Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/334531
Title: Hybrid aggregated signcryption and key management signcryption in hierarchical access control
Researcher: Sivasundari, A
Guide(s): Ramakrishnan, M and Mohamed Sikkander, A
Keywords: Information security
Cryptography
Signcryption
University: Anna University
Completed Date: 2019
Abstract: Recently, information security suited for a comprehensive number of practical applications and which mainly affected by an end-to-end security. Earlier works on information security have concentrated on protecting messages rather than aggregating whether the message reliability. The cryptography systems are mainly used for the network security system in terms of privacy, authentication, identity and non-reputed system with highly configure distortion system. The network authentication not effectively improve the access control system, because the operations are depends on the number of key generated in both the function validation and encryption model used for the total process. To overcome those problems, in this research it is proposed two methods solutions. The first solution is a Hybrid Aggregated Signcryption (HAS) that uses the efficient Key Encapsulation Mechanism (KEM) and Data Encapsulation Mechanism (DEM). KEM utilized the modified version of Kurosawa and Desmedt hashing scheme to encapsulate the key. DEM utilized the Elliptic Curve Cryptography (ECC) algorithm to encapsulate the message. The Multi-Constraints Differential Evolution (MDE) algorithm used to select optimal prime fields in ECC algorithm. Finally, an aggregated signature scheme used to aggregate many signatures on many messages from many distinct singers into one single signature, which minimizes the verification cost. The second solution is to reduce the computation cost of ECC point multiplication by modified parallelism of RNS. Also contribute in security system by combine the complex less ECC with modified signcryption cryptosystem. The certificate less signcryption scheme can fill the security gaps, and its security has been verified to achieve the confidentiality and unforgeability against of different attacks in dynamic key management in hierarchical system. From simulation results, the effectiveness of proposed two solutions is articulated in terms of security enhancement and also it will not affect the quality. newline
Pagination: xxii,146p.
URI: http://hdl.handle.net/10603/334531
Appears in Departments:Faculty of Information and Communication Engineering

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File48.68 kBAdobe PDFView/Open
02_certificates.pdf178.65 kBAdobe PDFView/Open
03_vivaproceedings.pdf368.5 kBAdobe PDFView/Open
04_bonafidecertificate.pdf239.81 kBAdobe PDFView/Open
05_abstracts.pdf142.1 kBAdobe PDFView/Open
06_acknowledgements.pdf300.46 kBAdobe PDFView/Open
07_contents.pdf38.93 kBAdobe PDFView/Open
08_listoftables.pdf28.99 kBAdobe PDFView/Open
09_listoffigures.pdf88.67 kBAdobe PDFView/Open
10_listofabbreviations.pdf32.75 kBAdobe PDFView/Open
11_chapter1.pdf240.37 kBAdobe PDFView/Open
12_chapter2.pdf190.67 kBAdobe PDFView/Open
13_chapter3.pdf134.36 kBAdobe PDFView/Open
14_chapter4.pdf1.05 MBAdobe PDFView/Open
15_chapter5.pdf526.7 kBAdobe PDFView/Open
16_conclusion.pdf71.14 kBAdobe PDFView/Open
17_references.pdf181.3 kBAdobe PDFView/Open
18_listofpublications.pdf80.54 kBAdobe PDFView/Open
80_recommendation.pdf80.2 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: