Bilinear Pairings Technique on Concrete ID-PUIC Protocol
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2017, Vol 5, Issue 6
Abstract
We propose a novel intermediary arranged information transferring and remote information uprightness checking model in identity-based public key cryptography: IDPUIC (identity-based proxy-oriented data uploading and remote data integrity checking in public cloud). We give the formal definition, framework model and security display. At that point, a solid ID-PUIC protocol is planned by utilizing the bilinear pairings. The proposed ID-PUIC protocol is provably secure in view of the hardness of CDH (computational Diffie-Hellman) issue. Our ID-PUIC protocol is additionally productive and adaptable. In view of the first customer's approval, the proposed IDPUIC protocol can understand private remote information uprightness checking, appointed remote information integrity checking and open remote information integrity checking.
Authors and Affiliations
Mandala Prem Srujan| Dept. of CSE, ELURU College of Engineering and Technology, Duggirala(V), Pedavegi(M), ELURU, Andhra Pradesh, Dr. P. Bala Krishna Prasad| Dept. of CSE, ELURU College of Engineering and Technology, Duggirala(V), Pedavegi(M), ELURU, Andhra Pradesh
Number Theory and Cryptography: An Analytical Approach
The more I have considered Computer Science, the more I see that it is truly a type of connected Mathematics. The two are regularly combined in University divisions, and numerous understudies study both for a more pr...
Power Quality Improvement in 3P4W System Using Unified Power Quality Conditioner (UPQC) with P-Q Theory
Unified power quality conditioners (UPQCs) allow the mitigation of voltage and current disturbances that could affect sensitive electrical loads while compensating the load reactive power. Diverse control techniques...
A Sensor Network Routing Protocol To Clear The Damage From Vampire Attacks During Packet Forwarding
A reason creates and transmits it to the next hop toward the destination which broadcast it additional until the destination is reached consuming resources not only at the source node but also at each node the messag...
Impact Analysis of A Car Bumper Using Carbon Fiber Reinforced PEI And S2 Glass/Epoxy Materials By Solid Works Software
Bumper is an important part which is used as protection for passengers from front and rear collision. The intend of this study was to investigate the structure and material employed for car bumper in one of the car m...
Contribution of Information Sharing In Wireless Sensor Network With Prune Delay
The increase in the number of smart phone users has lead to the increase in the peer-to-peer adhoc content sharing. Traditional data delivery schemes are not suitable for such networks due to intermittent connectivit...