• Login
    • University Home
    • Library Home
    • Lib Catalogue
    • Advance Search
    View Item 
    •   IR@KDU Home
    • INTERNATIONAL RESEARCH CONFERENCE ARTICLES (KDU IRC)
    • 2018 IRC Articles
    • Computing
    • View Item
    •   IR@KDU Home
    • INTERNATIONAL RESEARCH CONFERENCE ARTICLES (KDU IRC)
    • 2018 IRC Articles
    • Computing
    • View Item
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    A Novel Elliptic Curve Based Multi-Key Encryption Method for Multicasting Single Content with Access Control

    Thumbnail
    View/Open
    Untitled(13).pdf (430.7Kb)
    Date
    2018
    Author
    Jinasena, TMKK
    Meegama, RGN
    Marasinghe, RB
    Metadata
    Show full item record
    Abstract
    The most remarkable invention in the history of cryptography is the invention of public key encryption in the 1970s. It enables users to have a single encryption on a pair of two unique keys. As a result, the way of delivering many security services has changed drastically. Moreover, it introduced new features such as non-repudiation to the cryptographic world. However, in this paper, we present a novel elliptic curve based multi key encryption method to facilitate a single encryption for multiple users where the resulting encrypted content can be multicast to them with access control. Initially, we establish an elliptic curve based public key infrastructure to cover the whole user space. Then the sender can select multiple recipients using their public keys with the desired access levels and generate a unique polynomial for that using the Lagrange polynomial interpolation. Next, the content is encrypted using the generated polynomial and multicast it to the recipients. Finally, the recipient can use their private key together with the polynomial to decrypt the received content. Encryption is robust because the elliptic curve cryptography is stronger than the present RSA encryption. Moreover, it is more suitable for mobile devices due to small key sizes. However, the cryptographic libraries have to be improved and optimized in order to make it practical. Further, the applications like email clients, media players, document viewers have to be enhanced to integrate this cryptographic mechanism as an add-on.
    URI
    http://ir.kdu.ac.lk/handle/345/2495
    Collections
    • Computing [46]

    Library copyright © 2017  General Sir John Kotelawala Defence University, Sri Lanka
    Contact Us | Send Feedback
     

     

    Browse

    All of IR@KDUCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsFacultyDocument TypeThis CollectionBy Issue DateAuthorsTitlesSubjectsFacultyDocument Type

    My Account

    LoginRegister

    Library copyright © 2017  General Sir John Kotelawala Defence University, Sri Lanka
    Contact Us | Send Feedback