Repository logo
Communities & Collections
All of DSpace
  • English
  • العربية
  • বাংলা
  • Català
  • Čeština
  • Deutsch
  • Ελληνικά
  • Español
  • Suomi
  • Français
  • Gàidhlig
  • हिंदी
  • Magyar
  • Italiano
  • Қазақ
  • Latviešu
  • Nederlands
  • Polski
  • Português
  • Português do Brasil
  • Srpski (lat)
  • Српски
  • Svenska
  • Türkçe
  • Yкраї́нська
  • Tiếng Việt
Log In
New user? Click here to register.Have you forgotten your password?
  1. Home
  2. Browse by Author

Browsing by Author "Maji, Debabrata"

Filter results by typing the first few letters
Now showing 1 - 1 of 1
  • Results Per Page
  • Sort Options
  • No Thumbnail Available
    Item
    Cloud-assisted Multi-Channel Data Broadcasting
    (Indian Statistical Institute, Kolkata, 2025-07) Maji, Debabrata
    The convergence of Internet of Things (IoT) and cloud computing has transformed technology, impacting commerce, industrial production, data management, etc. Multi- Channel Broadcast Encryption (MCBE), first introduced by Phan et al. (ASIACCS 2013), is a cryptographic encryption primitive used for both IoT and Cloud that permits a sender to e!ciently and securely encrypt several messages for di”erent groups of receivers. After thoroughly exploring the existing literature, we observe that none achieves the robust provable security within the standard model. This paper addresses this gap, aiming to achieve adaptive INDistinguishable under full-IDentity Chosen-Ciphertext Attack (IND-ID-CCA) security by constructing an e!cient identity-based MCBE without the Random Oracle Model (ROM). Our construction not only attains communication bandwidth of O(μ)-size but also maintains constant-size overhead storage without any security vulnerabilities. Here, μ represents the number of messages. This is the first protocol proven to be adaptive IND-ID-CCA secure under the standard Decisional Bilinear Di!e-Hellman Type-3 (DBDH-3) assumption in public-key settings without any random oracles. Moreover, practical implementation data reveals an optimal decryption algorithm, taking a mere 0.0048 seconds on IoT devices, demonstrating real-world applicability. Furthermore, our proposed design is highly e!cient as opposed to the other existing works, as shown by implemental and graphical data.

DSpace software copyright © 2002-2026 LYRASIS

  • Privacy policy
  • End User Agreement
  • Send Feedback
Repository logo COAR Notify