Network Security Cryptographic Protocols and Lattice Problems

Abstract

We present a new protocol for electronic cash which is designed to function on hardware with limited computing power. The scheme has provable security properties and low computational requirements, but it still gives a fair amount of privacy. Another feature of the system is that there is no master secret that could be used for counterfeiting money if stolen. We introduce the notion of hierarchical group signatures. This is a proper generalization of group signatures, which allows multiple group managers organized in a tree with the signers as leaves. For a signer that is a leaf of the sub tree of a group manager, the group manager learns which of its children that (perhaps indirectly) manages the signer

Authors and Affiliations

Dr Daruri Venugopal

Keywords

Related Articles

Irrigational Impact of Distillery Spentwash on the Growth and Yield of Graminacious Forages –Anjan Grass (Cenchrus Ciliaris), Setaria Grass (Setaria Anceps), Para Grass (Brachiaria Mutica) and Rhodes Grass (Chloris Gayana)

Studies were conducted to study the growth and yield of graminacious forages; Anjan Grass, Setaria Grass, Para Grass, and Rhodes grass irrigated with distillery spentwash of different concentration. The spentwash in the...

Risc Processor Using VHDL

Reduced Instruction Set Computer (RISC) is become a design theory that has accepted in engineering applications. Optimizing gate capacity and performance of FPGA kit. This devices provides complex logic systems to be per...

The Application of Data Mining In Online Bookstore

With the rapid development of Internet technology in recent years, Electronic Commerce has been an inevitable product of the economy, the science and the technology. This paper takes an online bookstore platform as a bac...

Performance of a 32 Channels WDM System using Gain Flattened EDFA

The gain flattening of erbium doped fiber amplifier (EDFA) is essential for their application in wavelength division multiplexing (WDM) system. This paper attempts to design and analyse a 32 channels WDM system using EDF...

Simulation and Speed Control of Induction Motor Using Fuzzy Logic PID Controller

Three phase induction motor drives have various industrial applications. In this thesis work indirect vector control technique is used which is based upon the Fuzzy PID speed controller. This method of speed control usin...

Download PDF file
  • EP ID EP221554
  • DOI -
  • Views 139
  • Downloads 0

How To Cite

Dr Daruri Venugopal (2015). Network Security Cryptographic Protocols and Lattice Problems. International journal of Emerging Trends in Science and Technology, 2(2), 1829-1834. https://europub.co.uk/articles/-A-221554