A Comparative study of Forward Secure Publickey Method Using HIBE and BTE

Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 4

Abstract

T h e threat of key exposure becoming more acute as yptographic computations are performed more frequently on poorly protected devices (smart-cards, mobile phones, even PCs), new techniques are needed to deal with this concern. One promising approach which we focus on here is to onstruct forward secure cryptosystems. The existence of non-trivial, orwardsecure public-key encryption (PKE) schemes,however, has been open .Forward-secure PKE has the obvious practical advantage that a compromise of the system does not mpromise the secrecy of previouslyencrypted information; it is thus appropriate for devices operating in insecure vironments. Furthermore, using such a scheme enables some measure of security against adaptive adversaries who may choose which parties to corrupt based on information learned in the course of a given protocol. We presented in this paper variant of scheme with better complexity; in particular, the publickey size and the key-generation/key-update times are independent of N . We suggested a method to achieve chosen ciphertext security for HIBE schemes using the CHK transformation . The resulting schemes are elective-ID chosen-ciphertext secure without andom oracles, based on he BTE .

Authors and Affiliations

G. Appa Rao , Srinivasan. Nagaraj , B. Prakash , Dr. V. Valli Kumari , Dr KVSVN Raju

Keywords

Related Articles

An Exact Algorithm for Multi – Product Bulk Transportation Problem

The paper investigates an NP-Hard nature Problem, where several commodities are produced in several plant sites with capacity constraints, and distributed to several destination sites according to demands and transportat...

A Comprehensive Assessment of Object-Oriented Software Systems Using Metrics Approach

Demand for efficient software is increasing day by day and bject-oriented design technique became able to fulfill this demand because it is the most powerful mechanism to develop efficient software systems. It can not o...

A Quantitative Measure for Object Oriented Design Approach for Large-Scale Systems

Object Oriented development methodology is a trend in software development for complex systems. The architecture of the application domain depends on the nature of problem statement in hand. Success depends on the overal...

A SURVEY:”MALNUTRITION FOR WOMEN” 

The term malnutrition generally refers both to under nutrition and over nutrition Many factors can cause malnutrition, most of which relate to poor diet or severe and repeated infections, particularly in underprivileged...

SOFTWARE ARCHITECTURE RECOVERY WITH ERROR TOLERANCE AND PENALTY COST IN GRAPH MINING

In the vast literature Software architecture has been recovered through graphs During Software Architecture recovery generally matching will takes place between Source graph and Query graph. Graph matching is one of the...

Download PDF file
  • EP ID EP160486
  • DOI -
  • Views 126
  • Downloads 0

How To Cite

G. Appa Rao, Srinivasan. Nagaraj, B. Prakash, Dr. V. Valli Kumari, Dr KVSVN Raju (2010). A Comparative study of Forward Secure Publickey Method Using HIBE and BTE. International Journal on Computer Science and Engineering, 2(4), 1371-1374. https://europub.co.uk/articles/-A-160486