A Comparative study of Forward Secure Publickey Method Using HIBE and BTE
Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 4
Abstract
T h e threat of key exposure becoming more acute as yptographic computations are performed more frequently on poorly protected devices (smart-cards, mobile phones, even PCs), new techniques are needed to deal with this concern. One promising approach which we focus on here is to onstruct forward secure cryptosystems. The existence of non-trivial, orwardsecure public-key encryption (PKE) schemes,however, has been open .Forward-secure PKE has the obvious practical advantage that a compromise of the system does not mpromise the secrecy of previouslyencrypted information; it is thus appropriate for devices operating in insecure vironments. Furthermore, using such a scheme enables some measure of security against adaptive adversaries who may choose which parties to corrupt based on information learned in the course of a given protocol. We presented in this paper variant of scheme with better complexity; in particular, the publickey size and the key-generation/key-update times are independent of N . We suggested a method to achieve chosen ciphertext security for HIBE schemes using the CHK transformation . The resulting schemes are elective-ID chosen-ciphertext secure without andom oracles, based on he BTE .
Authors and Affiliations
G. Appa Rao , Srinivasan. Nagaraj , B. Prakash , Dr. V. Valli Kumari , Dr KVSVN Raju
PRODUCTIVE CO PROCESSOR DESIGN BASED ON PROGRAM BENCHMARK
The objective of this paper is to design a methodology where many co-processors are accessed by the processor in array mode. By using co processor, the work on the multi core processor gets reduced by accessing it in arr...
Robust Watermarking Scheme using Column DCT Wavelet Transform under Various Attacks
A novel watermarking scheme for color images has been proposed using column DCT wavelet transform. To improve the robustness of watermarking scheme, compressed watermark with tolerable fidelity is embedded into host imag...
The proposed quantum computational basis of deep ecology: its implications for agriculture
Quantum computation has been proposed to generate consciousness. The terms atman field and consciousness vector have also been used to describe the properties of consciousness. It has also been proposed that the human ac...
Resolving Ambiguous Entity through Context Knowledge and Fuzzy Approach
Entity extraction is considered as a fundamental step in many text mining applications such as machine translation, text summarization and text categorization. However, the major challenging issue in extracting the entit...
An Efficient Autoadaptive Edge Detection Approach for Flame and Fire Images
The determination of flame or fire edges is the process of identifying a boundary between the area where there is thermo-chemical reaction and those without. It is a precursor to image-based flame monitoring, early fire...