A Comparative study of Forward Secure Publickey Method Using HIBE and BTE

Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 4

Abstract

T h e threat of key exposure becoming more acute as yptographic computations are performed more frequently on poorly protected devices (smart-cards, mobile phones, even PCs), new techniques are needed to deal with this concern. One promising approach which we focus on here is to onstruct forward secure cryptosystems. The existence of non-trivial, orwardsecure public-key encryption (PKE) schemes,however, has been open .Forward-secure PKE has the obvious practical advantage that a compromise of the system does not mpromise the secrecy of previouslyencrypted information; it is thus appropriate for devices operating in insecure vironments. Furthermore, using such a scheme enables some measure of security against adaptive adversaries who may choose which parties to corrupt based on information learned in the course of a given protocol. We presented in this paper variant of scheme with better complexity; in particular, the publickey size and the key-generation/key-update times are independent of N . We suggested a method to achieve chosen ciphertext security for HIBE schemes using the CHK transformation . The resulting schemes are elective-ID chosen-ciphertext secure without andom oracles, based on he BTE .

Authors and Affiliations

G. Appa Rao , Srinivasan. Nagaraj , B. Prakash , Dr. V. Valli Kumari , Dr KVSVN Raju

Keywords

Related Articles

Fuzzy time series forecasting of wheat production

The present study provides a foundation for the development and application of fuzzy time series model for short term agricultural production forecasting. The present study can provide an advantageous basis to Farm admin...

A Probabilistic Approach of Coverage prediction in Mobile Ad hoc Networks

A fundamental issue arising in mobile ad-hoc networks (MANETs) is the selection of the optimal path between any two nodes. It’s very difficult to select of optimal path due to different factors affects the stability of t...

Human Gait Recognition Using Bezier Curves

Gait recognition refers to automatic identification of an individual based on the style of walking. It is a new biometrics recognition technology. It has accomplished a series of achievements in scientific research in re...

Mobile Wireless Enhanced Routing Protocol in Adhoc Networks

Adhoc network consists of peer-to-peer communicating nodes that are highly mobile. As such, an ad-hoc network lacks nfrastructure and the topology of the network changes ynamically. The task of routing data from a source...

SEVERITY BASED CODE OPTIMIZATION : A DATA MINING APPROACH

Billions of lines of code are currently running in Legacy systems, mainly running machine critical systems. Large organizations and as well as small organizations extensively rely on IT infrastructure as the backbone. Th...

Download PDF file
  • EP ID EP160486
  • DOI -
  • Views 109
  • Downloads 0

How To Cite

G. Appa Rao, Srinivasan. Nagaraj, B. Prakash, Dr. V. Valli Kumari, Dr KVSVN Raju (2010). A Comparative study of Forward Secure Publickey Method Using HIBE and BTE. International Journal on Computer Science and Engineering, 2(4), 1371-1374. https://europub.co.uk/articles/-A-160486