Log in
Language:

MERAL Myanmar Education Research and Learning Portal

  • Top
  • Universities
  • Ranking
To
lat lon distance
To

Field does not validate



Index Link

Index Tree

Please input email address.

WEKO

One fine body…

WEKO

One fine body…

Item

{"_buckets": {"deposit": "c34a0529-a0e7-4a87-a359-76b39ae85887"}, "_deposit": {"created_by": 73, "id": "7923", "owner": "73", "owners": [73], "owners_ext": {"displayname": "", "username": ""}, "pid": {"revision_id": 0, "type": "depid", "value": "7923"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/00007923", "sets": ["user-miit"]}, "communities": ["miit"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "A Lightweight Multi-receiver Encryption Scheme with Mutual Authentication", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "\"In this paper, we propose a lightweight multi-receiver encryption scheme for the device to device communications on Internet of Things (IoT) applications. In order\nfor the individual user to control the disclosure range of\nhis/her own data directly and to prevent sensitive personal data\ndisclosure to the trusted third party, the proposed scheme uses\ndevice-generated public keys. For mutual authentication, third\nparty generates Schnorr-like lightweight identity-based partial\nprivate keys for users. The proposed scheme provides source\nauthentication, message integrity, replay-attack prevention and\nimplicit user authentication. In addition to more security properties, computation expensive pairing operations are eliminated\nto achieve less time usage for both sender and receiver, which\nis favourable property for IoT applications. In this paper, we\nshowed a proof of security of our scheme, computational cost\ncomparison and experimental performance evaluations. We\nimplemented our proposed scheme on real embedded Android\ndevices and confirmed that it achieves less time cost for both\nencryption and decryption comparing with the existing most\nefficient certificate-based multi-receiver encryption scheme and\ncertificateless multi-receiver encryption scheme.\n\""}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2021-01-29"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "A Lightweight Multi-receiver Encryption Scheme with Mutual Authentication.pdf", "filesize": [{"value": "881 KB"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_3", "mimetype": "application/pdf", "size": 881000.0, "url": {"url": "https://meral.edu.mm/record/7923/files/A Lightweight Multi-receiver Encryption Scheme with Mutual Authentication.pdf"}, "version_id": "4c6ab45b-74e1-46f7-a59d-ba6bbfb5a15c"}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "COMPSAC 2017", "subitem_c_date": "July. 8, 2017", "subitem_conference_title": "IEEE 41st Annual Computer Software and Applications Conference", "subitem_place": "Torino, Italy"}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Ei Khaing Win"}, {"subitem_authors_fullname": "Tomoki Yoshihisa"}, {"subitem_authors_fullname": "Yoshimasa Ishi"}, {"subitem_authors_fullname": "Tomoya Kawakami"}, {"subitem_authors_fullname": "Yuuichi Teranishi"}, {"subitem_authors_fullname": "Shinji Shimojo"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Conference paper"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2017-07-07"}, "item_title": "A Lightweight Multi-receiver Encryption Scheme with Mutual Authentication", "item_type_id": "21", "owner": "73", "path": ["1582963674932", "1597396989070"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000007923", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2017-07-07"}, "publish_date": "2017-07-07", "publish_status": "0", "recid": "7923", "relation": {}, "relation_version_is_last": true, "title": ["A Lightweight Multi-receiver Encryption Scheme with Mutual Authentication"], "weko_shared_id": -1}
  1. Myanmar Institute of Information Technology
  1. Myanmar Institute of Information Technology
  2. Faculty of Computer Science

A Lightweight Multi-receiver Encryption Scheme with Mutual Authentication

http://hdl.handle.net/20.500.12678/0000007923
http://hdl.handle.net/20.500.12678/0000007923
15ba834b-914b-42ed-b22f-a7b63bda6960
c34a0529-a0e7-4a87-a359-76b39ae85887
None
Preview
Name / File License Actions
A A Lightweight Multi-receiver Encryption Scheme with Mutual Authentication.pdf (881 KB)
license.icon
Publication type
Conference paper
Upload type
Publication
Title
Title A Lightweight Multi-receiver Encryption Scheme with Mutual Authentication
Language en
Publication date 2017-07-07
Authors
Ei Khaing Win
Tomoki Yoshihisa
Yoshimasa Ishi
Tomoya Kawakami
Yuuichi Teranishi
Shinji Shimojo
Description
"In this paper, we propose a lightweight multi-receiver encryption scheme for the device to device communications on Internet of Things (IoT) applications. In order
for the individual user to control the disclosure range of
his/her own data directly and to prevent sensitive personal data
disclosure to the trusted third party, the proposed scheme uses
device-generated public keys. For mutual authentication, third
party generates Schnorr-like lightweight identity-based partial
private keys for users. The proposed scheme provides source
authentication, message integrity, replay-attack prevention and
implicit user authentication. In addition to more security properties, computation expensive pairing operations are eliminated
to achieve less time usage for both sender and receiver, which
is favourable property for IoT applications. In this paper, we
showed a proof of security of our scheme, computational cost
comparison and experimental performance evaluations. We
implemented our proposed scheme on real embedded Android
devices and confirmed that it achieves less time cost for both
encryption and decryption comparing with the existing most
efficient certificate-based multi-receiver encryption scheme and
certificateless multi-receiver encryption scheme.
"
Conference papers
COMPSAC 2017
July. 8, 2017
IEEE 41st Annual Computer Software and Applications Conference
Torino, Italy
Back
0
0
views
downloads
See details
Views Downloads

Versions

Ver.1 2021-01-29 09:08:52.481592
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats
  • JSON

Confirm


Back to MERAL


Back to MERAL