This paper is published in Volume-3, Issue-3, 2017
Area
Network Security
Author
Mr. Vaibhav P. Thakare, Prof . Chetan J. Shelke
Org/Univ
P. R. Patil Collage of Engg and Technology, Amravati, Maharashtra, India
Pub. Date
30 May, 2017
Paper ID
V3I3-1370
Publisher
Keywords
Anonymous Communication, Anonymous Authentication, Secure Channel, Identity-Based Encryption, Group Signature

Citationsacebook

IEEE
Mr. Vaibhav P. Thakare, Prof . Chetan J. Shelke. Implementation of Anonymous and Secure Communication System with Group Signatures, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARIIT.com.

APA
Mr. Vaibhav P. Thakare, Prof . Chetan J. Shelke (2017). Implementation of Anonymous and Secure Communication System with Group Signatures. International Journal of Advance Research, Ideas and Innovations in Technology, 3(3) www.IJARIIT.com.

MLA
Mr. Vaibhav P. Thakare, Prof . Chetan J. Shelke. "Implementation of Anonymous and Secure Communication System with Group Signatures." International Journal of Advance Research, Ideas and Innovations in Technology 3.3 (2017). www.IJARIIT.com.

Abstract

For Privacy Preserving Communications Both Anonymity and end to end encryption mechanism is essential. Identity Based Encryption technique is best suitable for secure and anonymous communications. For solving anonymous and secure communication problems both cryptographic and IBE based protocols needed which governs the proper communication between two parties. For the purpose of authentication of the user proxy server is maintained between user and service providers. The GM and KGC is essential in anonymous communication for issuing both signing and decryption keys for getting plaintext from ciphertext in original form. Public key encryption and digital signature mechanism needed for guarantees of secure communication between both ends. Finally protocol realizes secure and anonymous communication between sender and receiver. The Communication Protocol along with IBE and Group signatures allow secure anonymous authentication. In this way, illegitimate users cannot use anonymous system and cannot effect the communication between source and destination whereas legitimate users access systems without compromising anonymity. In this way the proposed system get secure and anonymous communication over the network. Keywords: Anonymous Communication, Anonymous Authentication, Secure Channel, Identity-Based Encryption, Group Signature.