Skip Nav Destination
ASME Press Select Proceedings
International Conference on Instrumentation, Measurement, Circuits and Systems (ICIMCS 2011)
By
ISBN:
9780791859902
No. of Pages:
1400
Publisher:
ASME Press
Publication date:
2011
eBook Chapter
282 A New Parallel Encryption Scheme for Massive Data
By
Yang Liu
,
Yang Liu
School of Computer Science and Technology,
Huazhong University of Science and Technology
, Wuhan, 430074
, China
; hustemily@gmail.com
Search for other works by this author on:
Songfeng Lu
,
Songfeng Lu
School of Computer Science and Technology,
Huazhong University of Science and Technology
, Wuhan, 430074
, China
; lusongfeng@hotmail.com
Search for other works by this author on:
Youqiao Zhao
,
Youqiao Zhao
School of Computer Science and Technology,
Huazhong University of Science and Technology
, Wuhan, 430074
, China
; yqzhao7678@sina.com
Search for other works by this author on:
Fang Liu
Fang Liu
School of Computer Science and Technology,
Huazhong University of Science and Technology
, Wuhan, 430074
, China
; Fang.Liu@hust.edu.cn
Search for other works by this author on:
Page Count:
4
-
Published:2011
Citation
Liu, Y, Lu, S, Zhao, Y, & Liu, F. "A New Parallel Encryption Scheme for Massive Data." International Conference on Instrumentation, Measurement, Circuits and Systems (ICIMCS 2011). Ed. Ming, C. ASME Press, 2011.
Download citation file:
Considering the safety and the efficiency to transport files containing of sensitive data through internet, an encryption scheme based on the digital envelope technology and digital signature technology is proposed. The file is encrypted by AES while the symmetric key is encrypted using ECC. To ensure data integrity and encryption efficiency, the file is also processed by SHA-1 to get its digest which is then be encrypted by ECC. Moreover, in order to process large files or massive data effectively, a parallel encryption algorithm is proposed. The experiment result shows it performs well and provides a higher encryption speed.
Topics:
Encryption
Abstract
Keywords:
Introduction
Basic Definitions and Concepts
The Encryption Scheme
The Improved Parallel Algorithm
Experiment
6 Conclusions
Acknowledgments
References
This content is only available via PDF.
You do not currently have access to this chapter.
Email alerts
Related Chapters
Deciles-Based Accelerating Scheme for Fractal Image Encoding
International Conference on Advanced Computer Theory and Engineering, 5th (ICACTE 2012)
Dual Scrambling Image Encryption Algorithm Based on Chaotic System with Variable Parameter
Proceedings of the International Conference on Internet Technology and Security
A New Method for Self-Embedding Image Construction
International Conference on Computer Engineering and Technology, 3rd (ICCET 2011)
A Secure BSS-Based Encryption Scheme Using AES Key Expansion Approach
International Conference on Computer Engineering and Technology, 3rd (ICCET 2011)
Related Articles
A Blockchain-Based G-Code Protection Approach for Cyber-Physical Security in Additive Manufacturing
J. Comput. Inf. Sci. Eng (August,2021)
Customized Encryption of Computer Aided Design Models for Collaboration in Cloud Manufacturing Environment
J. Manuf. Sci. Eng (August,2015)
A Tandem Evolutionary Algorithm for Platform Product Customization
J. Comput. Inf. Sci. Eng (June,2007)