Journal of Engineering and Applied Sciences

Year: 2018
Volume: 13
Issue: 10
Page No. 3525 - 3533

Attribute Based Authentication System using Homomorphic Encryption

Authors : Marwan Majeed Nayyef, Ali Makki Sagheer and Sarah Shihab Hamad

References

Abbas, S.A. and A.A.B. Maryoosh, 2016. Data security for cloud computing based on Elliptic Curve Integrated Encryption Scheme (ECIES) and Modified Identity based Cryptography (MIBC). Intl. J. Appl. Inf. Syst., 10: 7-13.

Alia, M., A. Tamimi and O. Al-Allaf, 2013. Integrated system for monitoring and recognizing students during class session. Int. J. Multimedia Applic., 5: 45-52.
Direct Link  |  

Alia, M.A., A.A. Hnaif, H.K. Al-Anie and A.A. Tamimi, 2012. Graphical password based on standard shapes. Sci. Ser. Data Rep., 4: 71-79.

Alia, M.A., A.A. Tamimi and O.N. AL-Allaf, 2014. Cryptography based authentication methods. Proceedings of the World Congress on Engineering and Computer Science Vol. 1, October, 22-24, 2014, International Association of Engnring, San Francisco, California, USA., ISBN:978-988-19252-0-6, pp: 1-6.

Benzekki, K., A.E. Fergougui and A.E.B.E. Alaoui, 2016. A secure cloud computing architecture using homomorphic encryption. Intl. J. Adv. Comput. Sci. Appl. IJACSA., 7: 293-298.
Direct Link  |  

Bethencourt, J., A. Sahai and B. Waters, 2007. Ciphertext-policy attribute-based encryption. Proceedings of the 2007 IEEE Symposium on Security and Privacy (SP'07.), May 20-23, IEEE, New York, USA., ISBN:0-7695-2848-1, pp: 321-334.

Burande, N.S. and S.A. Kahate, 2015. Design model for two server password authentication protocol. Intl. J. Sci. Eng. Comput. Technol., 5: 383-384.
Direct Link  |  

Chauhan, K.K., A.K. Sanger and A. Verma, 2015. Homomorphic encryption for data security in cloud computing. Proceedings of the 2015 International Conference on Information Technology (ICIT), December 21-23, 2015, IEEE, Bhubaneswar, India, ISBN:978-1-5090-0487-4, pp: 206-209.

Chen, L., H. Ben and J. Huang, 2014. An encryption depth optimization scheme for fully homomorphic encryption. Proceedings of the 2014 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI), October 17-18, 2014, IEEE, Beijing, China, ISBN:978-1-4799-8003-1, pp: 137-141.

Dasgupta, S. and S.K. Pal, 2016. Design of a polynomial ring based symmetric homomorphic encryption scheme. Perspect. Sci., 8: 692-695.
Direct Link  |  

Dawahdeh, Z.E., S.N. Yaakob and A.M. Sagheer, 2015. Modified El-gamal elliptic curve cryptosystem using hexadecimal representation. Indian J. Sci. Technol., Vol. 8, 10.17485/ijst/2015/v8i15/64749

Filho, G.J., G.P. Silva and C. Miceli, 2016. A public key compression method for fully homomorphic encryption using genetic algorithms. Proceedings of the 2016 19th International Conference on Information Fusion (FUSION), July 5-8, 2016, IEEE, Heidelberg, Germany, ISBN:978-0-9964-5274-8, pp: 1991-1998.

Gentry, C., 2009. A Fully Homomorphic Encryption Scheme. Stanford University, Stanford, California, Pages: 199.

Greeshma, S. and R. Jayapriya, 2015. Securing Database Server Using Homomorphic Encryption and Re-encryption. In: Security in Computing and Communication, Abawajy, J., S. Mukherjea, S. Thampi and A. Ruiz-Martinez (Eds.). Springer, Berlin, Germany, ISBN:978-3-319-22914-0, pp: 277-289.

Huda, S., A. Sudarsono and T. Harsono, 2015. Secure data exchange using authenticated ciphertext-policy attributed-based encryption. Proceedings of the 2015 International Conference on International Electronics Symposium (IES), September 29-30, 2015, IEEE, Surabaya, Indonesia, ISBN:978-1-4673-9344-7, pp: 134-139.

Lee, Y.G., H.C. Kim, J.J. Kim and M.S. Jun, 2008. A design of home network security protocol using user authentication and access control technology. Proceedings of the International Conference on Convergence and Hybrid Information Technology ICHIT'08, August 28-30, 2008, IEEE, Daejeon, South Korea, ISBN:978-0-7695-3328-5, pp: 30-34.

Manjua, R., A.N. Shajin and A. Rajendran, 2014. Multimodal biometric authentication system based performance scrutiny. Intl. J. Soft Comput., 9: 246-254.
CrossRef  |  Direct Link  |  

Patel, S.J., A. Chouhan and D.C. Jinwala, 2014. Comparative evaluation of elliptic curve cryptography based homomorphic encryption schemes for a novel secure multiparty computation. J. Inf. Secur., 5: 12-18.
Direct Link  |  

Rivest, R.L., L. Adleman and M.L. Dertouzos, 1978. On data banks and privacy homomorphisms. Found. Secure Comput., 4: 169-180.
Direct Link  |  

Sagheer, A.M., 2012. Elliptic curves cryptographic techniques. Proceedings of the 6th International Conference on Signal Processing and Communication Systems (ICSPCS’12), December 12-14, 2012, IEEE, Gold Coast, Queensland, Australia, ISBN:978-1-4673-2392-5, pp: 1-7.

Sen, J., 2014. Theory and Practice of Cryptography and Network Security Protocols and Technologies. INTECH Process Automation Inc., Lahore, Pakistan, ISBN:978-953-51-1176-4, Pages: 156.

Sharma, T., 2016. E-Voting using homomorphic encryption scheme. Intl. J. Comput. Appl., 141: 14-16.

Sujatha, K., P.N. Rao, A.A. Rao, K.R. Prasad and M.S.B. Deepthi, 2015. Biometric identity verification using automatic speaker recognition. Proceedings of the 2015 International Conference on Electrical, Electronics, Signals, Communication and Optimization (EESCO), January 24-25, 2015, IEEE, Visakhapatnam, India, ISBN:978-1-4799-7676-8, pp: 1-5.

Sunuwar, R. and S.K. Samal, 2015. Elgamal encryption using elliptic curve cryptography. Master Thesis, University of Nebraska-Lincoln, Lincoln, Nebraska.

Suveetha, K. and T. Manju, 2016. Ensuring confidentiality of cloud data using homomorphic encryption. Indian J. Sci. Technol., Vol. 9, 10.17485/ijst/2016/v9i8/87964

Tebaa, M., S.E. Hajji and A.E. Ghazi, 2012. Homomorphic encryption applied to the cloud computing security. Proceedings of the World Congress on Engineering, July 4-6, 2012, WCE, London, UK., ISBN: 978-988-19251-3-8, pp: 4-6.

Zamare, R. and R. Phursule, 2014. Password authentication key exchange by two server password only in web applications. Intl. J. Recent Dev. Eng. Technol., 2: 113-117.
Direct Link  |  

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved