Abha-Gaikwad Patil College of Engineering, Nagpur, Maharashtra, India An Analytical Survey on Identity Based Encryption in Cloud

Authors(5) :-Ranjana K. Gajbhiye, Shrikant S. Khadse, Pratiksha Y. Ramteke, Poonam B. Dapurkar, Prof. Gajanan Patle

Public key infrastructure (PKI) is a substitute decision to open key encryption however the Identity-Based Encryption IBE is open key and attestation affiliation. The central impediment of IBE in the midst of renouncement is the overhead estimation at private key generator (PKG).In this paper, going for study on unmistakable framework for dealing with the basic issue of Identity revocation. We furthermore checked on our proposed work which convey outsourcing considering close by IBE inquisitively and propose a revocable IBE sort out in the server-helped setting. Our approach offloads a wide piece of the key time related operations amidst key-issuing and key-overhaul structures to a Key Update Cloud Service Provider, leaving just a normal number of central operations for PKG and clients to perform locally. Also, we propose another change which is provable secure under the beginning late formulized Refereed giving over of Computation outline.

Authors and Affiliations

Ranjana K. Gajbhiye
BE Students, Department of Computer Science and Engineering, Abha-Gaikwad Patil College of Engineering, Nagpur, Maharashtra, India
Shrikant S. Khadse
Assistant Professor, Department of Computer Science and Engineering, Abha-Gaikwad Patil College of Engineering, Nagpur, Maharashtra, India
Pratiksha Y. Ramteke

Poonam B. Dapurkar

Prof. Gajanan Patle

Identity-Based Encryption (IBE), Revocation, Outsourcing, Cloud Computing

  1. W. Aiello, S. Oldham, and R. Ostrovsky, "Fast digital identity revocation, "in Advances in Cryptology (CRYPTO‟98). New York, NY, USA: Springer, 1998, pp. 137–152.
  2. D. Boneh and M. Franklin, "Identity-based encryption from the Weil pairing," in Advances in Cryptology (CRYPTO „01), J. Kilian, Ed.Berlin, Germany: Springer, 2001, vol. 2139, pp. 213–229.
  3. A. Sahai and B. Waters, "Fuzzy identity-based encryption," in Advances in Cryptology (EUROCRYPT‟05), R. Cramer, Ed. Berlin, Germany: Springer, 2005, vol. 3494, pp. 557–557.
  4. S. Hohenberger and A. Lysyanskaya, "How to securely outsource cryptographic computations," in Proc. 2nd Int. Conf. Theory Cryptography (TCC‟05), 2005, pp. 264– 282
  5. J. Li, C. Jia, J. Li, and X. Chen, "Outsourcing encryption of attributebased encryption with mapreduce," in Information and Communications Security. Berlin, Heidelberg: Springer, 2012, vol. 7618, pp. 191–201.
  6. B. Zhang, J. Wang, K. Ren, and C. Wang, "Privacy assured Trans. Emerging Topics Comput., vol. 1, no. 1, p. 166–177, Jul. Dec. 2013 outsourcing of image reconstruction service in cloud," IEEE.
  7. B. Zhang, J. Wang, K. Ren, and C. Wang, "Privacyassured outsourcing of image reconstruction service in cloud," IEEE Trans. Emerging Topics Comput., vol. 1, no. 1, p. 166–177, Jul./Dec. 2013.
  8. A. Shamir, "Identity-based cryptosystems and signature schemes," in Advances in Cryptology (CRYPTO), G. Blakley and D. Chaum, Eds. Berlin, Germany: Springer, 1985, vol. 196, pp. 47–53.
  9. C. Cocks, "An identity based encryption scheme based on quadratic residues," in Cryptography and Coding, B. Honary, Ed. Berlin/ Heidelberg: Springer, 2001, vol. 2260, pp. 360–363.
  10. R. Canetti, S. Halevi, and J. Katz, "A forward-secure public-key encryption scheme," in Advances in Cryptology (EUROCRYPT‟03),E. Biham, Ed. Berlin, Germany: Springer, 2003, vol. 2656, pp. 646–646.
  11. D. Boneh and X. Boyen, "Efficient selective-id secure identity-based encryption without random oracles," in Advances in Cryptology (EUROCRYPT‟04), C. Cachin and J. Camenisch, Eds. Berlin,Germany: Springer, 2004, vol. 3027, pp. 223–238.
  12. D. Boneh and X. Boyen, "Secure identity based encryption without random oracles," in Advances in Cryptology (CRYPTO‟04),M. Franklin, Ed. Berlin, Germany: Springer, 2004, vol. 3152, pp. 197–206.
  13. B. Waters, "Efficient identity-based encryption without random oracles," in Advances in Cryptology (EUROCRYPT‟05), R. Cramer, Ed. Berlin, Germany: Springer, 2005, vol. 3494, pp. 114–127.
  14. C. Gentry, "Practical identity-based encryption without random oracles," in Advances in Cryptology (EUROCRYPT‟06), S. Vaudenay, Ed. Berlin, Germany: Springer, 2006, vol. 4004, pp. 445–464.
  15. C. Gentry, C. Peikert, and V. Vaikuntanathan, "Trapdoors for hard lattices and new cryptographic constructions," in Proc. 40th Annu. ACM Symp. Theory Comput. (STOC‟08), 2008, pp. 197–206.
  16. S. Agrawal, D. Boneh, and X. Boyen, "Efficient lattice (h)ibe in the standard model," in Advances in Cryptology (EUROCRYPT‟10), H. Gilbert, Ed. Berlin, Germany: Springer, 2010, vol. 6110, pp. 553–572.
  17. D. Cash, D. Hofheinz, E. Kiltz, and C. Peikert, "Bonsai trees, or how to delegate a lattice basis," in Advances in Cryptology (EUROCRYPT‟10), H. Gilbert, Ed. Berlin, Germany: Springer, 2010,vol. 6110, pp. 523–552
  18. Y. Hanaoka, G. Hanaoka, J. Shikata, and H. Imai, "Identity-based hierarchical strongly key-insulated encryption and its application," in Advances in Cryptology (ASIACRYPT‟05), B. Roy, Ed. Berlin, Germany: Springer, 2005, vol. 3788, pp. 495–514.
  19. D. Boneh, X. Ding, G. Tsudik, and C. Wong, "A method for fast revocation of public key certificates and security capabilities," in Proc. 10th USENIX Security Symp., 2001, pp. 297–308.
  20. B. Libert and J.-J. Quisquater, "Efficient revocation and threshold pairing based cryptosystems," in Proc. 22nd Annu. Symp. Principles Distrib. Comput., 2003, pp. 163–171.
  21. H. Lin, Z. Cao, Y. Fang, M. Zhou, and H. Zhu, "Howto design space efficient revocable IBE from nonmonotonic ABE," in Proc. 6th ACM Symp. Inf. Comput. Commun. Security (ASIACCS‟11), 2011, pp. 381–385.
  22. B. Libert and D. Vergnaud, "Adaptive-id secure revocable identitybased encryption," in Topics in Cryptology (CT-RSA‟09),M. Fischlin, Ed. Berlin, Germany: Springer, 2009, vol. 5473, pp. 1–15.
  23. S. Yu, C. Wang, K. Ren, and W. Lou, "Attribute based data sharing with attribute revocation," in Proc. 5th ACM Symp. Inf. Comput. Commun. Security (ASIACCS‟10), 2010, pp. 261–270.
  24. D. Chaum and T. P. Pedersen, "Wallet databases with observers," in Proc. 12th Annu. Int. Cryptology Conf. Adv. Cryptology (CRYPTO‟92), 1993, pp. 89–105.
  25. M. J. Atallah, K. Pantazopoulos, J. R. Rice, and E. E. Spafford, "Secure outsourcing of scientific computations," in Trends in Software Engineering, M. V. Zelkowitz, Ed. New York, NY, USA: Elsevier, 2002,vol. 54, pp. 215–272

Publication Details

Published in : Volume 3 | Issue 1 | January-February 2018
Date of Publication : 2018-02-28
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 704-710
Manuscript Number : CSEIT1831189
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

Ranjana K. Gajbhiye, Shrikant S. Khadse, Pratiksha Y. Ramteke, Poonam B. Dapurkar, Prof. Gajanan Patle, "Abha-Gaikwad Patil College of Engineering, Nagpur, Maharashtra, India An Analytical Survey on Identity Based Encryption in Cloud", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 1, pp.704-710, January-February-2018. |          | BibTeX | RIS | CSV

Article Preview