Secure And Efficient Encryption Scheme Based on Bilinear Mapping

被引:0
|
作者
Verma, Vandani [1 ]
Mishra, Pragya [1 ]
机构
[1] Amity Univ, Amity Inst Appl Sci, Noida 125, Uttar Pradesh, India
关键词
Bilinear mapping; encryption; KGC; ID-OWE; Discrete Log Problem; IDENTITY-BASED ENCRYPTION;
D O I
10.24425/ijet.2022.141262
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
With the increasing uses of internet technologies in daily life, vulnerability of personal data/information is also increasing. Performing secure communication over the channel which is insecure has always been a problem because of speedy development of various technologies. Encryption scheme provides secrecy to data by enabling only authorized user to access it. In the proposed paper, we present an encryption algorithm designed for data security based on bilinear mapping and prove it secure by providing its security theoretical proof against adaptive chosen cipher-text attack. With the help of a lemma, we have shown that no polynomially bounded adversary has non-negligible advantage in the challenging game. We also give the comparative analysis of the proposed scheme in terms of security and performance with Deng et al., 2020 and Jiang et al., 2021 schemes and prove that proposed algorithm is more efficient and secure than others existing in literature against adaptive chosen cipher-text attack.
引用
收藏
页码:469 / 473
页数:5
相关论文
共 50 条
  • [21] An efficient scheme to secure VLC codeword concatenations for video encryption
    Li, W
    Xu, ZQ
    Yao, Y
    VISUAL COMMUNICATIONS AND IMAGE PROCESSING 2005, PTS 1-4, 2005, 5960 : 953 - 960
  • [22] A SECURE AND EFFICIENT ORDER PRESERVING ENCRYPTION SCHEME FOR RELATIONAL DATABASES
    Kadhem, Hasan
    Amagasa, Toshiyuki
    Kitagawa, Hiroyuki
    KMIS 2010: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON KNOWLEDGE MANAGEMENT AND INFORMATION SHARING, 2010, : 25 - 35
  • [23] An Efficient CPA-Secure Encryption Scheme with Equality Test
    Jiang, Han
    Xu, Qiuliang
    Liu, Changyuan
    Liu, Zhe
    2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE) AND IEEE/IFIP INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (EUC), VOL 2, 2017, : 38 - 45
  • [24] Secure and Efficient Personal Health Record Scheme Using Attribute-Based Encryption
    Fan, Kai
    Huang, Nana
    Wang, Yue
    Li, Hui
    Yang, Yintang
    2015 IEEE 2ND INTERNATIONAL CONFERENCE ON CYBER SECURITY AND CLOUD COMPUTING (CSCLOUD), 2015, : 111 - 114
  • [25] Secure and efficient certificateless aggregate signature scheme from bilinear pairings
    Gayathri, N. B.
    Gowri, T.
    Reddy, P. Vasudeva
    INFORMATION SECURITY JOURNAL, 2019, 28 (06): : 149 - 163
  • [26] High efficient key-insulated attribute based encryption scheme without bilinear pairing operations
    Hong, Hanshu
    Sun, Zhixin
    SPRINGERPLUS, 2016, 5 : 1 - 12
  • [27] A Secure and Lightweight Chaos Based Image Encryption Scheme
    Khan, Fadia Ali
    Ahmed, Jameel
    Alqahtani, Fehaid
    Alsuhibany, Suliman A.
    Ahmed, Fawad
    Ahmad, Jawad
    CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 73 (01): : 279 - 294
  • [28] Secure Convertible Authenticated Encryption Scheme Based on RSA
    Wu, Tzong-Sun
    Lin, Han-Yu
    INFORMATICA-JOURNAL OF COMPUTING AND INFORMATICS, 2009, 33 (04): : 481 - 486
  • [29] A secure encryption scheme based on certificateless proxy signature
    Sudharani K.
    Sakthivel P.N.K.
    Sudharani, K. (ksudharani.shagthi@gmail.com), 2018, Inderscience Publishers (07) : 40 - 64
  • [30] Secure signals transmission based on Quaternion Encryption Scheme
    Nagase, T
    Komata, M
    Araki, T
    18TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 2 (REGULAR PAPERS), PROCEEDINGS, 2004, : 35 - 38