Secure And Efficient Encryption Scheme Based on Bilinear Mapping

被引:0
|
作者
Verma, Vandani [1 ]
Mishra, Pragya [1 ]
机构
[1] Amity Univ, Amity Inst Appl Sci, Noida 125, Uttar Pradesh, India
关键词
Bilinear mapping; encryption; KGC; ID-OWE; Discrete Log Problem; IDENTITY-BASED ENCRYPTION;
D O I
10.24425/ijet.2022.141262
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
With the increasing uses of internet technologies in daily life, vulnerability of personal data/information is also increasing. Performing secure communication over the channel which is insecure has always been a problem because of speedy development of various technologies. Encryption scheme provides secrecy to data by enabling only authorized user to access it. In the proposed paper, we present an encryption algorithm designed for data security based on bilinear mapping and prove it secure by providing its security theoretical proof against adaptive chosen cipher-text attack. With the help of a lemma, we have shown that no polynomially bounded adversary has non-negligible advantage in the challenging game. We also give the comparative analysis of the proposed scheme in terms of security and performance with Deng et al., 2020 and Jiang et al., 2021 schemes and prove that proposed algorithm is more efficient and secure than others existing in literature against adaptive chosen cipher-text attack.
引用
收藏
页码:469 / 473
页数:5
相关论文
共 50 条
  • [1] CCA secure and efficient proxy re-encryption scheme without bilinear pairing
    Prasad, Shilpee
    Purushothama, B. R.
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 58
  • [2] CCA secure and efficient proxy re-encryption scheme without bilinear pairing
    Prasad, Shilpee
    Purushothama, B.R.
    Journal of Information Security and Applications, 2021, 58
  • [3] An Efficient and Provably Secure Certificate-Based Encryption Scheme
    Lu, Yang
    THEORETICAL AND MATHEMATICAL FOUNDATIONS OF COMPUTER SCIENCE, 2011, 164 : 54 - 61
  • [4] Secure and Efficient Code Encryption Scheme Based on Indexed Table
    Cho, Sungkyu
    Shin, Donghwi
    Jo, Heasuk
    Choi, Donghyun
    Won, Dongho
    Kim, Seungjoo
    ETRI JOURNAL, 2011, 33 (01) : 60 - 70
  • [5] An efficient and full secure identity-based encryption scheme
    Ma, Rong
    Cao, Zhen-Fu
    Shanghai Jiaotong Daxue Xuebao/Journal of Shanghai Jiaotong University, 2010, 44 (03): : 389 - 392
  • [6] A secure and efficient scheme of remote user authentication based on bilinear pairings
    Liao, Yi-Pin
    Wang, Shuenn-Shyang
    TENCON 2007 - 2007 IEEE REGION 10 CONFERENCE, VOLS 1-3, 2007, : 920 - +
  • [7] A secure and efficient fingerprint images encryption scheme
    Zhao, Song
    Li, Hengjian
    Yan, Xu
    PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE FOR YOUNG COMPUTER SCIENTISTS, VOLS 1-5, 2008, : 2803 - +
  • [8] A NEW SECURE AND EFFICIENT SCHEME OF ADPCM ENCODER BASED ON CHAOTIC ENCRYPTION
    Hamdi, Mimoun
    Hermassi, Houcemeddine
    Rhouma, Rhouma
    Belghith, Safya
    2014 1ST INTERNATIONAL CONFERENCE ON ADVANCED TECHNOLOGIES FOR SIGNAL AND IMAGE PROCESSING (ATSIP 2014), 2014, : 7 - 11
  • [9] An Efficient and Provable Secure Revocable Identity-Based Encryption Scheme
    Wang, Changji
    Li, Yuan
    Xia, Xiaonan
    Zheng, Kangjia
    PLOS ONE, 2014, 9 (09):
  • [10] Secure and Efficient Authentication Scheme for Mobile Sink in WSNs Based on Bilinear Pairings
    Zhang, Junsong
    Li, Xiong
    Ma, Jian
    Wang, Wendong
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2014,