Secure And Efficient Encryption Scheme Based on Bilinear Mapping

被引:0
|
作者
Verma, Vandani [1 ]
Mishra, Pragya [1 ]
机构
[1] Amity Univ, Amity Inst Appl Sci, Noida 125, Uttar Pradesh, India
关键词
Bilinear mapping; encryption; KGC; ID-OWE; Discrete Log Problem; IDENTITY-BASED ENCRYPTION;
D O I
10.24425/ijet.2022.141262
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
With the increasing uses of internet technologies in daily life, vulnerability of personal data/information is also increasing. Performing secure communication over the channel which is insecure has always been a problem because of speedy development of various technologies. Encryption scheme provides secrecy to data by enabling only authorized user to access it. In the proposed paper, we present an encryption algorithm designed for data security based on bilinear mapping and prove it secure by providing its security theoretical proof against adaptive chosen cipher-text attack. With the help of a lemma, we have shown that no polynomially bounded adversary has non-negligible advantage in the challenging game. We also give the comparative analysis of the proposed scheme in terms of security and performance with Deng et al., 2020 and Jiang et al., 2021 schemes and prove that proposed algorithm is more efficient and secure than others existing in literature against adaptive chosen cipher-text attack.
引用
收藏
页码:469 / 473
页数:5
相关论文
共 50 条
  • [21] Watermarking and Encryption Scheme to Secure Multimedia Information
    Farah, Tarek
    Hermassi, Houcemeddine
    Rhoouma, Rhoouma
    Belghith, Safya
    WORLD CONGRESS ON COMPUTER & INFORMATION TECHNOLOGY (WCCIT 2013), 2013,
  • [22] Anonymous and provably secure certificateless multireceiver encryption without bilinear pairing
    Islam, S. K. Hafizul
    Khan, Muhammad Khurram
    Al-Khouri, Ali M.
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (13) : 2214 - 2231
  • [23] An Efficient & Secure Encryption Scheme for Biometric Data Using Holmes Map & Singular Value Decomposition
    Mehta, Garima
    Dutta, Malay Kishore
    Kim, Pyung Soo
    2014 INTERNATIONAL CONFERENCE ON MEDICAL IMAGING, M-HEALTH & EMERGING COMMUNICATION SYSTEMS (MEDCOM), 2015, : 211 - 215
  • [24] Efficient and Fully Secure Forward Secure Ciphertext-Policy Attribute-Based Encryption
    Kitagawa, Takashi
    Kojima, Hiroki
    Attrapadung, Nuttapong
    Imai, Hideki
    INFORMATION SECURITY (ISC 2013), 2015, 7807 : 87 - 99
  • [25] Efficient and Secure Long-Distance Quantum Key Distribution by using a Proxy Encryption Scheme
    Sundar, K.
    Sasikumar, S.
    Jayakumar, C.
    Nagarajan, D.
    MULTIMEDIA TOOLS AND APPLICATIONS, 2024, 83 (34) : 80285 - 80298
  • [26] Encryption-Based Attack Detection Scheme for Multisensor Secure Fusion Estimation
    Li, Tongxiang
    Weng, Pindi
    Chen, Bo
    Zhang, Dongping
    Yu, Li
    IEEE TRANSACTIONS ON AEROSPACE AND ELECTRONIC SYSTEMS, 2024, 60 (05) : 7548 - 7554
  • [27] An Efficient and Secure Outsourcing Algorithm for Bilinear Pairing Computation
    Luo, Xiaoshuang
    Yang, Xiaoyuan
    Niu, Xiangzhou
    ADVANCES IN INTERNETWORKING, DATA & WEB TECHNOLOGIES, EIDWT-2017, 2018, 6 : 328 - 339
  • [28] A strong provably secure IBE scheme without bilinear map
    Zheng, Minghui
    Xiang, Yang
    Zhou, Huihua
    JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2015, 81 (01) : 125 - 131
  • [29] Efficient and adaptively secure broadcast encryption systems
    Zhang, Mingwu
    Yang, Bo
    Chen, Zhenhua
    Takagi, Tsuyoshi
    SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (08) : 1044 - 1052
  • [30] Provably secure certificateless deniable authenticated encryption scheme
    Kar, Jayaprakash
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 54