Académique Documents
Professionnel Documents
Culture Documents
Encryption
With Constant Cipher texts
ABSTRACT:
APPLICATIONS
secure message in network.
HARDWARE REQUIREMENT
PROCESSOR : PENTIUM IV 2.6 GHz, Intel core 2
Duo
RAM : 512 MB DD RAM
MONITOR : 15 COLOR
HARD DISK : 40 GB
SOFTWARE REQUIREMENT
FRONT END : J2EE.
BACK END : MY SQL 5.5
OPERATING SYSTEM : Windows 07
IDE : ECLIPSE
PROPOSED SYSTEM FUTURE ENHANCEMENT
PROPOSED CONCEPT:- FUTURE CONCEPT :-
A broadcast encryption scheme achieving This scheme is based on the third construction of
adaptive security captures the fact that an Boneh Similar to their scheme, we also use Naor-
adversary can adaptively select a target set he/she Reingold-style PRF and multi linear maps to
wants to attack after acquiring the knowledge of shrink the secret keys and public keys to O(log N)
the system parameters and private keys previously elements, respectively.
compromised. Another natural direction is to consider secure
The encrypted data can only be decrypted network coding in a framework where only
by recipients included in the set and any other statistical security or security against
cannot. The system is said to be full collusion computationally bounded adversaries is required
resistant if even all users outside of S collude and
pool their secret keys, they cannot obtain any non-
trivial information about the contents of the
broadcast.
Broadcast Encryption Systems FUTURE ALGORITHM: -
Identity-based broadcast encryption
ALGORITHM DEFINITION:- ALGORITHM DEFINITION:-
Cipher text overhead is the most critical Linear network code secure is equivalent to the
measure for the efficiency of broadcast problem of nding a linear code with certain
encryption system, which is the amount of generalized distance properties.
information that needed to be transmitted in We show that if we give up a small amount of
addition to the description of the recipient set S overall capacity, then a random code achieves these
and the symmetric encryption of the actual properties using a much smaller eld size.
plaintext.
ENRICHMENT:- EXTRAVAGANCE:-
Datas will be highly securable. broadcast encryption with multilinear groups
Packets sent in parallel on different edges are of order
always all independent. Identity-based broadcast No decrease in throughput is allowed.
encryption (IBBE) is a combination of broadcast
encryption and identity-based encryption (IBE)
that support exponentially many users as
potential receivers.