Secure And Efficient Encryption Scheme Based on Bilinear Mapping

被引:0
|
作者
Verma, Vandani [1 ]
Mishra, Pragya [1 ]
机构
[1] Amity Univ, Amity Inst Appl Sci, Noida 125, Uttar Pradesh, India
关键词
Bilinear mapping; encryption; KGC; ID-OWE; Discrete Log Problem; IDENTITY-BASED ENCRYPTION;
D O I
10.24425/ijet.2022.141262
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
With the increasing uses of internet technologies in daily life, vulnerability of personal data/information is also increasing. Performing secure communication over the channel which is insecure has always been a problem because of speedy development of various technologies. Encryption scheme provides secrecy to data by enabling only authorized user to access it. In the proposed paper, we present an encryption algorithm designed for data security based on bilinear mapping and prove it secure by providing its security theoretical proof against adaptive chosen cipher-text attack. With the help of a lemma, we have shown that no polynomially bounded adversary has non-negligible advantage in the challenging game. We also give the comparative analysis of the proposed scheme in terms of security and performance with Deng et al., 2020 and Jiang et al., 2021 schemes and prove that proposed algorithm is more efficient and secure than others existing in literature against adaptive chosen cipher-text attack.
引用
收藏
页码:469 / 473
页数:5
相关论文
共 50 条
  • [1] An Efficient and Provably Secure Certificate-Based Encryption Scheme
    Lu, Yang
    THEORETICAL AND MATHEMATICAL FOUNDATIONS OF COMPUTER SCIENCE, 2011, 164 : 54 - 61
  • [2] An efficient and secure aggregation encryption scheme in edge computing
    Wu, Junhua
    Sheng, Xiaofei
    Li, Guangshun
    Yu, Kan
    Liu, Junke
    CHINA COMMUNICATIONS, 2022, 19 (03) : 245 - 257
  • [3] An Approach for Efficient and Secure Data Encryption Scheme for Spatial Data
    Reddy N.C.S.
    Madhuravani B.
    Sneha D.P.
    SN Computer Science, 2020, 1 (3)
  • [4] Efficient Forward-Secure Identity-Based Encryption Scheme in the Standard Model
    Lu, Yang
    THEORETICAL AND MATHEMATICAL FOUNDATIONS OF COMPUTER SCIENCE, 2011, 164 : 62 - 69
  • [5] Efficient and secure identity-based encryption scheme with equality test in cloud computing
    Wu, Libing
    Zhang, Yubo
    Choo, Kim-Kwang Raymond
    He, Debiao
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2017, 73 : 22 - 31
  • [6] A secure database encryption scheme
    Sesay, S
    Yang, ZK
    Chen, JW
    Xu, D
    CCNC: 2005 2ND IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, 2005, : 49 - 53
  • [7] Enhanced Certificate-Based Encryption Scheme without Bilinear Pairings
    Lu, Yang
    Zhang, Quanling
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2016, 10 (02): : 881 - 896
  • [8] An Improved Identity-Based Encryption Scheme without Bilinear Map
    Zheng, Minghui
    Zhou, Huihua
    Cui, Guohua
    MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 374 - 377
  • [9] Efficient Certificateless Anonymous Multi-Receiver Encryption Scheme without Bilinear Parings
    Gao, Ronghai
    Zeng, Jiwen
    Deng, Lunzhi
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2018, 2018
  • [10] A lightweight and efficient encryption scheme based on LFSR
    Wu, Guangfu
    Wang, Keke
    Zhang, Jinjun
    He, Jiguang
    INTERNATIONAL JOURNAL OF EMBEDDED SYSTEMS, 2018, 10 (03) : 225 - 232