Identity-based cryptography with Outsourced Revocation in Cloud Computing

Authors(2) :-Gaddipathi Bharathi, Kota Sureshbabu

Identity-Based Encryption (IBE), which make simple to the public key and credential management at Public Key Infrastructure (PKI) is a significant option to public key encryption. However, one of the most important competence drawbacks of IBE is the transparency calculation at Private Key Generator (PKG) throughout user revocation. Well-organized revocation has been well intentional in conventional PKI setting, but the burdensome executive of certificates is accurately the trouble that IBE strives to improve. In this paper, aiming at tackling the significant concern of identity revocation, we set up outsourcing addition into IBE for the first time and recommend a revocable IBE proposal in the server-aided setting. Our proposal off-load the majority of the key making interrelated operations during key-issuing and key-update processes to a Key Update Cloud Service Provider, departure only a regular number of operations for PKG and users to make locally. This goal is accomplish by exploit a novel collusion-resistant procedure: we take up a hybrid private key for every user, in which an AND gate is complicated to bond and jump the individuality component and the time constituent. Additionally, we suggest another creation which is incontestable secure under the Refereed Delegation of Computation model. In conclusion, we offer extensive untried results to express the efficiency of our projected construction.

Authors and Affiliations

Gaddipathi Bharathi
Department of MCA , St. Mary's Group of Institutions, Guntur, Andhra Pradesh, India
Kota Sureshbabu
Department of MCA , St. Mary's Group of Institutions, Guntur, Andhra Pradesh, India

Identity-Based Encryption, Revocation, Outsourcing, Computing

  1. W. Aiello, S. Lodha, a nd R. Ostrovsky, "Fast digital identity revoc ation," in Advances in Cryptology - CRYPTO ’98 . Springer, 1998.
  2. V. Goyal, "Certificate revocation using fine grained certificate s pace partitioning," in Financial Cryptography and Data Security, ser. Lecture Notes in Computer Science, S. Dietrich and R. Dh amija, Eds. Springer Berlin / Heidelberg, 2007, vol. 4886, pp. 247-259.
  3. F. Elwailly, C. Gen try, and Z. Ramzan, "Quasimodo: Efficien t certificate validation and revocation," in Pu blic Key Cryptography PKC 2004, ser. Lectu re Notes in Computer Science, F. Bao, R. Deng, and J. Zhou, Eds. Springer Berlin / H eidelberg, 2004, vol. 2947, pp. 375-388.
  4. D. Boneh and M. Fr anklin, "Identity -based encryption from the weil pairing," in Advances in Cryptol ogy - CRYPTO 2001 , ser. Lecture Notes in Computer Science, J. Kilian, Ed. Springer Berlin / Heidelberg, 2001, vol. 2139, pp. 2 13-229.
  5. A. Boldyreva, V. Goyal, and V. Kumar, "Identity-based encryption with efficient revocation," in Proceedings of the 15th ACM conference on Computer and communications security, ser. CCS ’08. New York, NY, USA: ACM, 2008, pp. 417-426.
  6. A.  Sahai  and  B.  Waters,  "Fuzzy  identity-based encryption," in Advances in Cryptology EUROCRYPT 2005, ser. Lecture Notes in Computer Science, R. Cramer, Ed. Springer Berlin / Heidelberg, 2005, vol. 3494, pp. 557-557.
  7. R. Canetti, B. Riva, and G. N. Rothblum, "Two 1-round protocols for delegation of computation," Cryptology ePrint Archive, Report 2011/518, 2011.
  8. U. Feige and J. Kilian, "Making games short (extended abstract)," in Proceedings of the twenty-ninth annual ACM symposium on Theory of computing, ser. STOC ’97. New York, NY, USA: ACM, 1997, pp. 506-516.
  9. S. Hohenberger and A. Lysyanskaya, "How to securely outsource cryptographic computations," in Proceedings of the Second international conference on Theory of Cryptography, ser. TCC’05. Berlin, Heidelberg: Springer-Verlag, 2005, pp. 264-282.
  10. R. Canetti, B. Riva, and G. Rothblum, "Two protocols for delegation of computation," in Information Theoretic Security, ser. Lecture Notes in Computer Science, A. Smith, Ed. Springer Berlin / Heidelberg, 2012, vol. 7412, pp. 37-61.
  11. X. Chen, J. Li, J. Ma, Q. Tang, and W. Lou, "New and secure outsourcing algorithms of modular exponentiations," in 17th European Symposium on Research in Computer Security (ESORICS), 2012.
  12. M. J. Atallah and K. B. Frikken, "Securely outsourcing linear algebra computations," in Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ser. ASIACCS 10. New York, NY, USA: ACM, 2010, pp. 48-59.

Publication Details

Published in : Volume 2 | Issue 4 | July-August 2017
Date of Publication : 2017-08-31
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 268-273
Manuscript Number : CSEIT172481
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

Gaddipathi Bharathi, Kota Sureshbabu, "Identity-based cryptography with Outsourced Revocation in Cloud Computing", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 4, pp.268-273, July-August.2017

Follow Us

Contact Us