scispace - formally typeset
Proceedings ArticleDOI

A novel and efficient key sharing technique for web applications

TLDR
The aim here is to bring an effective public key sharing algorithm with lesser execution time.
Abstract
Security is a measure of protecting data during its transmission over a network. In the secured transmission scheme, the message will be encrypted using encryption algorithms which convert it into ciphertext where keys are playing the vital role in encryption and decryption process. Keys will be either secret one or public key. Since public key cryptosystem gain its momentum from its evolution, sharing of public key is equally an important task like secret key sharing. There are various traditional public key sharing techniques are there, still the importance of sharing of public key lies in how fast the keys will be shared. Even though compromising the public key will not do much damage to the whole system as the key will not be used for the decryption process to get back the original plain text, still it is required to share it securely. Because of the slower execution time, other symmetric encryption techniques are preferred over asymmetric techniques in web applications. In cyber world, execution time is the real challenge before the researchers. Our aim here is to bring an effective public key sharing algorithm with lesser execution time.

read more

Citations
More filters
Journal ArticleDOI

A Hybrid Framework for Intrusion Detection in Healthcare Systems Using Deep Learning

TL;DR: A hybrid framework using Deep Learning named “ImmuneNet” to recognize the latest intrusion attacks and defend healthcare data is proposed, which is comparatively better and up-to-date than other existing approaches in classifying between requests that are normal, intrusion, and other cyber attacks.
Proceedings ArticleDOI

Multi Authority Privacy Preserving Protocol in Cloud Computing Authentication using Grouping Algorithm and EDAC-MAC

TL;DR: A simple, efficient and verified approach to ensure the integrity of data stored in the cloud is proposed, where grouping algorithm along with EDAC-MACS is used to provide effective security control with revoking and decryption being more efficient with different algorithms for encryption as well as decryption.
References
More filters
Proceedings ArticleDOI

A key management scheme for wireless sensor networks using deployment knowledge

TL;DR: It is shown that the performance of sensor networks can be substantially improved with the use of the proposed random key pre-distribution scheme, which exploits deployment knowledge and avoids unnecessary key assignments.
Journal ArticleDOI

A key transport protocol based on secret sharing applications to information security

TL;DR: The protocol eliminates the need for a cipher, yet effectively combines the advantages of symmetric and public-key ciphers, and can be used to build a new key management scheme that allows the service providers to generate different keys for different sets of receivers, and to renew these keys in a convenient way.
Proceedings ArticleDOI

Generating and sharing biometrics based session keys for secure cryptographic applications

TL;DR: A simple and effective protocol to securely share crypto-biometric keys derived from biometrics and another protocol to generate and share session keys which are valid for only one communication session are proposed.
Journal ArticleDOI

Asymmetric Key Pre-distribution Scheme for sensor networks

TL;DR: The properties of this asymmetric key pre-distribution scheme are that, the compromise of keying material servers does not reveal any information about users' secret keys and the session keys of privileged subset of users; if computational assumptions are considered, each user has very low storage requirement.
Proceedings ArticleDOI

Three-Party Quantum Authenticated Key Distribution with Partially Trusted Third Party

TL;DR: A novel three-party quantum authenticated key distribution with a partially trusted third party protocol that will be preferable for network systems in/between institutions, which deal with highly sensitive information.