Multiple Private Keys with NTRU Cryptosystem
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2015, Vol 4, Issue 3
Abstract
Each organization needs to protect their useful information from unauthorized users in wireless environment. Every person needs to access confidential information in less time. That means the encryption and decryption times will be as possible as minimum with providing at maximum security. It is a challenging task to meet both fastest encryption/decryption times. In Public cryptosystem, both Public and Private keys are essential to perform encryption/decryption. In this paper, we proposed a novel algorithm to generate single Public Key associated with many different multiple Private Keys by using original NTRU algorithm. Recipients can decrypt message using their own authenticated multiple Private Keys. The main advantage of our novel algorithm is to save more encryption time and computational power. Therefore, the proposed algorithm is efficient and economical in terms of computational time.
Authors and Affiliations
Dr. Rakesh Nayak, Ashok Kumar Nanda, Prof. (Dr. ) Lalit Kumar Awasthi
Embedding of Data in Motion Vectors by Using Steganography Concept
This paper applies steganography algorithm in videos. In the proposed method, we take GOP techniques which are nothing but video algorithms so we use advantage of prediction types of MPEG bit streams to embed waterma...
A New Hybrid Automated Tarrif System For Grid Conneted Solar Powe Plants
Recently consumption or release of more energy in various forms in both households and industrial, malls, etc are became a big challenge to the researchers. In this work we developed a method to manage such energy in...
Comparing Tesseract results with and without Character localization for Smartphone application
Tesseract is considered the most accurate free OCR engine in existence. Android operating system based Smartphones application where images taken from camera of mobile device or browsed from gallery are preprocessed....
Local Sharing of Multiple Torrents in Peer to Peer System
The rapid growth traffic of Peer-toPeer applications, especially BitTorrent, is putting a lot of pressure to Internet Service Providers. In this paper, we examine the existence of the locality through a large-scale hy...
NFC: A review of technology, tags, applications and security
Smart phones are on a course to becoming a need instead of just a want as users are integrating the devices into every aspect of their lives. Smart phones adoption also increases due to the convergence of value-added...