A Comparative study of Forward Secure Publickey Method Using HIBE and BTE

Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 4

Abstract

T h e threat of key exposure becoming more acute as yptographic computations are performed more frequently on poorly protected devices (smart-cards, mobile phones, even PCs), new techniques are needed to deal with this concern. One promising approach which we focus on here is to onstruct forward secure cryptosystems. The existence of non-trivial, orwardsecure public-key encryption (PKE) schemes,however, has been open .Forward-secure PKE has the obvious practical advantage that a compromise of the system does not mpromise the secrecy of previouslyencrypted information; it is thus appropriate for devices operating in insecure vironments. Furthermore, using such a scheme enables some measure of security against adaptive adversaries who may choose which parties to corrupt based on information learned in the course of a given protocol. We presented in this paper variant of scheme with better complexity; in particular, the publickey size and the key-generation/key-update times are independent of N . We suggested a method to achieve chosen ciphertext security for HIBE schemes using the CHK transformation . The resulting schemes are elective-ID chosen-ciphertext secure without andom oracles, based on he BTE .

Authors and Affiliations

G. Appa Rao , Srinivasan. Nagaraj , B. Prakash , Dr. V. Valli Kumari , Dr KVSVN Raju

Keywords

Related Articles

Robust Watermarking Scheme using Column DCT Wavelet Transform under Various Attacks

A novel watermarking scheme for color images has been proposed using column DCT wavelet transform. To improve the robustness of watermarking scheme, compressed watermark with tolerable fidelity is embedded into host imag...

Adaption of Proactive Measure for Improving Performance Throughput Of TCP-Vegas

TCP (Transmission Control Protocol) throughput considered to be one of the most important aspects for analyzing the performance of TCP. This article represents a novel proactive technique based Acknowledge Delay which ai...

Parent Siblings Oriented Tree Quorum Protocol

In this paper, we are proposing a new replica control algorithm Parent Siblings Oriented Tree Quorum Protocol (PSTQ) for the management of replicated data in distributed database system. This algorithm imposes a logical...

Deriving Association between Urban and Rural Students Programming Skills

Data mining is used to extract the interesting patterns from databases or repositories. Frequent Pattern Tree is a technique for discovering association between the variables and finds the frequent patterns in the Studen...

Load Balanced Routing using OSPF

Today’s Internet applications are in need of additional bandwidth. The Internet nature changes and its traffic are growing because of new applications. Initially when the file transfers dominated the internet we don’t re...

Download PDF file
  • EP ID EP160486
  • DOI -
  • Views 117
  • Downloads 0

How To Cite

G. Appa Rao, Srinivasan. Nagaraj, B. Prakash, Dr. V. Valli Kumari, Dr KVSVN Raju (2010). A Comparative study of Forward Secure Publickey Method Using HIBE and BTE. International Journal on Computer Science and Engineering, 2(4), 1371-1374. https://europub.co.uk/articles/-A-160486