An Outsourced Revocation for Identity Based Encryption in Cloud Computing

Authors(1) :-K. Swetha

Cloud Computing provides USA suggests that by that we are able to access the applications as utilities over the web. It permits USA to make, configure, and customize the business applications on-line. Altogether the present schemes for information security, major security-oriented process like secret writing, decryption, and access management mechanisms area unit handled by the userís device itself. During this paper, aiming at try the crucial issue of identity revocation, we tend to introduce outsourcing computation into IBE for the primary time and propose a voidable IBE theme within the server-aided setting. Our theme offloads most of the key generation connected operations throughout key-issuing and key-update processes to a Key Update Cloud Service supplier, going away solely a continuing range of straightforward operations for PKG and users to perform regionally. This goal is achieved by utilizing a unique collusion-resistant technique: we tend to use a hybrid personal key for every user, during which associate degree logic gate is concerned to attach and certain the identity element and also the time element. Moreover, we tend to propose another construction that is obvious secure underneath the recently formulized Refereed Delegation of Computation model. Finally, we offer intensive experimental results to demonstrate the potency of our planned construction.

Authors and Affiliations

K. Swetha
MCA Sri Padmavathi College of Computer Sciences And Technology Tiruchanoor,Tirupati, Andhra Pradesh, India

Identity-Based encoding, Public Key Infrastructure, public key, identity revocation and Cloud Service Provider.

  1. W. Aiello, S. Lodha, and R. Ostrovsky, "Fast digital identity revocation," in Advances in Cryptology (CRYPTO?98). New York, NY, USA: Springer, 1998, pp. 137-152.
  2. V. Goyal, "Certificate revocation using fine grained certificate space partitioning," in Financial Cryptography and Data Security, S. Dietrich and R. Dhamija, Eds. Berlin, Germany: Springer, 2007, vol. 4886, pp. 247-259.
  3. F. Elwailly, C. Gentry, and Z. Ramzan, "Quasimodo: Efficient certificate validation and revocation," in Public Key Cryptography (PKC?04), F. Bao, R. Deng, and J. Zhou, Eds. Berlin, Germany: Springer, 2004, vol. 2947, pp. 375-388.
  4. D. Boneh and M. Franklin, "Identity-based encryption from the Weil pairing," in Advances in Cryptology (CRYPTO 01), J. Kilian, Ed. Berlin, Germany: Springer, 2001, vol. 2139, pp. 213-229.
  5. A. Boldyreva, V. Goyal, and V. Kumar, "Identity-based encryption with efficient revocation," in Proc. 15thACMConf. Comput. Commun. Security (CCS?08), 2008, pp. 417-426.
  6. A. Sahai and B. Waters, "Fuzzy identity-based encryption," in Advances in Cryptology (EUROCRYPT?05), R. Cramer, Ed. Berlin, Germany: Springer, 2005, vol. 3494, pp. 557-557.
  7. R. Canetti, B. Riva, and G. N. Rothblum, "Two 1-round protocols for delegation of computation," Cryptology ePrint Archive, Rep. 2011/ 518, 2011 online]. Available: http://eprint.iacr.org/2011/518.
  8. U. Feige and J. Kilian, "Making games short (extended abstract)," in Proc. 29th Annu. ACM Symp. Theory Comput. (STOC?97), 1997, pp. 506-516.
  9. S. Hohenberger and A. Lysyanskaya, "How to securely outsource cryptographic computations," in Proc. 2nd Int. Conf. Theory Cryptography (TCC?05), 2005, pp. 264-282.
  10. R. Canetti, B. Riva, and G. Rothblum, "Two protocols for delegation of computation," in Information Theoretic Security, A. Smith, Ed. Berlin, Germany: Springer, 2012, vol. 7412, pp. 37-61.
  11. X. Chen, J. Li, J. Ma, Q. Tang, and W. Lou, "New and secure outsourcing algorithms of modular exponentiations," in Proc. 17th Eur. Symp. Res. Comput. Security (ESORICS), 2012, pp. 541-556.
  12. M. J. Atallah and K. B. Frikken, "Securely outsourcing linear algebra computations," in Proc. 5th ACM Symp. Inf. Comput. Commun. Security (ASIACCS?10), 2010, pp. 48-59.
  13. A. Shamir, "Identity-based cryptosystems and signature schemes," in Advances in Cryptology (CRYPTO), G. Blakley and D. Chaum, Eds. Berlin, Germany: Springer, 1985, vol. 196, pp. 47-53.
  14. W. Aiello, S. Lodha, and R. Ostrovsky, "Fast digital identity revocation," in Advances in Cryptology - CRYPTO’98. Springer, 1998.
  15. R. Canetti, B. Riva, and G. N. Rothblum, "Two 1- round protocols for delegation of computation," Cryptology ePrint Archive, Report 2011/518, 2011.

Publication Details

Published in : Volume 3 | Issue 4 | March-April 2018
Date of Publication : 2018-04-30
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 535-540
Manuscript Number : CSEIT1833429
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

K. Swetha, "An Outsourced Revocation for Identity Based Encryption in Cloud Computing", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 4, pp.535-540, March-April-2018.
Journal URL : http://ijsrcseit.com/CSEIT1833429

Article Preview

Follow Us

Contact Us