Secure And Efficient Encryption Scheme Based on Bilinear Mapping

被引:0
|
作者
Verma, Vandani [1 ]
Mishra, Pragya [1 ]
机构
[1] Amity Univ, Amity Inst Appl Sci, Noida 125, Uttar Pradesh, India
关键词
Bilinear mapping; encryption; KGC; ID-OWE; Discrete Log Problem; IDENTITY-BASED ENCRYPTION;
D O I
10.24425/ijet.2022.141262
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
With the increasing uses of internet technologies in daily life, vulnerability of personal data/information is also increasing. Performing secure communication over the channel which is insecure has always been a problem because of speedy development of various technologies. Encryption scheme provides secrecy to data by enabling only authorized user to access it. In the proposed paper, we present an encryption algorithm designed for data security based on bilinear mapping and prove it secure by providing its security theoretical proof against adaptive chosen cipher-text attack. With the help of a lemma, we have shown that no polynomially bounded adversary has non-negligible advantage in the challenging game. We also give the comparative analysis of the proposed scheme in terms of security and performance with Deng et al., 2020 and Jiang et al., 2021 schemes and prove that proposed algorithm is more efficient and secure than others existing in literature against adaptive chosen cipher-text attack.
引用
收藏
页码:469 / 473
页数:5
相关论文
共 50 条
  • [41] A logistic mapping-based encryption scheme for Wireless Body Area Networks
    Wang, Junchao
    Han, Kaining
    Fan, Shengwen
    Zhang, Ying
    Tan, Honghao
    Jeon, Gwanggil
    Pang, Yu
    Lin, Jinzhao
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 110 : 57 - 67
  • [42] An efficient RSA-based certificateless public key encryption scheme
    Lin, Xi-Jun
    Sun, Lin
    Qu, Haipeng
    DISCRETE APPLIED MATHEMATICS, 2018, 241 : 39 - 47
  • [43] Data Encryption Scheme Based On Adaptive System
    Najam, Shaheryar
    Rehman, Mujeeb Ur
    Ahmed, Jameel
    2020 GLOBAL CONFERENCE ON WIRELESS AND OPTICAL TECHNOLOGIES (GCWOT), 2020,
  • [44] A forward-secure public-key encryption scheme
    Canetti, R
    Halevi, S
    Katz, J
    ADVANCES IN CRYPTOLOGY-EUROCRYPT 2003, 2003, 2656 : 255 - 271
  • [45] Secure State Estimation Using Hybrid Homomorphic Encryption Scheme
    Zhang, Zhenyong
    Cheng, Peng
    Wu, Junfeng
    Chen, Jiming
    IEEE TRANSACTIONS ON CONTROL SYSTEMS TECHNOLOGY, 2021, 29 (04) : 1704 - 1720
  • [46] Towards Secure and Efficient "white-box" Encryption
    Khachatrian, Gurgen
    Abrahamyan, Sergey
    JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2019, 25 (08) : 868 - 886
  • [47] A secure image encryption scheme using chaos and wavelet transformations
    Mondal B.
    Mandal T.
    Khan D.A.
    Choudhury T.
    Recent Patents on Engineering, 2018, 12 (01) : 5 - 14
  • [48] A forward-secure public-key encryption scheme
    Canetti, Ran
    Halevi, Shai
    Katz, Jonathan
    JOURNAL OF CRYPTOLOGY, 2007, 20 (03) : 265 - 294
  • [49] An energy efficient encryption method for secure dynamic WSN
    Elhoseny, Mohamed
    Yuan, Xiaohui
    El-Minir, Hamdy K.
    Riad, Alaa Mohamed
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (13) : 2024 - 2031
  • [50] Efficient Certificateless Signature Scheme without Bilinear Pairings
    Ye, Junyao
    Wang, Yanhong
    Liu, Simin
    Wang, Yinglian
    Ye, Junyao
    3RD INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION ENGINEERING (CSIE 2015), 2015, : 19 - 23