Secure And Efficient Encryption Scheme Based on Bilinear Mapping

被引:0
|
作者
Verma, Vandani [1 ]
Mishra, Pragya [1 ]
机构
[1] Amity Univ, Amity Inst Appl Sci, Noida 125, Uttar Pradesh, India
关键词
Bilinear mapping; encryption; KGC; ID-OWE; Discrete Log Problem; IDENTITY-BASED ENCRYPTION;
D O I
10.24425/ijet.2022.141262
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
With the increasing uses of internet technologies in daily life, vulnerability of personal data/information is also increasing. Performing secure communication over the channel which is insecure has always been a problem because of speedy development of various technologies. Encryption scheme provides secrecy to data by enabling only authorized user to access it. In the proposed paper, we present an encryption algorithm designed for data security based on bilinear mapping and prove it secure by providing its security theoretical proof against adaptive chosen cipher-text attack. With the help of a lemma, we have shown that no polynomially bounded adversary has non-negligible advantage in the challenging game. We also give the comparative analysis of the proposed scheme in terms of security and performance with Deng et al., 2020 and Jiang et al., 2021 schemes and prove that proposed algorithm is more efficient and secure than others existing in literature against adaptive chosen cipher-text attack.
引用
收藏
页码:469 / 473
页数:5
相关论文
共 50 条
  • [31] An Efficient Scheme for Joint Compression and Encryption
    Qiu, Lirong
    Yu, Yang
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2014, 17 (5-6) : 539 - 548
  • [32] A Provably Secure Scalable Revocable Identity-Based Signature Scheme Without Bilinear Pairings
    Wang, Changji
    Huang, Hui
    Yuan, Yuan
    SECURITY WITH INTELLIGENT COMPUTING AND BIG-DATA SERVICES, 2020, 895 : 588 - 597
  • [33] Modification of One Forward Secure Ring Signature Scheme Based on Bilinear Groups of Composite Order
    Cao, Zhengjun
    Wu, Xiangjia
    Cao, Hanyue
    2013 INTERNATIONAL CONFERENCE ON CLOUD AND SERVICE COMPUTING (CSC 2013), 2013, : 128 - 133
  • [34] An Efficient and Provably-Secure Certificateless Public Key Encryption Scheme for Telecare Medicine Information Systems
    Guo, Rui
    Wen, Qiaoyan
    Shi, Huixian
    Jin, Zhengping
    Zhang, Hua
    JOURNAL OF MEDICAL SYSTEMS, 2013, 37 (05)
  • [35] Identity Based Encryption and Biometric Authentication Scheme for Secure Data Access in Cloud Computing
    Cheng Hongbing
    Rong Chunming
    Tan Zhenghua
    Zeng Qingkai
    CHINESE JOURNAL OF ELECTRONICS, 2012, 21 (02): : 254 - 259
  • [36] A Secure and Efficient Charitable Donation System Based on Ethereum Blockchain and Searchable Encryption
    He, Buzhen
    Feng, Tao
    Fang, Junli
    Liu, Chunyan
    Su, Chunhua
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2024, 70 (01) : 263 - 276
  • [37] Chosen-Ciphertext Secure Identity-Based Encryption from Computational Bilinear Diffie-Hellman
    Galindo, David
    PAIRING-BASED CRYPTOGRAPHY-PAIRING 2010, 2010, 6487 : 367 - 376
  • [38] A Leakage-Resilient CCA-Secure Identity-Based Encryption Scheme
    Li, Jiguo
    Teng, Meilin
    Zhang, Yichen
    Yu, Qihong
    COMPUTER JOURNAL, 2016, 59 (07) : 1066 - 1075
  • [39] Secure Encryption Scheme of Amazigh Alphabet Based ECC Using Finite State Machine
    Amounas, Fatima
    El Kinani, El Hassan
    2013 NATIONAL SECURITY DAYS (JNS3), 2013,
  • [40] An Efficient Certificate-Based Encryption Scheme Without Random Oracles
    Guo, Lan
    Lu, Yang
    Miao, Qing
    Zu, Guangao
    Wang, Zhongqi
    ARTIFICIAL INTELLIGENCE AND SECURITY, ICAIS 2022, PT III, 2022, 13340 : 97 - 107