2021
DOI: 10.5815/ijwmt.2021.03.02
|View full text |Cite
|
Sign up to set email alerts
|

Two-Layer Encryption based on Paillier and ElGamal Cryptosystem for Privacy Violation

Abstract: Our life nowadays relies much on technologies and online services net banking, e-voting and so on. So, there is a necessity to secure the data that is transmitted through the internet. However, while performing decryption, it sometimes led to privacy violation so there is need to operate on users encrypted data without knowing the original plaintext.This paper represents the implementation of two-layer cryptosystem using paillier and elgamal algorithm both following asymmetric encryption. It is mainly focusing… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(8 citation statements)
references
References 8 publications
0
8
0
Order By: Relevance
“…In the year 2021, Koundinya and SK [16] have implemented two-layer encryption with the help of two popular asymmetric cryptography such as Paillier and Elgamal cryptography. The Paillier cryptosystem, which was employed for applications like secure biometrics and electronic voting, makes use of additive homomorphism.…”
Section: Related Workmentioning
confidence: 99%
“…In the year 2021, Koundinya and SK [16] have implemented two-layer encryption with the help of two popular asymmetric cryptography such as Paillier and Elgamal cryptography. The Paillier cryptosystem, which was employed for applications like secure biometrics and electronic voting, makes use of additive homomorphism.…”
Section: Related Workmentioning
confidence: 99%
“…In order to evaluate its contribution, it was also compared with similar best-known state-of-the-art cryptosystems. The analysis from tables 3, 4, and 6 shows that the proposed cryptosystem has higher encryption and decryption runtimes, and lower throughput compared to that in (Asiedu & Salifu, 2022) and (Koundinya & Gautham, 2021). Though the proposed cryptosystem has a higher runtime than that in (Asiedu & Salifu, 2022) and (Koundinya & Gautham, 2021), the proposed cryptosystem has an additional layer of encryption which thickens the encryption cryptosystem.…”
Section: Performance Evaluationmentioning
confidence: 98%
“…There is no contradiction that technological advancements, especially in electronic communications, have played a crucial role in shaping the modern age. As the importance of preserving data confidentiality, integrity, authenticity, and non-repudiation in its transmission and storage becomes increasingly vital, cryptography has emerged as a crucial discipline within the field of information technology (Koundinya & Gautham, 2021). Therefore, researchers continue toleverage on various encryption techniques such as Paillier, RSA, ECC, etc.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…In [12,13], a modified algorithm based on the ElGamal and Cramer-Shoups cryptosystems is presented. In [14], a simple, lightweight, and efficient encryption scheme is given.…”
Section: Introductionmentioning
confidence: 99%