Browsing by Author "Thangam, V."
Now showing 1 - 4 of 4
- Results Per Page
- Sort Options
Item Elliptic curve based proxy re-encryption(2016) Thangam, V.; Chandrasekaran, K.Proxy re-encryption is a scheme where a semi-Trusted proxy alters the confidential message of one party into a confidential message of another party without knowing the original plaintext. To do the same, various approaches are suggested in the public key set up cryptography. In this paper, we propose two new methods named CTR1-PRE and CTR2-PRE for proxy re-encryption on public key setting which are based on elliptic curve. Since elliptic curve cryptosystem is becoming a new famous methodology due to its lot of nice features, it is required to construct a proxy re-encryption scheme which works on elliptic curve as well. So, in this work we have shown two such proxy re-encryption methods and we have also shown that one of our approach holds all the essential properties of proxy re-encryption method such as unidirectional, non-interactive, proxy invisibility, original access to ciphertext, key optimal for storage, collusion safe from intruders, etc. � 2016 ACM.Item Elliptic curve based proxy re-encryption(Association for Computing Machinery acmhelp@acm.org, 2016) Thangam, V.; Chandrasekaran, K.Proxy re-encryption is a scheme where a semi-Trusted proxy alters the confidential message of one party into a confidential message of another party without knowing the original plaintext. To do the same, various approaches are suggested in the public key set up cryptography. In this paper, we propose two new methods named CTR1-PRE and CTR2-PRE for proxy re-encryption on public key setting which are based on elliptic curve. Since elliptic curve cryptosystem is becoming a new famous methodology due to its lot of nice features, it is required to construct a proxy re-encryption scheme which works on elliptic curve as well. So, in this work we have shown two such proxy re-encryption methods and we have also shown that one of our approach holds all the essential properties of proxy re-encryption method such as unidirectional, non-interactive, proxy invisibility, original access to ciphertext, key optimal for storage, collusion safe from intruders, etc. © 2016 ACM.Item Elliptic curve based secure outsourced computation in multi-party cloud environment(2016) Thangam, V.; Chandrasekaran, K.Secure Multi-Party Computation (SMPC) is a scheme where a set of trusted users will calculate a certain function on their inputs where the inputs will be always in an encrypted format for security purpose. In many cases, outsourcing of these calculations to an untrusted cloud server is desirable because of huge computational power of cloud server and storage space provided by them to process the data. However, the existing secure computation approaches are based on either a single key setup or old traditional encryption methods. In this paper, we suggested two secure multi-party computation techniques based on the latest elliptic curve cryptosystem. In which, we used two non-colluding cloud servers to co-operatively compute the outsourcing calculation with minimum number of interactions between them. However, it is ensured that the inputs, intermediate and final results all remain secret throughout the calculation. � Springer Nature Singapore Pte Ltd. 2016.Item Elliptic curve based secure outsourced computation in multi-party cloud environment(Springer Verlag service@springer.de, 2016) Thangam, V.; Chandrasekaran, K.Secure Multi-Party Computation (SMPC) is a scheme where a set of trusted users will calculate a certain function on their inputs where the inputs will be always in an encrypted format for security purpose. In many cases, outsourcing of these calculations to an untrusted cloud server is desirable because of huge computational power of cloud server and storage space provided by them to process the data. However, the existing secure computation approaches are based on either a single key setup or old traditional encryption methods. In this paper, we suggested two secure multi-party computation techniques based on the latest elliptic curve cryptosystem. In which, we used two non-colluding cloud servers to co-operatively compute the outsourcing calculation with minimum number of interactions between them. However, it is ensured that the inputs, intermediate and final results all remain secret throughout the calculation. © Springer Nature Singapore Pte Ltd. 2016.
