A System to Minimize The Storing And Managing Secret Keys Expense Using KAC
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2015, Vol 4, Issue 10
Abstract
Emerging new computing technology cloud offering storage services. But now focus of data sharing with others in secure and efficient manner. For this the new expandable public-key cryptosystems which derives fixed-size ciphertexts .In this transforming multiple keys as single secret key. The generated single secret key sent to others or be stored in a smart card with very limited secure storage. We provide if a user needs to classify his ciphertexts into more Than n classes, he can register for additional key pairs. Each class now is indexed by a 2-level index and the number of classes is increased by n for each added key. For our approach, at most 2 aggregate keys are needed. Eventually our approach is flexible and effective.
Authors and Affiliations
Nageswara Rao. M, K Rajesh
Performance Evaluation of different Routing Algorithm in Wireless Ad hoc Networks
A mobile ad hoc network consists of wireless hosts and the movement of hosts results in a change in routes. There are many routing protocols proposed by different researchers but to determine which one work efficient...
Secured Bluetooth Authentication Using Artificial Neural Networks
Authentication in wireless networking is a mechanism to proof identities and avoid masking. The use of wireless devices and technology has made rapid growth in the market. In all such devices, user authentication is...
Extended Public Key Cryptosystem and Aggregate Key for Secure data Sharing In Cloud
Information sharing is a basic usefulness in cloud storage. We exhibit how to immovably, powerfully, and straight forwardly impart information to others in cloud storage. Cryptographic frameworks are more versatile a...
Digital Video Frame Rate Up-Conversion Based on Modified Block Matching Technique
This paper presents a novel digital video frame rate up-conversion technique based on modified block matching algorithm. The primary target is to achieve an observable improvement in the test video playback quality (in...
An Attack-Resilient Computation Algorithm To Compute Successful Aggregates In The Presence Of Attacks
In-network data aggregation can decrease the amount of communication and hence the energy consumed especially in large WSNs. The main idea is to unite partial results at intermediate nodes during message routing. One...