Call for papers :

Submission Last Date 30/11/2017
Status Notification Within 2 Days
Submit Paper Online

Check Paper Status

Paper Status

News & Updates

IJAERD provides Hard Copy of Published Certificates of Publication to each author.

We have started accepting articles by online means directly through website. Article submission link is given on left side

IJAERD Provide Review card, Acceptance Letter and Fee Receipt without taking any extra charges

IJAERD invites research paper from various engineering disciplines for Vol.1 Issue 12 (Dec. - 2014) issue,

Conference Proceedings

National Conference on Emerging Trends in Computer & Electrical Engineering (ETCEE - 2014) March 7-8, 2014, Organized by Atmiya Institute of Technology and Science, Rajkot

National Conference on Recent Research in Engineering and Technology (NCRRET-2015) organizing by Dr. Jivraj Mehta Institute of Technology, Mogar-Anand

National Conference on Emerging Trends in Computer, Electrical & Electronics (ETCEE - 2015), March 13-14, 2015, Organized by Atmiya Institute of Technology and Science, Rajkot

Paper Details

Paper Title
ID BASED DOUBLE SERVER GENUINE KEY REPLACE
Abstract
In two-server password-authenticated key exchange (PAKE) protocol, a client splits its password and shops two stocks of its password within the servers, respectively, and the two servers then cooperate to authenticate the patron without knowing the password of the consumer. In case one server is compromised by means of an adversary, the password of the purchaser is needed to stay cozy. In this paper, we present compilers that remodel any two-celebration PAKE protocol to a two-server PAKE protocol on the premise of the identification-based totally cryptography, known as ID2S PAKE protocol. By the compilers, we are able to assemble ID2S PAKE protocols which acquire implicit authentication. As long as the underlying -birthday party PAKE protocol and identity-based absolutely encryption or signature scheme have provable protection without random oracles, the ID2S PAKE protocols built by way of the compilers may be established to be secure without random oracles. Compared with the Katz et al. s -server PAKE protocol with provable protection without random oracles, our ID2S PAKE protocol can shop from 22% to 66% of computation in each server.
KeyWord
Password-authenticated key exchange, identity-based encryption and signature, Diffie-Hellman key exchange.
Others Details
Paper Id : 25716
Author Name : DOKKU. SRIJA
Co-Author Name(s) : Payal PatelGrishma Thaker
Volume/Issue No : Volume 04 Issue 11
Page No : 20-24
DOI Number : DOI:10.21090/IJAERD.25716
Publication Date : 2017-11-02
License : This work is licensed under a Creative Commons Attribution 4.0 International License.
website : http://www.ijaerd.com/index.php
Impact Factor : 4.72, SJIF-2016
ISSN Details : eISSN: 2348-4470, pISSN:2348-6406