DigiSecure: Attribute-Based Document Transfer Solution
Keywords:
Data Security, MD, Digital_Signature, Rivest, Shamir, Adleman Algorithm, Signature Built on Features, X.509CertificateAbstract
There are two examples of techniques for guaranteeing user credentials and facts secrecy are authentication and cryptosystems. Message Digest is used to check the uniqueness and accurateness of data traveling over an open channel due to its one-way nature. It recognizes unauthorized alterations and additions to broadcasts. When it comes to document uniqueness and creator oneness, digital signatures frequently use hashing. It is categorized as an attribute-based signature (ABS) and is updated by including new details about the attributes of the users. We looked at many historical approaches to the ABS phenomenon and identified some problems that needed to be handled. As a result, we came up with a solution that lowers the level of difficulty, usage, and operating expense while still enabling signature production and confirmation. We proposed an original DigiSecure: Attribute-Based Document Transfer Solution for Transporting Digital Document to highlight the approach of digital signatures using foundations and their initial reason. The system has policy-based access security limitations as well as adaptable primitives that offer signing authority total control over signature generation. It safeguards the secrecy of signatures and has a first order logic that is message-based. Various advantages were found after rationally studying the method, and these advantages will soon be proven by implementing the solution over the suggested outline under the given significant component.
Downloads
References
Digital signing of original reports, By ALS Laboratories, Version 1 Published in 2010
James H. Davenport and Dalia Khader, “Digital signatures: What you are versus Who you are", in IACR Technical Review, 2010.
S Sharmila Deva Selvi, Subhashini Venugopalan and C. Pandu Rangan, “A New Approach to Threshold Attribute Based Signatures”, in Theoretical Computer Science Laboratory Department of Computer Science and Engineering Indian Institute of Technology, Madras, 2010.
Hemanta K. Maji, Manoj Prabhakaran and Mike Rosulek, Attribute-Based Signatures”, in Department of Computer Science, University of Illinois, Urbana-Champaign, 2010.
Piyi Yang , Tanveer A. Zia , Zhenfu Cao and Xiaolei Dong , “Efficient and expressive fully secure attribute-based signature in the standard model”, Australian Information Security Management Conference, Edith Cowan University, Dec 2011.
Javier Herranz, Fabien Laguillaumie, Benoit Libert and Carla Rafols, “Short Attribute- Based Signatures for Threshold Predicates”, in RSA Conference, San Francisco, United States, Springer, 2012.
Fugeng ZENG, Chunxiang XU, Qinyi LI and Xiujie ZHANG, “Attribute-based Signature Scheme with Constant Size Signature”, in Journal of Computational Information Systems, ISSN: 2875–2882, Vol 8, Issue 7, 2012.
Rupesh Vaishnav, “Attribute Based Signature Scheme For Attribute Based Encrypted Data In Cloud”, in International Journal of Engineering Research & Technology (IJERT),ISSN: 2278-0181, Vol. 1 Issue 10, Dec 2012
Feng Cai, Wangmei Guo and Ximeng Liu,“Threshold attribute based universal designated verifier signature scheme in the standard model”, in WSEAS Transaction on Communications, ISSN: 2224-2864, Vol. 13, 2012.
Kefeng Wang, Yi Mu and Fuchun Guo, “Attribute-based signature with message recovery”, in Research Online Lecture Notes in Computer Science, University of Wollongong, 2014.
Brinda Hampiholi, Gergely Alpaar, Fabian van den Broek, and Bart Jacobs, Towards Practical Attribute-Based Signatures””, in Institute for Computing and Information Sciences, Radboud University, Nijmegen, The Netherlands, 2015
Essam Ghadafi, ”Decentralised Traceable Attribute Based Encryption”, Presentation in University College London, April 2015
Nigel Mc Kelvey , Kevin Curran and Nadarajah Subaginy , “The Internet of Things”, in IGI Global Journals, Category of Mobile and Wireless Computing, DOI: 10.4018/978-1- 4666-5888-2.ch570, 2005
S. Sicari, A. Rizzardi, L.A. Grieco and A. Coen-Porisini, “Security, Privacy & Trust in Internet of Things: the road ahead”, in Preprint submitted to Elsevier, Feb 2015.
Xiaofeng Chen, Jin Li, Xinyi Huang, Jingwei Li and Yang Xiang, Secure Outsourced Attribute-Based Signatures””, in IEEE Transaction on Parallel and Distributed Systems, ISSN: 1045-9219, VOL. 25, NO. 12, Dec 2014.
Vivek Kapoor et al.” An Integrated Scheme based on Triple DES, RSA and MD5 to Enhance the Security in Bluetooth Communication” International Journal of Computer Applications 50(7):45-50, July 2012.
Panse, P., Panse, T., Verma, R., Bhayal, D.K., Agrawal, A. (2019). An Edutainment Approach to Enhance Teaching–Learning Process. In: Kamal, R., Henshaw, M., Nair, P. (eds) International Conference on Advanced Computing Networking and Informatics. Advances in Intelligent Systems and Computing, vol 870. Springer, Singapore.
Mr. Bhushan Bandre, Ms. Rashmi Khalatkar. (2015). Impact of Data Mining Technique in Education Institutions. International Journal of New Practices in Management and Engineering, 4(02), 01 - 07. Retrieved from http://ijnpme.org/index.php/IJNPME/article/view/35
Leo, L. M. ., Simla, A. J. ., Kumaran, J. C. ., Julalha, A. N. ., & Bhavani, R. . (2023). Blockchain based Automated Construction Model Accuracy Prediction using DeepQ Decision Tree. International Journal on Recent and Innovation Trends in Computing and Communication, 11(1), 133–138. https://doi.org/10.17762/ijritcc.v11i1.6060
Janani, S., Dilip, R., Talukdar, S. B., Talukdar, V. B., Mishra, K. N., & Dhabliya, D. (2023). IoT and machine learning in smart city healthcare systems. Handbook of research on data-driven mathematical modeling in smart cities (pp. 262-279) doi:10.4018/978-1-6684-6408-3.ch014 Retrieved from www.scopus.com
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.