Author:
Bhat Radhakrishna,Sunitha N. R.,Iyengar S. S.
Abstract
AbstractThe high demand for user-centric applications such as secure cloud storage laid the foundation for the development of user-centric security schemes with multiple security features in recent years. But, the current state-of-art techniques primarily emphasized only one type of security feature i.e., either homomorphism or non-malleability. To fill this gap and provide a common platform for both homomorphic and non-malleable cloud applications, we have introduced a new public key-based probabilistic encryption switching method. The proposed scheme generates $${\mathcal {O}}$$
O
(m+2 log N) bits of ciphertext where $$m\in {\mathbb {N}}$$
m
∈
N
and $$m<n$$
m
<
n
, $$n\in {\mathbb {N}}$$
n
∈
N
is the plaintext size, N is the RSA composite. The superior performance of the proposed scheme has been tested in comparison to existing methods and is reported in this paper.
Funder
Manipal Academy of Higher Education, Manipal
Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Applied Mathematics,Artificial Intelligence,Computational Theory and Mathematics,Computer Networks and Communications,Computer Science Applications,Information Systems
Cited by
13 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. A DNA-based Authentication System for Securing Cloud Data Storage and Transactions;2024 11th International Conference on Computing for Sustainable Global Development (INDIACom);2024-02-28
2. From Novice to Ninja: Novice to Ninja’s Guide to CTF Domains;2024 11th International Conference on Computing for Sustainable Global Development (INDIACom);2024-02-28
3. The Performance Analysis of Federated Learning Methods for IoT with Big Data;2024 11th International Conference on Computing for Sustainable Global Development (INDIACom);2024-02-28
4. Predictive Modeling of Concrete Compressive Strength using Machine Learning Algorithms;2024 11th International Conference on Computing for Sustainable Global Development (INDIACom);2024-02-28
5. Enhancing Security in Cloud-Based VM Migration: A Trust-Centric Hybrid Optimization Approach;The International Arab Journal of Information Technology;2024