An International Journal House

Einstein International Journal Organization(EIJO)

Connecting People With Genius Thought

Einstein International Journal Organization(EIJO) is an international Genius Thought journals platform .
JOURNALS || EIJO Journal of Engineering, Technology and Innovative Research (EIJO – JETIR) [ ISSN : 2455 - 9172 ]
An Efficient Identity Based Group Key Distribution Scheme for Client Side Security in Web Applications

Author Names : J.Abinaya, R.Ranjitha, S.Swetha, S. Manikandan  volume 1 issue 1
Article Overview

ABSTRACT 

The main purpose of this paper is to provide secure link and confidentiality of data within the group. In order to achieve this we primarily focus on the authentication protocols, which is the main region of attack by any hackers or intruders. Since we focus on authentication protocols we directly eliminate the chances of break through into the system. Here, we present WebIBC, which integrates public key cryptography into web applications without any browser plugins. The public key of WebIBC is provided by identity based cryptography, eliminating the need of public key and certificate online retrieval; the private key is supplied by the fragment identifier of the URL identifier. The implementation and performance evaluation demonstrate that WebIBC is secure and efficient both in theory and practice. WebIBC integrates identity based cryptosystem into web based applications and is totally established by JavaScript without any browser plugins.

Keyword: Public key Infrastructure, Public key Cryptography, Public Key Generator, Identity Based Cryptography, Limitation and Performance matching.

Reference

[1] B. Adida. Beamauth: two-factor web authentication with a bookmark. In CCS ’07: Proceedings of the 14th ACM conference on Computer and communications security.

[2] X. Boyen. General ad hoc encryption from exponent inversion be. In LNCS 4515, Springer- Verlag,pages 394–411,2007.

[3] T. Berners-Lee, R. Fielding, and L. Masinter. Uniform resource identifier (URI): General syntex.2005.

[4] D. Boneh and X. Boyen. Secure identity based encryption without random oracles. Proceedings of Crypto 2004, LNCS. Springer-Verlag, 2004.

[5] K. Paterson. ID-based signatures from pairings on elliptic curves, cryptology eprint archive, report 2002/004.

[6] A. Shamir. Identity-based cryptosystems and signature schemes. Crypto ’84, pages 47– 53, 1985.

[7] W. Tang, X. Nan, and Z. Chen. Combined public key cryptosystem. Proceedings of International Conference on Software, Telecommunications and Computer Networks (Soft- COM’04), 2004.

[8] D. Boneh and M. Franklin. Identity-based encryption from the Weil pairing. Lecture Notes in Computer Science, 2139, 2001.

[9] C. Cocks. An identity based encryption scheme based on quadratic residues. Lecture Notes In Computer Science, 2260:360–363, 2001.

[10] B.Schneier. Applied cryptography: Protocols, algorithms, and source code in c, second edition. 1996.