Abstract

In this paper, we mathematically associate Crypto Cloud Computing, that has become an emerging research area, with Cooperative Game Theory in the presence of uncertainty. In the sequel, we retrieve data from the database of Amazon Web Service. The joint view upon Crypto Cloud Computing, Cooperative Game Theory and Uncertainty management is a novel approach. For this purpose, we construct a cooperative interval game model and apply this model to Social Networks. Then, we suggest some interval solutions related with the model by proposing a novel elliptic curve public key encryption scheme over finite fields having the property of semantic security. The paper ends with concluding words and an outlook to future studies.

Highlights

  • In the last decays, social networks have been a very important structure for users who are interconnecting through a variety of relations

  • We propose a novel public key scheme by using elliptic curves over finite fields which fulfills the property of semantic security

  • We suggest some interval solutions related with the model by proposing a novel elliptic curve public key encryption scheme over finite fields having the property of semantic security

Read more

Summary

Introduction

Social networks have been a very important structure for users who are interconnecting through a variety of relations. Cooperative game theory, cloud computing, elliptic curves, social networks, uncertainty, interval solutions. We propose a novel public key scheme by using elliptic curves over finite fields which fulfills the property of semantic security. The cost of the proposed scheme varies depending on the models of elliptic curves and the type of coordinate systems. We suggest some interval solutions related with the model by proposing a novel elliptic curve public key encryption scheme over finite fields having the property of semantic security. The computational costs of novel scheme just depend on the point multiplication of elliptic curves. The costs of proposed scheme vary depending on the forms of elliptic curves and the coordinate systems. E is not able to find whether the ciphertext c is the encryption of m1 or m2 with a probability non-negligibly larger than 1/2

An application
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.