 14 | 3 | 17 |
2018 May | 37 | 3 | 40 |
2018 April | 122 | 1 | 123 |
2018 March | 9 | 1 | 10 |
2018 February | 6 | 6 | 12 |
2018 January | 7 | 0 | 7 |
2017 December | 6 | 3 | 9 |
2017 November | 10 | 3 | 13 |
2017 October | 10 | 12 | 22 |
2017 September | 11 | 5 | 16 |
2017 August | 11 | 15 | 26 |
2017 July | 13 | 1 | 14 |
2017 June | 36 | 19 | 55 |
2017 May | 16 | 9 | 25 |
2017 April | 13 | 19 | 32 |
2017 March | 24 | 19 | 43 |
2017 February | 16 | 2 | 18 |
2017 January | 11 | 4 | 15 |
2016 December | 15 | 2 | 17 |
2016 November | 41 | 6 | 47 |
2016 October | 42 | 5 | 47 |
2016 September | 22 | 8 | 30 |
2016 August | 17 | 8 | 25 |
2016 July | 10 | 5 | 15 |
2016 June | 11 | 5 | 16 |
2016 May | 18 | 7 | 25 |
2016 April | 11 | 13 | 24 |
2016 March | 21 | 16 | 37 |
2016 February | 15 | 8 | 23 |
2016 January | 17 | 14 | 31 |
2015 December | 23 | 12 | 35 |
2015 November | 16 | 10 | 26 |
2015 October | 20 | 18 | 38 |
2015 September | 15 | 11 | 26 |
2015 August | 43 | 8 | 51 |
2015 July | 45 | 15 | 60 |
2015 June | 34 | 15 | 49 |
2015 May | 31 | 18 | 49 |
2015 April | 19 | 11 | 30 |