首页    期刊浏览 2024年12月03日 星期二
登录注册

文章基本信息

  • 标题:An Optimized Secure Communication Using VLR-GS-BU on Wireless Network
  • 本地全文:下载
  • 作者:M.Saranya ; P.Dhivya
  • 期刊名称:Indian Journal of Computer Science and Engineering
  • 印刷版ISSN:2231-3850
  • 电子版ISSN:0976-5166
  • 出版年度:2012
  • 卷号:3
  • 期号:3
  • 页码:506-517
  • 出版社:Engg Journals Publications
  • 摘要:A novel protocol to achieve privacy-preserving universal authentication protocol for wireless communications called Priauth. to secure the communication as the data are sensitive or it requires the users to pay for it. In the algorithms for secure communication a key is shared by H with V and V with users. The key is used to encrypt data transmitted to the servers or users. In privacy based authentication protocols besides the user and its home server, no one including the foreign server can tell the identity of the user; and besides the user and its home server, no one including the foreign server is able to link any past or future protocol runs of the same user. An To revoke multiple users is to associate a key with every nonempty subset of users in the group. Thus, if one or more users are revoked, the VA uses the key associated with the subset of the remaining users to encrypt the new key and transmits the new group key to them. The advantage of this approach is that the communication overhead is only one message for revoking any number of users. However, the number of keys stored by the VA and the users is exponential in the size of the group. The goal of the enhancement is to evaluate trade-off between storage and revocation cost. Storage is computed in terms of keys that each user (respectively, VA) maintains. And revocation cost is computed in terms of the encryptions performed, and the number of messages transmitted, by the VA.
  • 关键词:Priauth; hierarchical key management; rekeying and storage trade-offs.
国家哲学社会科学文献中心版权所有