Javascript must be enabled to continue!
Application of Bounded Collusion for Identity-Based Encryption Using the Identity Based Encryption Algorithm
View through CrossRef
This research aims to design and develop an identity encryption application using the bounded collusion method with the implementation of the Identity Based Encryption (IBE) algorithm. The method combines IBE, bounded collusion, and key generation based on the user's email. The application was developed using Visual Basic. In its implementation, the application can perform text encryption and decryption while limiting the number of decryptions to a maximum of two times per identity, in accordance with the bounded collusion principle. The testing results show that the application effectively protects user identities by generating unique keys based on email and restricting potential collusion attacks between users. Therefore, the implementation of bounded collusion and IBE is proven to enhance the security of identity-based encryption processes
Title: Application of Bounded Collusion for Identity-Based Encryption Using the Identity Based Encryption Algorithm
Description:
This research aims to design and develop an identity encryption application using the bounded collusion method with the implementation of the Identity Based Encryption (IBE) algorithm.
The method combines IBE, bounded collusion, and key generation based on the user's email.
The application was developed using Visual Basic.
In its implementation, the application can perform text encryption and decryption while limiting the number of decryptions to a maximum of two times per identity, in accordance with the bounded collusion principle.
The testing results show that the application effectively protects user identities by generating unique keys based on email and restricting potential collusion attacks between users.
Therefore, the implementation of bounded collusion and IBE is proven to enhance the security of identity-based encryption processes.
Related Results
Restrain Price Collusion in Trade‐Based Supply Chain Finance
Restrain Price Collusion in Trade‐Based Supply Chain Finance
Collusion can increase the transaction value among supply chain members to obtain higher loans from supply chain finance (SCF) service provider, which will bring some serious risks...
Research on the Evolution of Collusion between Government and Civil Construction Enterprises in Environmental Regulation
Research on the Evolution of Collusion between Government and Civil Construction Enterprises in Environmental Regulation
Polluting civil construction enterprises usually use the way of "voting with their feet" to exert influence on the efforts of local government's environmental regulation, promote t...
Segmented encryption algorithm for privacy and net neutrality in distributed cloud systems
Segmented encryption algorithm for privacy and net neutrality in distributed cloud systems
The advent of distributed cloud systems has revolutionized data storage and access, providing flexibility and scalability across various industries. However, these benefits come wi...
RSA vs Quantum Encryption: Flexibility, Security, and Performance Analysis for Information Processing
RSA vs Quantum Encryption: Flexibility, Security, and Performance Analysis for Information Processing
Introduction: With the advent of quantum computing, traditional encryption methods face significant challenges in maintaining security. This study explores quantum information proc...
Research on Video Encryption Technology Based on Cross Coupled Map Lattices System
Research on Video Encryption Technology Based on Cross Coupled Map Lattices System
<p>The traditional video encryption algorithm only encrypts video images, which has the problems of an extended time-consuming algorithm and poor format retention. To improve...
An Authorized Scheme Service Privately Shared Data
An Authorized Scheme Service Privately Shared Data
In the modern digital landscape, the secure sharing of data across distributed systems remains a critical challenge. This paper proposes a blockchain-based architecture that levera...
Improved Structure of Data Encryption Standard Algorithm
Improved Structure of Data Encryption Standard Algorithm
The Internet is providing vital communications between millions of individuals. It is also more and more utilized as one of the commerce tools; thus, security is of high importance...
Efficient Hybrid Cryptography Algorithm
Efficient Hybrid Cryptography Algorithm
Cryptography is the operation of transferring a specific message to prevent an attacker from accessing the contents of a message. To increase the level of security in any communica...

