Secure And Efficient Encryption Scheme Based on Bilinear Mapping

被引:0
|
作者
Verma, Vandani [1 ]
Mishra, Pragya [1 ]
机构
[1] Amity Univ, Amity Inst Appl Sci, Noida 125, Uttar Pradesh, India
关键词
Bilinear mapping; encryption; KGC; ID-OWE; Discrete Log Problem; IDENTITY-BASED ENCRYPTION;
D O I
10.24425/ijet.2022.141262
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
With the increasing uses of internet technologies in daily life, vulnerability of personal data/information is also increasing. Performing secure communication over the channel which is insecure has always been a problem because of speedy development of various technologies. Encryption scheme provides secrecy to data by enabling only authorized user to access it. In the proposed paper, we present an encryption algorithm designed for data security based on bilinear mapping and prove it secure by providing its security theoretical proof against adaptive chosen cipher-text attack. With the help of a lemma, we have shown that no polynomially bounded adversary has non-negligible advantage in the challenging game. We also give the comparative analysis of the proposed scheme in terms of security and performance with Deng et al., 2020 and Jiang et al., 2021 schemes and prove that proposed algorithm is more efficient and secure than others existing in literature against adaptive chosen cipher-text attack.
引用
收藏
页码:469 / 473
页数:5
相关论文
共 50 条
  • [31] A novel encryption scheme for secure communication based on RNA
    Muhammad Aoun
    Tehseen Mazhar
    Muhammad Asgher Nadeem
    Tariq Shahzad
    Shafiq Ur Rehman
    Ateeq Ur Rehman
    CSI Transactions on ICT, 2024, 12 (4) : 71 - 80
  • [32] A fully secure attribute based broadcast encryption scheme
    Li, Qinyi
    Zhang, Fengli
    International Journal of Network Security, 2015, 17 (03) : 263 - 271
  • [33] On the Secure Multimedia Distribution Scheme Based on Partial Encryption
    Lian, Shiguo
    Chen, Xi
    Dong, Yuan
    Wang, Haila
    2010 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, 2010,
  • [34] A Bilinear Pairing Based Secure Data Aggregation Scheme for WSNs
    Kumar, Vimal
    2019 15TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2019, : 102 - 107
  • [35] Secure Video Distribution Scheme Based on Partial Encryption
    Lian, Shiguo
    INTERNATIONAL JOURNAL OF IMAGING SYSTEMS AND TECHNOLOGY, 2009, 19 (03) : 227 - 235
  • [36] ON THE SECURE WATERMARK EMBEDDING SCHEME BASED ON SELECTIVE ENCRYPTION
    Chen, Xi
    Lian, Shiguo
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2011, 17 (02): : 205 - 217
  • [37] A secure database encryption scheme
    Sesay, S
    Yang, ZK
    Chen, JW
    Xu, D
    CCNC: 2005 2ND IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, 2005, : 49 - 53
  • [38] Provably secure secret sharing scheme based on bilinear maps
    Li, Hui-Xian
    Pang, Liao-Jun
    Tongxin Xuebao/Journal on Communications, 2008, 29 (10): : 45 - 50
  • [39] An Efficient Adaptive-ID Secure Revocable Hierarchical Identity-Based Encryption Scheme
    Wang, Changji
    Li, Yuan
    Jiang, Shengyi
    Wu, Jiayuan
    SMART COMPUTING AND COMMUNICATION, SMARTCOM 2016, 2017, 10135 : 506 - 515
  • [40] A Secure and Efficient Face-Recognition Scheme Based on Deep Neural Network and Homomorphic Encryption
    Li, Xiaodong
    Hang, Qing
    Jin, Xin
    2018 8TH INTERNATIONAL CONFERENCE ON VIRTUAL REALITY AND VISUALIZATION (ICVRV), 2018, : 53 - 57