Secure Key-composite Cryptosystems through scatter Aggregate Keys for Global secured data

  • Unique Paper ID: 147585
  • Volume: 5
  • Issue: 9
  • PageNo: 104-107
  • Abstract:
  • Secure and efficient report garage and sharing through authenticated bodily devices remain challenging to attain in a cyber-physical cloud environment, particularly due to the variety of devices used to get right of entry to the offerings and records. Thus on this paper, we gift a light-weight identity-based totally authenticated information sharing protocol to offer at ease records sharing amongst geographically dispersed bodily gadgets and customers. The seasoned- posed protocol is verified to face up to selected-cipher text attack (CCA) beneath the hardness assumption of decisional-Strong Diffie- Hellman problem. We also evaluate the overall performance_of the proposed protocol with present facts sharing protocols in terms of computational overhead, communication overhead, and reaction time.

Copyright & License

Copyright © 2025 Authors retain the copyright of this article. This article is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

BibTeX

@article{147585,
        author = {Bondugula Prashanth and M. sravanthi},
        title = {Secure Key-composite Cryptosystems through scatter Aggregate Keys for Global secured data},
        journal = {International Journal of Innovative Research in Technology},
        year = {},
        volume = {5},
        number = {9},
        pages = {104-107},
        issn = {2349-6002},
        url = {https://ijirt.org/article?manuscript=147585},
        abstract = {Secure and efficient report garage and sharing through authenticated bodily devices remain challenging to  attain  in a cyber-physical cloud environment, particularly due to the variety of devices used to get right of entry to the offerings and records. Thus on this paper, we gift a light-weight identity-based totally authenticated information sharing protocol to offer at ease records sharing amongst geographically dispersed bodily gadgets and customers. The seasoned- posed protocol is verified to face up to selected-cipher text attack (CCA) beneath the hardness assumption of decisional-Strong Diffie- Hellman problem. We also evaluate the overall performance_of the proposed protocol with present facts sharing protocols in terms of computational overhead, communication overhead, and reaction time.},
        keywords = {Random oracle model, Privacy protecting cloud, Identity-based Cryptography, Data shar- ing protocol, AVISPA, Cloud computing,.},
        month = {},
        }

Cite This Article

  • ISSN: 2349-6002
  • Volume: 5
  • Issue: 9
  • PageNo: 104-107

Secure Key-composite Cryptosystems through scatter Aggregate Keys for Global secured data

Related Articles