Multiple Private Keys with NTRU Cryptosystem

Abstract

Each organization needs to protect their useful information from unauthorized users in wireless environment. Every person needs to access confidential information in less time. That means the encryption and decryption times will be as possible as minimum with providing at maximum security. It is a challenging task to meet both fastest encryption/decryption times. In Public cryptosystem, both Public and Private keys are essential to perform encryption/decryption. In this paper, we proposed a novel algorithm to generate single Public Key associated with many different multiple Private Keys by using original NTRU algorithm. Recipients can decrypt message using their own authenticated multiple Private Keys. The main advantage of our novel algorithm is to save more encryption time and computational power. Therefore, the proposed algorithm is efficient and economical in terms of computational time.

Authors and Affiliations

Dr. Rakesh Nayak, Ashok Kumar Nanda, Prof. (Dr. ) Lalit Kumar Awasthi

Keywords

Related Articles

Windows, Linux and Mac Operating system Booting Process: a Comparative Study

This paper presents a comparative study of Booting Paradigm of Windows, Linux and Mac, the three popular operating systems. Booting process is the essential and first step perform by the OS after this process executio...

Wavelet Based Dual Encoding Lossless Medical Image Compression

Medical image compression using dual encoding scheme which helps in lossless image compression and wavelet helps in increasing the sparsity of the image. Dual encoding scheme comprised with Run length Coding and 8X8...

Efficient Current Mode Multipliers in Signal Processing

This paper explains about the operation of the current mode multiplier circuits in signal processing. The multiplier/divider presents the advantage of very small linearity errors that can be obtained as a result of t...

Mycobacterium Tuberculosis Bacilli cells Recognition using Multiple Classifier

Many computer science researchers have been working on developing and designing an automated system for fast & accurate recognition of tuberculosis (TB), which would ensure speed up of treatment process. Manually for...

Comparison Study Among Various Anomaly Detection Techniques

Many approaches are implemented for the detection of anomalies on the system. Anomalies based approaches are considered as efficient from that user intention based approach is preferred for the implementation of anom...

Download PDF file
  • EP ID EP28174
  • DOI -
  • Views 253
  • Downloads 2

How To Cite

Dr. Rakesh Nayak, Ashok Kumar Nanda, Prof. (Dr. ) Lalit Kumar Awasthi (2015). Multiple Private Keys with NTRU Cryptosystem. International Journal of Research in Computer and Communication Technology, 4(3), -. https://europub.co.uk/articles/-A-28174