Bilinear Pairings Technique on Concrete ID-PUIC Protocol
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2017, Vol 5, Issue 6
Abstract
We propose a novel intermediary arranged information transferring and remote information uprightness checking model in identity-based public key cryptography: IDPUIC (identity-based proxy-oriented data uploading and remote data integrity checking in public cloud). We give the formal definition, framework model and security display. At that point, a solid ID-PUIC protocol is planned by utilizing the bilinear pairings. The proposed ID-PUIC protocol is provably secure in view of the hardness of CDH (computational Diffie-Hellman) issue. Our ID-PUIC protocol is additionally productive and adaptable. In view of the first customer's approval, the proposed IDPUIC protocol can understand private remote information uprightness checking, appointed remote information integrity checking and open remote information integrity checking.
Authors and Affiliations
Mandala Prem Srujan| Dept. of CSE, ELURU College of Engineering and Technology, Duggirala(V), Pedavegi(M), ELURU, Andhra Pradesh, Dr. P. Bala Krishna Prasad| Dept. of CSE, ELURU College of Engineering and Technology, Duggirala(V), Pedavegi(M), ELURU, Andhra Pradesh
Data Access In Disruption Tolerant Networks Using Cooperative Caching
Disruption tolerant networks (DTNs) consist of mobile devices that call each other opportunistically. Due to the low node density and impulsive no demobility, only broken network connectivity exists in DTNs, and the...
Closed Loop Fuzzy Logic Control of High Voltage Gain Interleaved Boost Converter fed 3-Ï• BLDC Motor Drive
This paper presents Brush Less DC Motor (BLCDM) driven by an efficient closed loop fuzzy logic based high voltage gain interleaved boost converter. The functioning of the high voltage gain interleaved boost converter...
The Multi Owner Data Distribution using Identity Based Encryption on Cloud Storage
Data sharing has never been anything but difficult to the progression of cloud computing. The storage data gives number of advantages to both the general public and people. Storage-as-an administration possible by cl...
A hierarchical access control technique M-HABE and an altered three-layer structure is proposed. Contrasting from the current standards, for example, the HABE algorithm and the first threelayer structure, the novel pl...
Long Term Evolution and its Handover Mechanism
LTE technology wascommercially introduced byTeliaSonera in Norway in December2009. The abbreviation of LTE is Long Term Evolution.It is the third generation partnership project(3GPP).It is also developed widely by in...