A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Ravikumar, K.
- Secure Data Share in Drop Box Using Key-Aggregate Cryptosystem
Authors
1 Department of CSE, RRASE College of Engineering, Padappai, Chennai-601301, IN
Source
Wireless Communication, Vol 7, No 4 (2015), Pagination: 140-145Abstract
Files discussing is definitely an crucial features inside cloud storage. In this paper, all of us display how you can safely and securely, effectively, and also flexibly share data along with some others inside cloud storage. All of us explain new public-key cryptosystems which generate constant-size cipher texts such that successful delegation associated with decryption proper rights for virtually every pair of cipher texts are usually feasible. The originality will be that certain could mixture virtually any pair of key recommendations and also cause them to become seeing that lightweight being a single essential, yet covering the facility of all recommendations getting aggregated. Basically, the key essential case could release a constant-size mixture essential regarding adaptable choices associated with cipher text occur cloud storage, but the some other encrypted records beyond your set keep on being confidential. This kind of lightweight mixture essential may be handily provided for some others or end up being kept within a clever minute card along with very restricted secure storage. Currently official protection investigation of our techniques from the normal product. All of us in addition explain some other application of our techniques. In particular, your techniques provide first public-key patient-controlled encryption regarding adaptable Pecking order that is still to be known.
Keywords
Cloud Safe-Keeping, Files Discussing, Key-Aggregate Encryption.- Tamil Data Communication Security Using Elliptic Curve Cryptography Key Algorithms
Authors
1 Dept.of Computer of Computer Science, Tamil University, Thanjavur, IN
2 Dept.of Computer Science, Tamil University, IN
3 Karpagam University, IN
Source
Wireless Communication, Vol 2, No 11 (2010), Pagination: 450-452Abstract
Tamil data, scripts, files needs to be preserved in computing. As there is a need for security in various computer networks fields, the paper mainly focus an algorithm in the field of secrecy , privacy, confidentiality of the documents in a computer system by the principle “ Cryptography “. Cryptography is defined as an art of security technique for computer networks. A computer user to preserve his documents, scripts needs to search for security oriented algorithms, packages, databases which arises an unfulfilled thirst. To quench the security thirst, a recent algorithm namely ‘Elliptic Curve Cryptography (ECC)’ is framed as it is an approach to public-key cryptography based on some algebraic structure of elliptic curves over finite fields. The creator keeps the knowledge of security key mechanisms such as private key, public keys. The keys which are generated best choose random-numbers that uses products of two large prime numbers as the key. Any user to preserve his documents picks two large random primes as his private key, and publishes the product as his public key. The public key based algorithm ‘Elliptic Curve Cryptography (ECC)’ is based on the creation of different keys that are difficult to solve without certain knowledge about how they were created. Elliptic curve cryptosystems is computationally efficient than the first generation public key systems such as RSA and Diffie-Hellman algorithms as the report says. As an added advantage the paper mainly focus on ECC based security algorithms for Tamil document privacy. The document related in Tamil words are analyzed commonly as a process which includes security mechanisms that emerges finally in the system as a preserved document.Keywords
Elliptic Curve, Scripts, Co-Clustering, Algorithm, Security.- Security in Mobile Communication Using Digital Signature with WAP
Authors
1 Department of Computer Science, The Tamil University, IN
2 Department of Computer Science, The Tamil University, IN