ABSTRACT:

A trace-and-revoke scheme is a type of broadcast encryption scheme for content protection on various platforms such as pay-per-view TV and DVD players. In 2006, Boneh and Waters (BW) presented a fully collusion-resistant trace-and-revoke scheme. However, a decisive drawback of their scheme is to require composite-order groups. In this paper, we present a new trace-and-revoke scheme that works in prime-order groups. Our scheme is fully collusion-resistant and achieves ciphertexts and private keys of size O(√N) for N users. For the same level of security, our scheme is better than the BW scheme in all aspects of efficiency. Some superior features include 8.5 times faster encryption, 12 times faster decryption, and 3.4 times shorter ciphertexts. To achieve our goal, we introduce a novel technique where, by using asymmetric bilinear maps in prime-order groups, the cancellation effect same as in composite-order groups can be obtained.


Did you like this research project?

To get this research project Guidelines, Training and Code... Click Here


PROJECT TITLE : Fully and Partially Distributed Incentive Mechanism for a Mobile Edge Computing Network ABSTRACT: Computing at the network's edge has emerged as a significant focus of recent networking research. The exponential
PROJECT TITLE : Fully Dynamic kk-Center Clustering With Improved Memory Efficiency ABSTRACT: Any machine learning library worth its salt will include both static and dynamic clustering algorithms as core components. The sliding
PROJECT TITLE : Fully Dynamic k-Center Clustering with Improved Memory Efficiency ABSTRACT: Any machine learning library worth its salt will include both static and dynamic clustering algorithms as core components. The sliding
PROJECT TITLE : One-View Occlusion Detection for Stereo Matching With a Fully Connected CRF Modelí_ ABSTRACT: A belief propagation (BP) sequential method described in the tree-reweighted sequential method is extended to completely
PROJECT TITLE :Translating Algorithms to Handle Fully Homomorphic Encrypted Data on the Cloud - 2018ABSTRACT:Cloud provides giant shared resources where users (or foundations) can get pleasure from the facility of storing data

Ready to Complete Your Academic MTech Project Work In Affordable Price ?

Project Enquiry