2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC) 2020
DOI: 10.1109/iccmc48092.2020.iccmc-000187
|Get access via publisher |Cite
|
Sign up to set email alerts

Blockchain and the Identity based Encryption Scheme for High Data Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 20 publications
(6 citation statements)
references
References 11 publications
0
6
0
Order By: Relevance
“…Rahalkar et al [9] proposed a data possession proof, a PDP (provable data possession) mechanism, which divides the data into blocks and uses the RSA signature mechanism to sample the integrity of the data blocks, which improves the detection efficiency and reduces the communication overhead. Khan et al [10] proposed a PDP mechanism that supports fully homomorphic operations, which uses the Merkle tree to verify the correctness of the location of the data block and uses the BLS signature to verify the integrity of the data block. Adekunle et al [11] proposed a mechanism for integrity verification using multibranch path tree (MBT), which increases the out-degree of nodes.…”
Section: Related Workmentioning
confidence: 99%
“…Rahalkar et al [9] proposed a data possession proof, a PDP (provable data possession) mechanism, which divides the data into blocks and uses the RSA signature mechanism to sample the integrity of the data blocks, which improves the detection efficiency and reduces the communication overhead. Khan et al [10] proposed a PDP mechanism that supports fully homomorphic operations, which uses the Merkle tree to verify the correctness of the location of the data block and uses the BLS signature to verify the integrity of the data block. Adekunle et al [11] proposed a mechanism for integrity verification using multibranch path tree (MBT), which increases the out-degree of nodes.…”
Section: Related Workmentioning
confidence: 99%
“…It can be observed from the above discussion that the required hardware resources (FPGA slices) in existing FPGA implementations of BHC and BEC models are relatively higher [8,[18][19][20][21][22][23][24][25]. The architectures resulting higher hardware resources are not suitable for area constrained applications such as Identity-Based Encryption [15], WSNs [16] and RFID [17]. Consequently, a low area implementation of BHC model is required for area constrained applications.…”
Section: Existing Fpga Architectures and Limitationsmentioning
confidence: 99%
“…Moreover, we also refer to [10][11][12][13] where more generalizations and theoretical foundations over Weierstrass, Hessian, Huff and Edward models have been presented. At the same time, the major applications for highly secure public key cryptosystems against SCA with low area demands include cloud computing [14], Identity-Based Encryption [15], wireless sensor networks (WSNs) [16] and RFID [17] etc. Therefore, the purpose of this article is to provide a low area implementation of BHC model for ECC on a reconfigurable field programmable gate array (FPGA).…”
Section: Introductionmentioning
confidence: 99%
“…The study on blockchain and identity-based encryption management by Khan et al (2020) enabled data and identity protection against identity theft and fraud. The approaches resulted in the guarantee of user's privacy.…”
Section: General Overview Of Blockchain-based Information Systemsmentioning
confidence: 99%
“…Endorsement policy ensures transaction integrity hence preventing inconsistent transactions. Transactions will be created and stored in a way that will be prevented tampering and make it easy to detect any change in a smart contract execution (Khan et al, 2020). A transaction proposal will be endorsed if endorsement responses are listed in the policy match to avoid unexpected results (Javaid et al, 2019).…”
Section: (B) Transaction Endorsement Policymentioning
confidence: 99%