TRANSPARENT SECURITY OF PRODUCTIVE RELIABLE AND UNAUTHORIZED DATA SHARING

K. Vikram Kumar, Himagiri Danapana

Abstract


Because of its liability, picture shingle is continually correlated inside a belligerent locale and be subjected to quite a few threats of pact. Shackles of information was don't hold your breath been clear-cut using the improvements of distort computing, and a precise investigation on mutual experiments enjoin be offering many benefits to the institute. In our responsibility we start a recent perception of deliver safeguard Identity-primarily based pull trademark, that is indispensable utensil in behalf of structures Onate profitable tried-and-true in addition secret arrangement of knowledge atinkle. The arrangement allows a theory of equality primarily based bang autograph blueprint to consist of express redemption and may be the primo in literature to smother this selection in behalf of jangle mark in identification based mostly stage setting. In our take we move up contract of integrity primarily based bang mark using foundation of assist aegis. The address solid Identity-based mostly clang autograph is a likeness primarily based location and during this manner, withdrawal of pricey certificate certification practice catch on safe and befitting for interpretation of massive evidence.


Keywords


Data Sharing; Identity-Based Ring Signature; Cost-Effective; Anonymous System; Cloud Computing; Certificate Verification; Big Data;

References


D. Chaum and E. van Heyst, “Group signatures,” in Proc. Workshop Theory Appl. Cryptographic Techn., 1991, vol. 547, pp. 257–265.

L. Chen, C. Kudla, and K. G. Paterson, “Concurrent signatures,” in Proc. Int. Conf. Theory Appl. Cryptographic Techn., 2004, vol. 3027, pp. 287–305.

S. S. M. Chow, S.-M. Yiu, and L. C. K. Hui, “Efficient identity based ring signature,” in Proc. 3rd Int. Conf. Appl. Cryptography Netw. Security, 2005, vol. 3531, pp. 499–512.

R. Cramer, I. Damga rd, and B. Schoenmakers, “Proofs of partial knowledge and simplified design of witness hiding protocols,” in Proc. 14th Annu. Int. Cryptol. Conf. Adv. Cryptol., 1994, vol. 839, pp. 174–187.

J. K. Liu, M. H. Au, W. Susilo, and J. Zhou, “Online/offline ring signature scheme,” in Proc. 11th Int. Conf. Inform. Commun. Security, 2009, vol. 5927, pp. 80–90.

J. K. Liu, W. Susilo, and D. S. Wong, “Ring signature with designated linkability,” in Proc. 1st Int. Conf. Security, 2006, vol. 4266, pp. 104–119


Full Text: PDF

Refbacks

  • There are currently no refbacks.




Copyright © 2012 - 2018, All rights reserved.| ijitr.com

Creative Commons License
International Journal of Innovative Technology and Research is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJITR , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.