A Flexible Method Using Identity Based Message Key Distribution for Securing Workflow Signatures

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 5

Abstract

 Abstract: The increase in advancement of information technology led the migration of workflows from paper based to electronic workflow systems. Basically a workflow consists of a number of tasks and each of these tasks should be authenticated by using any of the cryptographic techniques. To provide more security within workflow systems, signing keys are used. In addition to data authenticity and integrity, logical relationships such as AND-join and AND-split are to be provided in a workflow signature scheme. Such a scheme was experimentally proven which is based on hierarchical identity-based cryptography to meet security properties required by inter-organizational workflows. Due its high complexity, a new mechanism, IB-MKD (Identity Based Message Key Distribution) is proposed as an alternative to HIBS, which is achieved with conventional RSA without any additional assumptions and limitations and it is believed to have less overhead.

Authors and Affiliations

Roshin Sharo Eapen

Keywords

Related Articles

 Implementation of AES Algorithm in MicroController Using  PIC18F452

 Security has become an increasingly important feature with the growth of electronic communication which calls for more advanced ways to encrypt the raw data[1]AES-128 is going to be implemented as the  encr...

An EfficientHybrid Push-Pull Based Protocol for VOD In Peer-to-Peer network

 Abstract : Video-on-Demand is a service where movies are delivered to distributed users with low delay and free interactivity. The traditional client-server architecture experiences scalability issues to provide vi...

 Efficient Disease Classifier Using Data Mining Techniques: Refinement of Random Forest Termination Criteria

 In biomedical field, the classification of disease using data mining is the critical task. The prediction accuracy plays a vital role in disease data set. More data mining classification algorithms like decision...

Implementation of Network Security in Mobile AD-HOC Networks using Multilevel Encryption Techniques

When we are sending a secret information fromsource to destination over a wireless network, safe and secure transmission is a critical issue. An ad-hoc network is a set of wireless nodes and any type of central control o...

 A Novel Approach for Semi Supervised Document Clustering with Constraint Score based Feature Supervision

Abstract: Text document clustering provides an effective technique to manage a huge amount of retrieval outcome by grouping documents in a small number of meaningful classes. In unsupervised clustering method the unlabel...

Download PDF file
  • EP ID EP94584
  • DOI -
  • Views 127
  • Downloads 0

How To Cite

Roshin Sharo Eapen (2014).  A Flexible Method Using Identity Based Message Key Distribution for Securing Workflow Signatures. IOSR Journals (IOSR Journal of Computer Engineering), 16(5), 1-7. https://europub.co.uk./articles/-A-94584