Header menu link for other important links
X
Enhanced ID-Based Ring Signature by Validating Time Slots in Cloud Environment
Leeladhar A,
Published in Diva Enterprises Private Limited
2017
Volume: 10
   
Issue: 1
Pages: 65 - 69
Abstract
Sharing of Information has a number of problems, comprising integrity, information efficiency and safekeeping of data owner in cloud computing. Ring Signature methods are favorable choice to build an unidentified and authentic information sharing system. Ring have no managers, no setup systems, no denial systems, and no coordination: some person can pick any set of members that take account of himself, and sign message by making use of his secret key and the others' public keys, without getting their approval. By using Ring signatures we can leak top-secret information in an anonymous way. In the proposed Id-based ring signature the certificate validation process has been removed which is more cost effective. In this project we improved security in ring by implementing time slots i.e. if a super key of any user has lost then there is no need to change all the users’ keys including the lost key user. Security re-confirmation is avoided in ring Signature by using SHA Algorithm.We have also expanded the level of security in diminished time, easy and effective manner. © RJPT All rights reserved.
About the journal
JournalResearch Journal of Pharmacy and Technology
PublisherDiva Enterprises Private Limited
ISSN0974-3618
Open Access0