A Comparative study of Forward Secure Publickey Method Using HIBE and BTE
Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 4
Abstract
T h e threat of key exposure becoming more acute as yptographic computations are performed more frequently on poorly protected devices (smart-cards, mobile phones, even PCs), new techniques are needed to deal with this concern. One promising approach which we focus on here is to onstruct forward secure cryptosystems. The existence of non-trivial, orwardsecure public-key encryption (PKE) schemes,however, has been open .Forward-secure PKE has the obvious practical advantage that a compromise of the system does not mpromise the secrecy of previouslyencrypted information; it is thus appropriate for devices operating in insecure vironments. Furthermore, using such a scheme enables some measure of security against adaptive adversaries who may choose which parties to corrupt based on information learned in the course of a given protocol. We presented in this paper variant of scheme with better complexity; in particular, the publickey size and the key-generation/key-update times are independent of N . We suggested a method to achieve chosen ciphertext security for HIBE schemes using the CHK transformation . The resulting schemes are elective-ID chosen-ciphertext secure without andom oracles, based on he BTE .
Authors and Affiliations
G. Appa Rao , Srinivasan. Nagaraj , B. Prakash , Dr. V. Valli Kumari , Dr KVSVN Raju
Intrusion Detection using unsupervised learning
Clustering is the one of the efficient datamining techniques for intrusion detection. In clustering algorithm kmean clustering is widely used for intrusion detection. Because it gives efficient results incase of huge dat...
Text Summarization and Discovery of Frames and Relationship from Natural Language Text - A R&D Methodology
The paper deals with the concept of data mining whereby the data resources can be fetched and accessed accordingly with reduced time complexity. Resource sharing is an important aspect in the field of information science...
Restoration of Normal Frequency Affected by Small Load Variations Through HVDC Link Using Neuro-Fuzzy Approach
HVDC power transmission is coming up with merits to replace the EHV-AC systems. The controller inverter operation can successfully regulate the power in HVDC link leading to fulfillment of power demand in A.C. networks c...
Self-Healing in Dynamic Web Service Composition
Web service composition is defined as an orchestration of multiple web services into a single composite web service. Web service composition is done in three ways such as static web service composition, dynamic web servi...
Algorithm for Solving Job Shop Scheduling Problem Based on machine availability constraint
Typically, general job shop scheduling problems assume that working times of machines are equal, for instance eight hours a day. However, in real factories, these working times are different because the machines may have...