Network Security Cryptographic Protocols and Lattice Problems

Abstract

We present a new protocol for electronic cash which is designed to function on hardware with limited computing power. The scheme has provable security properties and low computational requirements, but it still gives a fair amount of privacy. Another feature of the system is that there is no master secret that could be used for counterfeiting money if stolen. We introduce the notion of hierarchical group signatures. This is a proper generalization of group signatures, which allows multiple group managers organized in a tree with the signers as leaves. For a signer that is a leaf of the sub tree of a group manager, the group manager learns which of its children that (perhaps indirectly) manages the signer

Authors and Affiliations

Dr Daruri Venugopal

Keywords

Related Articles

Exceedance Level of Air Pollutants in an Urban Area as a Tool for Designing Air Purifiers

The air pollution exceedance status of an urban area has been studied for three different location for six different air pollutants such as Sulphur dioxide (SO2), Oxides of nitrogen (NOx), by Wet chemical method (West &...

Monitering System for Human Activity

Healthcare costs is increase as age increase. The healthcare system is now transfer into system in which continuous monitoring of patient is possible. Without hospitalization continuous monitoring of patients is possible...

Ocular Trauma

Ocular trauma is one of the important causes of unilateral blindness and visual impairment across the world. In developed countries, most injuries are accidental, while assaults predominate as a cause in developing count...

Experimental Study of use of Solar Energy for the Effluent Treatment by Using Flat Plate Collector

The survey has made an attempt to find the impact of effluent in the environment. It is observed that the evaporation on black body flat plate more effectively during summer with very high evaporation rate and moderate e...

Optimization of Truck Chassis for Frequency Response

FE analysis provides an optimal and quick way to optimize the structural design of any vehicle. When considering the structural design of a vehicle, chassis design plays an important role for all the parts are attached t...

Download PDF file
  • EP ID EP221554
  • DOI -
  • Views 146
  • Downloads 0

How To Cite

Dr Daruri Venugopal (2015). Network Security Cryptographic Protocols and Lattice Problems. International journal of Emerging Trends in Science and Technology, 2(2), 1829-1834. https://europub.co.uk/articles/-A-221554