Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/334531
Title: | Hybrid aggregated signcryption and key management signcryption in hierarchical access control |
Researcher: | Sivasundari, A |
Guide(s): | Ramakrishnan, M and Mohamed Sikkander, A |
Keywords: | Information security Cryptography Signcryption |
University: | Anna University |
Completed Date: | 2019 |
Abstract: | Recently, information security suited for a comprehensive number of practical applications and which mainly affected by an end-to-end security. Earlier works on information security have concentrated on protecting messages rather than aggregating whether the message reliability. The cryptography systems are mainly used for the network security system in terms of privacy, authentication, identity and non-reputed system with highly configure distortion system. The network authentication not effectively improve the access control system, because the operations are depends on the number of key generated in both the function validation and encryption model used for the total process. To overcome those problems, in this research it is proposed two methods solutions. The first solution is a Hybrid Aggregated Signcryption (HAS) that uses the efficient Key Encapsulation Mechanism (KEM) and Data Encapsulation Mechanism (DEM). KEM utilized the modified version of Kurosawa and Desmedt hashing scheme to encapsulate the key. DEM utilized the Elliptic Curve Cryptography (ECC) algorithm to encapsulate the message. The Multi-Constraints Differential Evolution (MDE) algorithm used to select optimal prime fields in ECC algorithm. Finally, an aggregated signature scheme used to aggregate many signatures on many messages from many distinct singers into one single signature, which minimizes the verification cost. The second solution is to reduce the computation cost of ECC point multiplication by modified parallelism of RNS. Also contribute in security system by combine the complex less ECC with modified signcryption cryptosystem. The certificate less signcryption scheme can fill the security gaps, and its security has been verified to achieve the confidentiality and unforgeability against of different attacks in dynamic key management in hierarchical system. From simulation results, the effectiveness of proposed two solutions is articulated in terms of security enhancement and also it will not affect the quality. newline |
Pagination: | xxii,146p. |
URI: | http://hdl.handle.net/10603/334531 |
Appears in Departments: | Faculty of Information and Communication Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 48.68 kB | Adobe PDF | View/Open |
02_certificates.pdf | 178.65 kB | Adobe PDF | View/Open | |
03_vivaproceedings.pdf | 368.5 kB | Adobe PDF | View/Open | |
04_bonafidecertificate.pdf | 239.81 kB | Adobe PDF | View/Open | |
05_abstracts.pdf | 142.1 kB | Adobe PDF | View/Open | |
06_acknowledgements.pdf | 300.46 kB | Adobe PDF | View/Open | |
07_contents.pdf | 38.93 kB | Adobe PDF | View/Open | |
08_listoftables.pdf | 28.99 kB | Adobe PDF | View/Open | |
09_listoffigures.pdf | 88.67 kB | Adobe PDF | View/Open | |
10_listofabbreviations.pdf | 32.75 kB | Adobe PDF | View/Open | |
11_chapter1.pdf | 240.37 kB | Adobe PDF | View/Open | |
12_chapter2.pdf | 190.67 kB | Adobe PDF | View/Open | |
13_chapter3.pdf | 134.36 kB | Adobe PDF | View/Open | |
14_chapter4.pdf | 1.05 MB | Adobe PDF | View/Open | |
15_chapter5.pdf | 526.7 kB | Adobe PDF | View/Open | |
16_conclusion.pdf | 71.14 kB | Adobe PDF | View/Open | |
17_references.pdf | 181.3 kB | Adobe PDF | View/Open | |
18_listofpublications.pdf | 80.54 kB | Adobe PDF | View/Open | |
80_recommendation.pdf | 80.2 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: