2018
DOI: 10.1002/cpe.4845
|View full text |Cite
|
Sign up to set email alerts
|

An efficient RSA cryptosystem by applying cuckoo search optimization algorithm

Abstract: Cloud computing is a promising technology that provides ubiquitous and on-demand network access to a shared pool of configurable computing devices. However, the security is a major challenge in cloud environment due to the data sharing via the internet and data stored in the cloud.In cloud computing, there are various security issues such as confidentiality, integrity, and authentication. Among these issues, data integrity play a significant role in the cloud computing and various techniques were proposed to s… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 19 publications
0
4
0
Order By: Relevance
“…Formula ( 6) can be proved by induction on j. Indeed, if j = 2, by relation ( 3), one has 6) holds true up to the index (j − 1), then, by relations ( 5) and (7), it is easy to see that…”
Section: Definitions and Main Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…Formula ( 6) can be proved by induction on j. Indeed, if j = 2, by relation ( 3), one has 6) holds true up to the index (j − 1), then, by relations ( 5) and (7), it is easy to see that…”
Section: Definitions and Main Resultsmentioning
confidence: 99%
“…To counter that, developers have increased key length from one time to another to maintain a high security and privacy to systems that are protected by the RSA. Other countermeasures vary from using multiple public and private keys [3] to enhance and secure the RSA public key cryptosystem (ESRPKC) algorithm using the Chinese remainder theorem [4], from the use of a pair of random numbers and their modular multiplicative inverse [5] to the Cuckoo Search Optimization (CSA) algorithm for securing data integrity in the cloud [6]. For a survey, see Mumtaz et al [7].…”
Section: Introductionmentioning
confidence: 99%
“…Multiplication and addition privacy homomorphism is the two various instances of privacy homomorphism. The mathematical formulations and their respective definitions are described as follows 42 …”
Section: Proposed Gm‐naino Based Rsa Cryptographymentioning
confidence: 99%
“…Multiplication and addition privacy homomorphism is the two various instances of privacy homomorphism. The mathematical formulations and their respective definitions are described as follows [22].…”
Section: Rsa Cryptography Algorithmmentioning
confidence: 99%