124 research outputs found

    Identity-Based Cryptosystem Based on Tate Pairing

    Get PDF
    Tate Pairings on Elliptic curve Cryptography are important because they can be used to build efficient Identity-Based Cryptosystems, as well as their implementation essentially determines the efficiency of cryptosystems. In this work, we propose an identity-based encryption based on Tate Pairing on an elliptic curve. The scheme was chosen cipher text security in the random oracle model assuming a variant of computational problem Diff Hellman. This paper provides precise definitions to encryption schemes based on identity, it studies the construction of the underlying ground field, their extension to enhance the finite field arithmetic and presents a technique to accelerate the time feeding in Tate pairing algorithm

    Attribute-Based Encryption Scheme for Secured data Storage in Cloud Computing

    Get PDF
    This a storage security model in Cloud Computing and making a considerable measure of convincing purposes behind organizations to convey cloud-based storage. For another business, start-up costs are fundamentally decreased in light of the fact that there is no compelling reason to contribute capital in advance for an inner to help the business. By a long shot, the main inquiry customers considering a move to cloud storage ask is regardless of whether their data will be secure. Stored data offsite doesn't change data security necessities; they are the same as those confronting data put away on location. Security ought to be based on business prerequisites for particular applications and data sets, regardless of where the data is stored. We trust that data storage security in Cloud Computing, a zone brimming with challenges and of fundamental significance, is still in its earliest stages now, and numerous examination issues are yet to be distinguished. In this paper, we examined the issue of data security in cloud data storage, to guarantee the rightness of customers' data in cloud data storage. We proposed a Hierarchical Attribute-Based Secure Outsourcing for moldable Access in Cloud computing which likewise guarantees data storage security and survivability accordingly giving put stock in condition to the customers. To battle against unapproved data spillage, delicate data must be encoded before outsourcing in order to give end-to-end data confidentiality affirmation in the cloud and past. It upgrades the security in the proposed model successfully.

    FSDA: Framework for Secure Data Aggregation in Wireless Sensor Network for Enhancing Key Management

    Get PDF
    An effective key management plays a crucial role in imposing a resilient security technique in Wireless Sensor Network (WSN). After reviewing the existing approaches of key management, it is confirmed that existing approachs does not offer good coverage on all potential security breaches in WSN. With WSN being essential part of Internet-of-Things (IoT), the existing approaches of key management can definitely not address such security breaches. Therefore, this paper introduces a Framework for Secure Data Aggregation (FSDA) that hybridizes the public key encryption mechanism in order to obtain a novel key management system. The proposed system does not target any specific attacks but is widely applicable for both internal and external attacks in WSN owing to its design principle. The study outcome exhibits that proposed FSDA offers highly reduced computational burden, minimal delay, less energy consumption, and higher data transmission perforance in contrast to frequency used encryption schemes in WSN
    • …
    corecore