Submit Search
Upload
IRJET- Improved Identity-based Anonymous Broadcast Encryption with Chosen Ciphertext Security
•
0 likes
•
11 views
IRJET Journal
Follow
https://www.irjet.net/archives/V6/i9/IRJET-V6I9342.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 8
Download now
Download to read offline
Recommended
전력 계통망에 있어서 보안일반 및 이슈와 기술 그리고 정책 방향-소셜 네트워크 서비스 등 차세대 기술 환경 맥락으로-
전력 계통망에 있어서 보안일반 및 이슈와 기술 그리고 정책 방향-소셜 네트워크 서비스 등 차세대 기술 환경 맥락으로-
JM code group
A Location Based Cryptosystem For Mobile Devices Using Improved Rabin Algorithm
A Location Based Cryptosystem For Mobile Devices Using Improved Rabin Algorithm
Editor IJMTER
A Review Study on Secure Authentication in Mobile System
A Review Study on Secure Authentication in Mobile System
Editor IJCATR
V01 i010410
V01 i010410
IJARBEST JOURNAL
REAL-TIME MODE HOPPING OF BLOCK CIPHER ALGORITHMS FOR MOBILE STREAMING
REAL-TIME MODE HOPPING OF BLOCK CIPHER ALGORITHMS FOR MOBILE STREAMING
ijwmn
Privacy & Security Aspects in Mobile Networks
Privacy & Security Aspects in Mobile Networks
DefCamp
IEEE Projects 2012-2013 Network Security
IEEE Projects 2012-2013 Network Security
SBGC
Network security java ieee projects 2012 @ Seabirds ( Trichy, Pudukkottai, Ta...
Network security java ieee projects 2012 @ Seabirds ( Trichy, Pudukkottai, Ta...
SBGC
Recommended
전력 계통망에 있어서 보안일반 및 이슈와 기술 그리고 정책 방향-소셜 네트워크 서비스 등 차세대 기술 환경 맥락으로-
전력 계통망에 있어서 보안일반 및 이슈와 기술 그리고 정책 방향-소셜 네트워크 서비스 등 차세대 기술 환경 맥락으로-
JM code group
A Location Based Cryptosystem For Mobile Devices Using Improved Rabin Algorithm
A Location Based Cryptosystem For Mobile Devices Using Improved Rabin Algorithm
Editor IJMTER
A Review Study on Secure Authentication in Mobile System
A Review Study on Secure Authentication in Mobile System
Editor IJCATR
V01 i010410
V01 i010410
IJARBEST JOURNAL
REAL-TIME MODE HOPPING OF BLOCK CIPHER ALGORITHMS FOR MOBILE STREAMING
REAL-TIME MODE HOPPING OF BLOCK CIPHER ALGORITHMS FOR MOBILE STREAMING
ijwmn
Privacy & Security Aspects in Mobile Networks
Privacy & Security Aspects in Mobile Networks
DefCamp
IEEE Projects 2012-2013 Network Security
IEEE Projects 2012-2013 Network Security
SBGC
Network security java ieee projects 2012 @ Seabirds ( Trichy, Pudukkottai, Ta...
Network security java ieee projects 2012 @ Seabirds ( Trichy, Pudukkottai, Ta...
SBGC
169
169
vivatechijri
Ijmet 10 01_020
Ijmet 10 01_020
IAEME Publication
Transmitting bulk amount of data in the form of qr code with cbfsc and chunki
Transmitting bulk amount of data in the form of qr code with cbfsc and chunki
IAEME Publication
Moving From Contactless to Wireless Technologies in Secure, Over-the-Air Tran...
Moving From Contactless to Wireless Technologies in Secure, Over-the-Air Tran...
Underwriters Laboratories
DNA computing based stream cipher for internet of things using MQTT protocol
DNA computing based stream cipher for internet of things using MQTT protocol
IJECEIAES
Hardware based cryptography: technological advances for applications in Colom...
Hardware based cryptography: technological advances for applications in Colom...
IJECEIAES
Security of rabin p key encapsulation mechanism
Security of rabin p key encapsulation mechanism
Conference Papers
AVAILABILITY ASPECTS THROUGH OPTIMIZATION TECHNIQUES BASED OUTLIER DETECTION ...
AVAILABILITY ASPECTS THROUGH OPTIMIZATION TECHNIQUES BASED OUTLIER DETECTION ...
IJCNCJournal
Security in MANET based on PKI using fuzzy function
Security in MANET based on PKI using fuzzy function
IOSR Journals
DATA SECURITY IN MOBILE DEVICES BY GEO LOCKING
DATA SECURITY IN MOBILE DEVICES BY GEO LOCKING
IJNSA Journal
Efficient authentication for mobile and pervasive computing
Efficient authentication for mobile and pervasive computing
IGEEKS TECHNOLOGIES
177 181
177 181
Editor IJARCET
An Encryption Algorithm To Evaluate Performance Of V2v Communication In Vanet
An Encryption Algorithm To Evaluate Performance Of V2v Communication In Vanet
ijcisjournal
Identity-Based Key Management in MANETs Using Public Key Cryptography
Identity-Based Key Management in MANETs Using Public Key Cryptography
CSCJournals
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
ijiert bestjournal
CNS Solution
CNS Solution
Nitin Kanzariya
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
Editor IJMTER
Efficient authentication for mobile and pervasive computing
Efficient authentication for mobile and pervasive computing
Adz91 Digital Ads Pvt Ltd
Authentication Mechanisms For Signature Based Cryptography By Using Hierarchi...
Authentication Mechanisms For Signature Based Cryptography By Using Hierarchi...
Editor IJMTER
Secure system based on recombined fingerprints for sharing multimedia files i...
Secure system based on recombined fingerprints for sharing multimedia files i...
eSAT Journals
An Identity-Based Mutual Authentication with Key Agreement
An Identity-Based Mutual Authentication with Key Agreement
ijtsrd
Secure Supervised Learning-Based Smart Home Authentication Framework
Secure Supervised Learning-Based Smart Home Authentication Framework
IJCNCJournal
More Related Content
What's hot
169
169
vivatechijri
Ijmet 10 01_020
Ijmet 10 01_020
IAEME Publication
Transmitting bulk amount of data in the form of qr code with cbfsc and chunki
Transmitting bulk amount of data in the form of qr code with cbfsc and chunki
IAEME Publication
Moving From Contactless to Wireless Technologies in Secure, Over-the-Air Tran...
Moving From Contactless to Wireless Technologies in Secure, Over-the-Air Tran...
Underwriters Laboratories
DNA computing based stream cipher for internet of things using MQTT protocol
DNA computing based stream cipher for internet of things using MQTT protocol
IJECEIAES
Hardware based cryptography: technological advances for applications in Colom...
Hardware based cryptography: technological advances for applications in Colom...
IJECEIAES
Security of rabin p key encapsulation mechanism
Security of rabin p key encapsulation mechanism
Conference Papers
AVAILABILITY ASPECTS THROUGH OPTIMIZATION TECHNIQUES BASED OUTLIER DETECTION ...
AVAILABILITY ASPECTS THROUGH OPTIMIZATION TECHNIQUES BASED OUTLIER DETECTION ...
IJCNCJournal
Security in MANET based on PKI using fuzzy function
Security in MANET based on PKI using fuzzy function
IOSR Journals
DATA SECURITY IN MOBILE DEVICES BY GEO LOCKING
DATA SECURITY IN MOBILE DEVICES BY GEO LOCKING
IJNSA Journal
Efficient authentication for mobile and pervasive computing
Efficient authentication for mobile and pervasive computing
IGEEKS TECHNOLOGIES
177 181
177 181
Editor IJARCET
An Encryption Algorithm To Evaluate Performance Of V2v Communication In Vanet
An Encryption Algorithm To Evaluate Performance Of V2v Communication In Vanet
ijcisjournal
Identity-Based Key Management in MANETs Using Public Key Cryptography
Identity-Based Key Management in MANETs Using Public Key Cryptography
CSCJournals
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
ijiert bestjournal
CNS Solution
CNS Solution
Nitin Kanzariya
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
Editor IJMTER
Efficient authentication for mobile and pervasive computing
Efficient authentication for mobile and pervasive computing
Adz91 Digital Ads Pvt Ltd
Authentication Mechanisms For Signature Based Cryptography By Using Hierarchi...
Authentication Mechanisms For Signature Based Cryptography By Using Hierarchi...
Editor IJMTER
Secure system based on recombined fingerprints for sharing multimedia files i...
Secure system based on recombined fingerprints for sharing multimedia files i...
eSAT Journals
What's hot
(20)
169
169
Ijmet 10 01_020
Ijmet 10 01_020
Transmitting bulk amount of data in the form of qr code with cbfsc and chunki
Transmitting bulk amount of data in the form of qr code with cbfsc and chunki
Moving From Contactless to Wireless Technologies in Secure, Over-the-Air Tran...
Moving From Contactless to Wireless Technologies in Secure, Over-the-Air Tran...
DNA computing based stream cipher for internet of things using MQTT protocol
DNA computing based stream cipher for internet of things using MQTT protocol
Hardware based cryptography: technological advances for applications in Colom...
Hardware based cryptography: technological advances for applications in Colom...
Security of rabin p key encapsulation mechanism
Security of rabin p key encapsulation mechanism
AVAILABILITY ASPECTS THROUGH OPTIMIZATION TECHNIQUES BASED OUTLIER DETECTION ...
AVAILABILITY ASPECTS THROUGH OPTIMIZATION TECHNIQUES BASED OUTLIER DETECTION ...
Security in MANET based on PKI using fuzzy function
Security in MANET based on PKI using fuzzy function
DATA SECURITY IN MOBILE DEVICES BY GEO LOCKING
DATA SECURITY IN MOBILE DEVICES BY GEO LOCKING
Efficient authentication for mobile and pervasive computing
Efficient authentication for mobile and pervasive computing
177 181
177 181
An Encryption Algorithm To Evaluate Performance Of V2v Communication In Vanet
An Encryption Algorithm To Evaluate Performance Of V2v Communication In Vanet
Identity-Based Key Management in MANETs Using Public Key Cryptography
Identity-Based Key Management in MANETs Using Public Key Cryptography
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
CNS Solution
CNS Solution
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
Efficient authentication for mobile and pervasive computing
Efficient authentication for mobile and pervasive computing
Authentication Mechanisms For Signature Based Cryptography By Using Hierarchi...
Authentication Mechanisms For Signature Based Cryptography By Using Hierarchi...
Secure system based on recombined fingerprints for sharing multimedia files i...
Secure system based on recombined fingerprints for sharing multimedia files i...
Similar to IRJET- Improved Identity-based Anonymous Broadcast Encryption with Chosen Ciphertext Security
An Identity-Based Mutual Authentication with Key Agreement
An Identity-Based Mutual Authentication with Key Agreement
ijtsrd
Secure Supervised Learning-Based Smart Home Authentication Framework
Secure Supervised Learning-Based Smart Home Authentication Framework
IJCNCJournal
Secure Supervised Learning-Based Smart Home Authentication Framework
Secure Supervised Learning-Based Smart Home Authentication Framework
IJCNCJournal
Secure Supervised Learning-Based Smart Home Authentication Framework
Secure Supervised Learning-Based Smart Home Authentication Framework
IJCNCJournal
SECURE CLOUD STORAGE USING DENIABLE ATTRIBUTE BASED ENCRYPTION
SECURE CLOUD STORAGE USING DENIABLE ATTRIBUTE BASED ENCRYPTION
adeij1
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
IRJET Journal
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
irjes
SIGNCRYPTION SCHEME BASED ON SCHNORR DIGITAL SIGNATURE
SIGNCRYPTION SCHEME BASED ON SCHNORR DIGITAL SIGNATURE
ijp2p
Securing Liaison-Less Publisher/Subscriber Systems using Identity Based Encr...
Securing Liaison-Less Publisher/Subscriber Systems using Identity Based Encr...
IRJET Journal
DEVELOPMENT OF SECURE CLOUD TRANSMISSION PROTOCOL (SCTP) ENGINEERING PHASES :...
DEVELOPMENT OF SECURE CLOUD TRANSMISSION PROTOCOL (SCTP) ENGINEERING PHASES :...
ijcisjournal
A comprehensive study of fhe schemes ijact journal
A comprehensive study of fhe schemes ijact journal
MajedahAlkharji
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
IJNSA Journal
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
IJNSA Journal
Ryan_Holt_MS_Thesis_Project_Presentation
Ryan_Holt_MS_Thesis_Project_Presentation
Ryan Holt
Target Unncryption Case Study
Target Unncryption Case Study
Evelyn Donaldson
Efficient Data Security for Mobile Instant Messenger
Efficient Data Security for Mobile Instant Messenger
Putra Wanda
Nt1310 Unit 6 Powerpoint
Nt1310 Unit 6 Powerpoint
Janet Robinson
IRJET- Schemes for Securing Cloud Data when the Cryptographic Material is Exp...
IRJET- Schemes for Securing Cloud Data when the Cryptographic Material is Exp...
IRJET Journal
Efficient Data Security for Mobile Instant Messenger
Efficient Data Security for Mobile Instant Messenger
TELKOMNIKA JOURNAL
Implementing High Grade Security in Cloud Application using Multifactor Auth...
Implementing High Grade Security in Cloud Application using Multifactor Auth...
IJwest
Similar to IRJET- Improved Identity-based Anonymous Broadcast Encryption with Chosen Ciphertext Security
(20)
An Identity-Based Mutual Authentication with Key Agreement
An Identity-Based Mutual Authentication with Key Agreement
Secure Supervised Learning-Based Smart Home Authentication Framework
Secure Supervised Learning-Based Smart Home Authentication Framework
Secure Supervised Learning-Based Smart Home Authentication Framework
Secure Supervised Learning-Based Smart Home Authentication Framework
Secure Supervised Learning-Based Smart Home Authentication Framework
Secure Supervised Learning-Based Smart Home Authentication Framework
SECURE CLOUD STORAGE USING DENIABLE ATTRIBUTE BASED ENCRYPTION
SECURE CLOUD STORAGE USING DENIABLE ATTRIBUTE BASED ENCRYPTION
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
SIGNCRYPTION SCHEME BASED ON SCHNORR DIGITAL SIGNATURE
SIGNCRYPTION SCHEME BASED ON SCHNORR DIGITAL SIGNATURE
Securing Liaison-Less Publisher/Subscriber Systems using Identity Based Encr...
Securing Liaison-Less Publisher/Subscriber Systems using Identity Based Encr...
DEVELOPMENT OF SECURE CLOUD TRANSMISSION PROTOCOL (SCTP) ENGINEERING PHASES :...
DEVELOPMENT OF SECURE CLOUD TRANSMISSION PROTOCOL (SCTP) ENGINEERING PHASES :...
A comprehensive study of fhe schemes ijact journal
A comprehensive study of fhe schemes ijact journal
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
Ryan_Holt_MS_Thesis_Project_Presentation
Ryan_Holt_MS_Thesis_Project_Presentation
Target Unncryption Case Study
Target Unncryption Case Study
Efficient Data Security for Mobile Instant Messenger
Efficient Data Security for Mobile Instant Messenger
Nt1310 Unit 6 Powerpoint
Nt1310 Unit 6 Powerpoint
IRJET- Schemes for Securing Cloud Data when the Cryptographic Material is Exp...
IRJET- Schemes for Securing Cloud Data when the Cryptographic Material is Exp...
Efficient Data Security for Mobile Instant Messenger
Efficient Data Security for Mobile Instant Messenger
Implementing High Grade Security in Cloud Application using Multifactor Auth...
Implementing High Grade Security in Cloud Application using Multifactor Auth...
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
9953056974 Low Rate Call Girls In Saket, Delhi NCR
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
KurinjimalarL3
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Suman Mia
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
ranjana rawat
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
pranjaldaimarysona
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur High Profile
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
ranjana rawat
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Dr.Costas Sachpazis
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
ranjana rawat
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
Suhani Kapoor
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur High Profile
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
GDSCAESB
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
Suhani Kapoor
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
null - The Open Security Community
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
ranjana rawat
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Anamika Sarkar
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Low Rate Call Girls In Saket, Delhi NCR
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
SIVASHANKAR N
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
Call Girls in Nagpur High Profile
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
upamatechverse
Recently uploaded
(20)
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
IRJET- Improved Identity-based Anonymous Broadcast Encryption with Chosen Ciphertext Security
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 09 | Sep 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2078 Improved Identity-Based Anonymous Broadcast Encryption with Chosen Ciphertext Security Iwuchukwu, Vitalis C.1, Nwokorie, Euphemia C.2, Okolie, Stanley A.3, Obi, Uchenna M.4 1Lecturer, Department of Computer Science, Federal University of Technology, Owerri, Nigeria 2Senior Lecturer, Department of Computer Science, Federal University of Technology, Owerri, Nigeria 3Lecturer, Department of Computer Science, Federal University of Technology, Owerri, Nigeria 4Lecturer, Department of Computer Science, Federal University of Technology, Owerri, Nigeria ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract - Anonymous receiver encryption is an important cryptographic primitive. It allows a sender to use the public identities of multiple receivers to encrypt messages so that only the authorized receivers or a privileged set of users can decrypt the messages, and the identities of the receivers are not revealed. The increasing need to protect users’ identity in an era of improved digital technology and cyber crime is very crucial. As such, the idea of anonymity in all fields of modern cryptography is given due attention so as to improve users’ experience and security. Generally, in broadcast encryption schemes, a broadcaster first chooses a set S of users who will be able to decrypt broadcast messages as authorized users’set and encrypts a computed secret broadcast as a part of a ciphertext. Pay televisions use the Conditional Access System (CAS) which is the bedrock of the anonymous broadcasting. This work will improve the Anonymous Identity-Based Encryption Schemes using security based on bilinear groups and decisional bilinear Diffie-Hellman problem in improving the ciphertext security. The methodology used is the Object- oriented System Analysis and Design Methodology and a design that focuses on reuses. Implementation of work was done using PHP programming language and Heidi Structured Query Language (HeidiSQL) in the Laragon platform as the backend. Key Words: Broadcast Encryption, Cryptography, Anonymity, Conditional Access System (CAS), Ciphertext security. 1. INTRODUCTION The world is becoming very reliant on digital ideas and technologies, and a way to tackle the protection of users’ privacy is becoming as important too. This is evident by the huge attention that is laid on anonymity in basically every aspect of cryptography in the modern area. Interesting angles such as network communication, pay satellite television and data management have been battling tomake their users anonymous and independent on each other. Broadcast encryption (BE) as an idea was first propounded by Fiat and Naor in 1994, and it is a mode of communication where encryption of public-keys is sent to many recipients (multi-recipient broadcast). In many schemes of broadcast encryption, a broadcaster can encrypt a broadcast message and then sends them to a subset of users (S) who are users or listeners on the channel. In the set S, each user can utilize his/her private key decryptthemessagesofthe broadcast all at the same time. The notion of broadcast encryption has broad application areas such as management of digital rights, pay TV, video conferencing, communication through satellite radio and wireless sensor network [1]. Anonymity in the aspect of Public-key Encrytion (PKE), is usually termed as key-privacy [2]. PKE capturesthefeatures where a listerner of the channel is not capable of telling which particular key of many public keys that a ciphertext was designed. The importance of securing the privacy of receivers is paramount in very complex systems that involves Hierarchical Identity Based Encryption (IBE) for example [3] and Attribute-Based Encryption (ABE) also called Predicate Encryption [4], where improvedanonymity achievement becomes a very hectic challenge.Moreso,inthe aspect of digital signatures, several primitives effortlessly depend on anonymity: signature groups and anonymous credentials are peculiar examples of such system. 1.1 Definition of Broadcast Encryption In the most general formof broadcastencryptionmodels, a broadcaster first of all decides a set of S users who are capable of decrypting broadcast messages on a set of authorized users’. The message encryptsa privatebroadcast key computed into the header asanaspectoftheciphertexts. Next, the private key is used to encrypt broadcast messages in the way similar to symmetric encryption as a portion of the ciphertext also. Any listerner or user ofthesystemthat is using the broadcast channel could get the ciphertext with two portions [5], but then just users in the authorized set S can use their secret key to decrypt the ciphertext so as to read the broadcast message. A fully collusion resistant broadcast encryption model is one where considering that all unauthorized users of the set S colloude, they have no way of inferring any information about the broadcast messages [6]. Typically, schemes of identity-based encryption (IBE) allow users to determine public keys that relate to their common identities like telephone numbers, e-mails, names and othersimilarstrings.Also,identity-based encryption decreases intercommunication, computational overhead and initialization. It also simplifies key management and removes the urgency for secret key databases.
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 09 | Sep 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2079 1.2 Conditional Access System (CAS) Broadcastingontelevisions withpaidsubscriptions(pay TV) is made up of a system calledCondtitional AccessSystem whereby a broadcaster can encrypt two types of messages for any particular user: EntitlementControl Messages(ECM) and Entitlement Management Messages (EMM). ECM contains basic information availabale to all users while its transmission is same to the common broadcast encryption system where the private key of the user is used. On the other hand, EMM encloses contract or personal information of every individual user, in a encryption symmetric format, each user’s secret key is engaged to encrypt the EMM. As such, the management of all user’s secret and public keys is being done by the broadcaster. Typically, there is an increment in the cost of managing keys of the broadcaster compared to the general broadcast models as a result of the ultimate management of the secret key of all users. It is pertinent to ensure that the cost of management of of the broadcaster is reduced in the areas of low overhead and smooth communication of ECM and EMM. A broadcast encryption scheme is said to be efficient in relation to four variables: key storage, decryption overhead, encryption overhead and transmission overhead [7]. In a broadcast scheme, the ciphertextoverheadcanbedefined as the quantity of bits in the ciphertext above what is required for the authorized set of users to be fully described and the symmetric encryption of the plaintext payload [8]. This implies that a broadcast encryption scheme is more thorough and efficient provided that the secret key management is smaller and the ciphertext overhead is shorter, and it will also have a low overhead provided there is a logarithmic dependence of the ciphertext overhead and the number of users of the broadcast. 1.3 Anonymity in Broadcast Encryption Anonymity is a very important aspect for encryption models. It only implies that no one canobtainthecredentials of users from the ciphertexts. As an example: if a customer makes demand of a sensitive TV material, the user should expect no other user to know or be able to decipher his subscribed channels.Particularly,thisproblemisdemanding very great attention in different aspects of cryptography recently, with key inputs in the “Key-Privacy Public Key Encryption Scheme” [2], “Anonymous Identity-Based Encryption Schemes” [9, 3], “Attribute-Based Encryption with Hidden Policy Schemes” [10], “Predicate Encryption with Hidden-Vector Scheme [4]. Also, two proposals of broadcast encryption systems with a security that is a chosen ciphertext and are fully anonymous were propounded in 2006. The first one is a general model construction, which relies on chosen-ciphertextsecurityand anonymous “Public Key Encryption” schemes. Here, thecost of decryption has a linear relationship with the number of receivers [11]. The second one is an improvementofthefirst whereby the number of decryption activities is constantand its security depends on the “random oracle model”. Libert et al. [12] also made contributions in anonymity of broadcast encryption designing with “adaptive chosen ciphertext” security in the standard scheme, and then formally highlighted the security definition of broadcast encryption models. Still in 2012, Fazio and Perera [13] propoundedtwo new models called “Outsider-anonymous BE constructions with sublinear ciphertexts” and they went ahead to show that the model is secured adaptively to chosen-plaintext attack (CPA) and chosen-ciphertext attack (CCA). Broadcast encryption is a broad field and “identity- based broadcast encryption” (IBBE) is a particular aspect of it, whereby the public key of the users’ may be any string given that the string can be a unique identifier of the user, like name, phone number, passport number, etc. [14]. This field has been attracting a lot of attentions from researchers. An efficient “multi-receiver” IBBE model [15] was the first ever, as it is secured selectively against chosen ciphertext attacks in “random oracle model”. It is worthy of note that identity based broadcast (IBE) models may be redesigned into IBBE schemes effectively. The very first IBBE scheme was proposed by Delerablee [16] which has an equal ciphertexts and secret key sizes and also securedinselective CCA in the random oracle scheme. 2. RELATED WORKS In 2005, Boneh et al. [17] made a proposal of the first “stateless and fully-collusionresistant”broadcastencryption model with a chosen-ciphertext security. It was however tested to be secured only in selective securityunder“q-type” assumptions. The selective security needs an attacker to make a declaration on the targets of attack first before the common variables can be gotten. Barth et al. [11] in 2006 proposed anonymous broadcast encryption designs that are fully anonymous and uses chosen-ciphertext security. The first one is a general design which relies on a chosen-ciphertext secured enough for anonymous public key encryption models. As a disadvantage, it has a linear relationship between the decryption cost and the size of the users. The second one is an improved model that needs a steady size of decryption activities, and the security adjustments are based on the “random oracle” scheme. Delerablee also suggested the first identity based broadcast encryption model that has a steady number of ciphertexts and secret keys, while it also runs on secured selective chosen ciphertext attacks in random oracle model [16]. Libert et al. (2012) made a description of their scheme “Anonymous Broadcast Encryption: Adaptive Security and Efficient Constructions in the Standard Model”. Formally, they defined the idea of anonymous broadcast encryption (ANOBE) while giving many designs for their idea.Also,they ahead to proof that their designs has space for
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 09 | Sep 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2080 improvements through “anonymous hint systems” (to increase the performance of decryption) and reuse of randomness (which is to decrease the size of the ciphertext and the costs of computing encryption). A lot of work still should be done in this aspect, beginning from the improvement of the efficiency of the anonymous broadcast encryption models to improving all the extra features which can be found in standard broadcast encryption, including traitor tracing, dynamism or ease of new users to join the scheme, revocation of users’ rights and letting them use the anonymous setting [12]. In 2012 also, Fazio and Perera [13]designeda two “outsider- anonymous” broadcast encryption scheme which uses sublinear ciphertexts and it was proven that the designs are secured against adaptive chosen-plaintext attack (CPA) and adaptive chosen-ciphertext attack (CCA) respectively in a standard scheme. Another adaptive model was created by Zhang et al. (2012). They constructed some new scheme of IBBE in some subgroups. Their proposal ensured shorter ciphertexts size and secret keys. Additionally, it can achieve security fully under some simple “hardness assumptions”. In their standard scheme, they used a two-way style to test run how secured the new model is.TheirconstructionachievesO(1)– ciphertexts size and O(1) – secret keys size,anditcanhandle the trade-off of secret keys and ciphertexts [18]. The secret key of the design has a linear relationship to the maximum size of users. In addition, theproposal hada reducedsecurity due to static assumptions. Their assumptions were a little natural than the ones in existing schemes. Furthermore, decryption cost of their model was dominantly two-pairing, which improves efficiency than in previous schemes. A design proposed to oppose the one made by Zhang and his researchers was established by another Zhang et al. [19]. This model was a new anonymous scheme with multi- receiver encryption model and they suggested that this model has the ability to hide the identity of the receiver. In an unfortunate manner, in their proposal, they showed that the scheme by Zhang et al. in 2012 could not achieve the privacy of the receiver anonymouslywhentheyanalyzedthe security of the model. At similar periods, they also introduced an attack into the scheme. After due analysis of the reason to introduce the attack, a new anonymous“multi- receiver” encryption model was proposed to improve the anonymity of the identity of the receiver. Formally, they were able to prove that their proposed model is secured semantically to handle confidentiality and anonymity of receiver’s identity as well as has better performance with robust security. The scheme has a security that relies on decisional bilinear Diffie-Hellman problem. They claimed that their model was very efficient in aspects of cost of computationandcommunicationoverhead.Yet,theyfocused more on security as a tradeoff to the numberofreceivers (S). Ren et al. [20] also made a proposal of an IBBE model that is fully anonymous that relies on asymmetric bilinear groups, and has “adaptive-ID” security without random oracles. An attacker cannot be able to obtain the receivers’ identities from the ciphertext, and each receiver is anonymous for any other receiver, and onlythebroadcasterknowstheidentities of all receivers. The scheme can simultaneously realize semantic security and recipient anonymity. The scheme achieved this without random oracles based on asymmetric DBDH assumption. Currently, the ciphertext size is not constant in all of fully anonymous BE or IBBE schemes, we expect to reduce the length of the ciphertext while maintaining its full anonymity properties in the future research. Xu et al. [5] constructed an efficient Broadcast Encryption System with Personalised Messages (BEPM) model which uses multilinear maps. Their model was advantageous in several ways: the size of the public key in their scheme was shorter than in other previous systems, it alsohasa constant ciphertext length and constantprivatekeysforusers.Also,in comparison to other generic BE schemes, the broadcast centre cannot just send messages in a broadcast to all users but also compute personalized messages toall eligibleusers. Again, the Xu et al. model is secured statically and resistant against collusion if they exists a setofcollusions.Lastly,their scheme is applicable efficiently to the conditional access system (CAS) that is the main area of the satellite TV system. However, their scheme did not lay so much emphasis on security and ciphertext attacks. Kim et al. [21] also presented an adaptivelyCCA-secureIBBE scheme in standard model through employing dual system encryption technique. A paper presented by He et al. [22] proposed IBBE model that is secured anonymously under the standard Decisional Bilinear Diffie-Hellman Assumption (DBDH). They claimed that their model is the first identity based broadcast encryption scheme which can satisfy simultaneously anonymity and confidentiality and secured against adaptive chosen-ciphertext (CCA) attacks. Again, their model is composed of some features that are desirable in stateless and fully collusion schemes. Next, their model is very efficient and the size of the public variables, secret key and decryption time are constant. Finally, they defined a new security idea for identitybasedbroadcastencryptionmodels that was called “weakly robust under chosen-ciphertext attacks” (WROB – CCA). However,thesizeoftheciphertextis linear with the size of the broadcast receivers and their anonymous IBBE model was without constant ciphertext size. 3. ANALYSIS OF EXISTING SYSTEM Existing state-of-the art broadcast encryptionschemeswere anonymous and provided some sort of security to the users of the system. Most of them focused on the issue of anonymity at the expense of security and other problems such as running time and lengthofciphertexts.Thereexistsa thin space between the ciphertexts sizes in modern
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 09 | Sep 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2081 broadcast encryption (BE) models and the scheme being proposed in this approach. The gap is found to hide in the constants in an asymptotic evaluation of the size of ciphertext (that is during measurement of the size of the ciphertexts) but in practice, it is significant enough. A huge problem will arise, therefore, when it is important tofurther reduce the ciphertexts size in this new research as well as maintaining properties of full anonymity. Existing schemes may make provision for transmissions secured enough between a broadcast centre and a set of users and the broadcaster simply encrypts information by using public (or common) keys of the broadcast centre and the recipients. The cost of key management of these models is significantly smaller due to the availability of public keys. However, these models cannot be used to transmit personalized messages such that eachpersonalizedmessage is different for each user at any point in time. Figure –1: Model of the Existing System [5] In Figure 1, the broadcaster must manage all users’ key K3. The Entitled Management Message (EMM) and the Entitled Control Message (ECM) are important aspects of the CAS as it initiates the broadcasting process. EMM manages the rights and authority of the viewers of the content while ECM controls the users or viewers of the channel or content. The encoding and decoding processes continue until the final broadcast content is decoded fully. 3.1 Analysis of the Proposed System The model of the proposed system is incorporated into the Conditional Access System (CAS) as showninFigure 2. Figure -2: Model of the Proposed System The proposed model in Figure 2 describes an identity-based broadcast encryption where a broadcaster initially processes the header, a key K for broadcast and Ku which is the key for personalized messages for any user u ∈ S. The K is then used to encrypt a program for broadcast as a ciphertext c and then transmits same. Same way, Ku is used to encrypt messages for personalization as cu of any user u ∈ S and then transmits it. An eligible member u ∈ S (where S is a set of all subscribers or members of the program content) gets c and cu, which are respectively decrypted using K and Ku to obtain the broadcast content and a eligibility information as personalized message. The Public Key Group (PKG) supplies the public keys for broadcasting and also the secret key to the subscriber for use in decoding the content. In this way, the scheme does not request the broadcaster to manage all users’ private keys. 3.2 Algorithm of a Broadcast Encryption System There are four algorithms that are used in any identity-based Broadcast Encryption model. These algorithms are as follows: Broadcasting IBBE. Enc SymEnc (Program) SymEnc (Personalized) Broadcast Channel Subscriber IBBE. Dec SymDec(c) SymDec(Cu) Program Personalized Messages PKG Public Keys Secret Key Public Parameters K Ku c Cu K K u
5.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 09 | Sep 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2082 Setup (ID): Setting up of an identity space ID for a model of broadcast. The IDproducesparams aspublic parametersand msk as master secret key. Extract (msk, u): A user and the master secret key msk are taken, and they produce a private key sku for any user i with identity u. Enc (params, S): The public parameters params is used as input and as polynomial sized set of eligible recipients, and then outputs a pair (Hdr, K) and a set of personalised keys as Ku for the user . Hdr is used to ensure the confidentiality of K which is the symmetrical encryption key that is used to encrypt the broadcast messages as c and also Ku as a personalized symmetrical encryption key of user i with identity u used to encrypt a personalized message as cu. Finally, it outputs the set(Hdr, c, cu (u ∈ S)) as a ciphertext. Dec (params, u, sku, Hdr, S). The decryption algorithm uses inputs pairs Hdr and the private key sku of any user i with whose identity is , and produces the pair of keys (K, Ku) for any user i with identity . The decryption algorithm produces ⊥ if S. Else, then any user i decrypts the Hdr with the use of its secret key sku to obtain K and Ku, and then, finally, the ciphertext c and cu are decrypted respectively. 3.3 Architecture of the System The proposed architecture of the broadcast encryption system begins with the data owner who has assigns privileges to authorized users and also main groups as shown Figure 3. The data owner can be the administrator of the system or an agent that is responsible for collecting data from sellers and then allocating to permitted users. The remote user after registering and logging into the system will have a group authority that provides access to privy information and privileges (Figure 3). Figure -3: Architecture of the Broadcast System 4. ANALYSIS OF RESULTS The results of the new model were analyzed and compared with the previous model presented by previousresearchers. Data Owner Upload File with privileges Encode File 1. Maintain group 2. Maintain privileges 3. Store all files 4. Provide access permission 5. Authorize user / Send personalized messages Remote User Group Authority Issuing File Access Information (Fname, sk) 1. Request and search file 2. Access file a. View group users b. View group signs c. View registered users Register and Login Storage Server
6.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 09 | Sep 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2083 i. Ciphertexts Length The length of this new model is shorter and constant than previous general broadcast encryption schemes. For a message of about 20 characters, the ciphertexts length spans between 30 – 40 encrypted characters. ii. Private key The new scheme or model has constant private keys for any number of users to suit the users’ mental ability to recall keys easily. This is unlike some generalized broadcast encryption schemes that provide different lengths of private keys to users. iii. Intrusion Detection A new mechanism was put in place to detect when an ineligible user tries to access the system or read messages by inputting a wrong key. BEPM is the Broadcast Encryption and Personalised Message Scheme. Table -1: Comparison of results of the new and previous models. Scheme Intrusion Detection Private Key Size Ciphertext Size BEPM No Varies (Logn) Short Our Model Yes Constant Shorter Figure -4: Graphical representation of the Ciphertexts Length against Message Length Figure 4 shows the comparison of the length of the ciphertexts plotted against the message length of both the Broadcast Encryption and Personalised Messages (BEPM) scheme and our new model. It can be seen that the BEPM produces a little more encrypted characters than the new model. This adds a little advantage to the new system as less space will be occupied in memory. Figure -5: Graph of Encryption/Decryption Times against Message Character Lengths The graphical illustration of the variations in encryption/decryptiontimesbetweenthetestmodel and the existing model is well shown in figure 5. The times are read in microseconds and slightly increase with the length of the message sent. 5. CONCLUSION This paper presents ananonymousIdentityBasedBroadcast Encryption scheme which achieves confidentiality and anonymity with adaptive Chosen Ciphertexts Attacks (CCA) secure under Decisional Bilinearity Diffie-Hellman (DBDH) assumption. In addition, this scheme allows stateless (anonymous) receivers and it is partiallycollusion-resistant. It is worthy of note that this new scheme is highly efficient, and has constant public parameterssize, privatekeysize and very fast decryption time. However, the ciphertext size is also constant and is not affected by the number of the receivers. 5.1 Recommendations This research can be implemented in the Conditional Access System (CAS) which is currently being used as the model for satellite televisions. Therefore, this work is recommended for use in fields related to digital rights and signature, social media messaging services, satellite television and communication. Others are private messaging (PM),mailing and wireless radio networks.
7.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 09 | Sep 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2084 References [1] X. Zou and J. Xiang, “Dynamic broadcast encryption scheme with revoking user,” Wuhan University Journal of Natural Sciences, Springer, Heidelberg, vol. 18, 499 – 503, 2013. [2] M. Bellare, A. Boldyreva,A.DesaiandD.Pointcheval, “Key-Privacy in Public-Key Encryption,” In Advances in Cryptology – ASIACRYPT, 7th International Conference on the Theory and Application of Cryptology and InformationSecurity, Gold Coast, Australia, 9-13(12), LNCS, Springer, Heidelberg vol. 2248, 566 –582, 2001. [3] X. Boyen and B. Waters, “Anonymous Hierarchical Identity-Based Encryption (without random oracles)”, Dwork, C. (ed.):In AdvancesinCryptology - CRYPTO 2006, 26th Annual International Cryptology Conference, Santa Barbara, California, USA, 20-24(8), LNCS, Springer, Heidelberg,vol. 4117, 290–307, 2006. [4] J. Katz, A. Sahai and B. Waters, “Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products”, In Advances in Cryptology - EUROCRYPT, 27th Annual International Conference on the Theory and Applications of CryptographicTechniques,Istanbul, Turkey, 13-17(4), LNCS, Springer, Heidelberg; vol. 4965, 146–162, 2008. [5] K, Xu, Y. Liao, L. Qiao, Z. Liu and X. Yang, “An Identity-Based (IDB) Broadcast EncryptionScheme with Personalized Messages (BEPM)”, PLoS ONE 10(12): e0143975, 2015. https://doi.org/10.1371/journal.pone.0143975 [6] B. Chor, A. Fiat and M. Naor, “Tracing Traitors”,14th Annual International Cryptology Conference on Advances in Cryptology, Springer-Verlag, London, 257–270, 1995. [7] A. Kiayias and S. Pehlivanoglu, “Encryption for Digital Content”, Springer, 978-1-4419-0044-9, 20- 25, 2010. https://link.springer.com/chapter/10.1007/978-3- 319-03584-0_19 [8] D. Boneh, B. Waters andM.Zhandry,“LowOverhead Broadcast Encryption from Multilinear Maps”, CRYPTO 2014. LNCS, Springer, Heidelberg. vol. 8616, 206–233, 2014. [9] M. Abdalla, M. Bellare, D. Catalano,E.Kiltz,T.Kohno, T. Lange, J. Malone-Lee, G. Neven, P. Paillier and H. Shi, “Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions”, In Advances in Cryptology – CRYPTO: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, 205 – 222, 2005. [10] X. Li, D. Gu, Y. Ren, N. Ding and K. Yuan, “Efficient Ciphertext-Policy Attribute Based Encryption with Hidden Policy”, In Internet and Distributed Computing Systems - 5th International Conference, IDCS, Wuyishan, Fujian, China, 21-23(11), 146 – 159, 2012. [11] A. Barth, D. Boneh and B. Waters, “Privacy in Encrypted Content Distribution using Private Broadcast Encryption”, In Financial Cryptography and Data Security, 10th International Conference, FC, Anguilla, British West Indies, 27(2) – 2(3), Revised Selected Papers, 52 – 64, 2006. [12] B. Libert, K. Paterson and E. Quaglia, “Anonymous Broadcast Encryption: Adaptive Security and Efficient Constructions in the Standard Model”, M. Fischlin; J. Buchmann; and M. Manulis (Eds): PKC 2012, LNCS 7293. International Association for Cryptologic Research, 206 – 224, 2012. https://link.springer.com/content/pdf/10.1007%2 F978-3-642-30057-8_13.pdf [13] N. Fazio and I. Perrera, “Anonymous Broadcast Encryption”, GC Cryptography Student Seminar, 2012. https://milinda- perera.com/pdf/2012_06_22_GCCSS.pdf [14] A. Shamir, “Identity-Based Cryptosystems and Signature Schemes”, In Advances in Cryptology, Proceedings of CRYPTO, Santa Barbara, California, USA, 19-22(8), LNCS, vol. 196, Springer,Heidelberg, 47–53, 1984. [15] J. Baek, R. Safavi-Naini and W. Susilo, “Efficient Multi-Receiver Identity-Based Encryption and its Application to Broadcast Encryption”, In PublicKey Cryptography - PKC, 8thInternational Workshopon Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, 23-26(1), 380-397, 2005. [16] C. Delerablee, “Identity-Based Encryption with Constant Size CiphertextsandPrivate Keys”,Orange Labs – Caen, France. K. Kurosawa (Ed.):InAdvances in Cryptology - ASIACRYPT, 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia LNCS 4833, 200 – 215, 2007. https://eprint.iacr.org/2008/268.pdf. [17] D. Boneh, C. Gentry and B. Waters, “Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys”, In CRYPTO’05,LNCS 3621, pages 258–275, 2005.
8.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 09 | Sep 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2085 [18] L. Zhang, Y. Hu and Q. Wu, “Adaptively Secure Identity-based Broadcast Encryption withConstant Size Private Keys and Ciphertexts from the Subgroups”, Mathematical and computer Modelling 55, 12–18, 2012. [19] L. Zhang, Q. Wu and Y. Mu (2013), “Anonymous Identity-Based Broadcast EncryptionwithAdaptive Security”, In: Wang G., Ray I., Feng D., Rajarajan M. (eds) Cyberspace Safety and Security.LectureNotes in Computer Science, vol 8300. Springer, Cham,258 – 571, 2013. https://doi.org/10.1007/978-3-319- 03584-0_19 [20] Y. Ren, Z. Niu, and X. Zhang. “Fully Anonymous Identity-based Broadcast Encryption without Random Oracles,. I. J. Network Security, 16(4):256– 264, 2014. [21] J. Kim, W. Susilo, M. H. Au, and J. Seberry, “Adaptively Secure Identity-based Broadcast Encryption with a Constant-sized Ciphertext”, IEEE TransactionsonInformation ForensicsandSecurity, 10(3):679–693, 2015. [22] K. He, J. Weng, J.N. Liu, J.K. Liu, W. Liu and R.H. Deng, “Anonymous Identity-Based Broadcast Encryption with Chosen-Ciphertext Security”. Proceedings of the 11th ACMon Asia Conference on Computer and Communications Security, Xi’an , 247-255, 2016.
Download now