An Outsourced Revocation for Identity Based Encryption in Cloud Computing

Authors

  • K. Swetha  MCA Sri Padmavathi College of Computer Sciences And Technology Tiruchanoor,Tirupati, Andhra Pradesh, India

Keywords:

Identity-Based encoding, Public Key Infrastructure, public key, identity revocation and Cloud Service Provider.

Abstract

Cloud Computing provides USA suggests that by that we are able to access the applications as utilities over the web. It permits USA to make, configure, and customize the business applications on-line. Altogether the present schemes for information security, major security-oriented process like secret writing, decryption, and access management mechanisms area unit handled by the user’s device itself. During this paper, aiming at try the crucial issue of identity revocation, we tend to introduce outsourcing computation into IBE for the primary time and propose a voidable IBE theme within the server-aided setting. Our theme offloads most of the key generation connected operations throughout key-issuing and key-update processes to a Key Update Cloud Service supplier, going away solely a continuing range of straightforward operations for PKG and users to perform regionally. This goal is achieved by utilizing a unique collusion-resistant technique: we tend to use a hybrid personal key for every user, during which associate degree logic gate is concerned to attach and certain the identity element and also the time element. Moreover, we tend to propose another construction that is obvious secure underneath the recently formulized Refereed Delegation of Computation model. Finally, we offer intensive experimental results to demonstrate the potency of our planned construction.

References

  1. W. Aiello, S. Lodha, and R. Ostrovsky, "Fast digital identity revocation," in Advances in Cryptology (CRYPTO‟98). New York, NY, USA: Springer, 1998, pp. 137-152.
  2. V. Goyal, "Certificate revocation using fine grained certificate space partitioning," in Financial Cryptography and Data Security, S. Dietrich and R. Dhamija, Eds. Berlin, Germany: Springer, 2007, vol. 4886, pp. 247-259.
  3. F. Elwailly, C. Gentry, and Z. Ramzan, "Quasimodo: Efficient certificate validation and revocation," in Public Key Cryptography (PKC‟04), F. Bao, R. Deng, and J. Zhou, Eds. Berlin, Germany: Springer, 2004, vol. 2947, pp. 375-388.
  4. D. Boneh and M. Franklin, "Identity-based encryption from the Weil pairing," in Advances in Cryptology (CRYPTO 01), J. Kilian, Ed. Berlin, Germany: Springer, 2001, vol. 2139, pp. 213-229.
  5. A. Boldyreva, V. Goyal, and V. Kumar, "Identity-based encryption with efficient revocation," in Proc. 15thACMConf. Comput. Commun. Security (CCS‟08), 2008, pp. 417-426.
  6. A. Sahai and B. Waters, "Fuzzy identity-based encryption," in Advances in Cryptology (EUROCRYPT‟05), R. Cramer, Ed. Berlin, Germany: Springer, 2005, vol. 3494, pp. 557-557.
  7. R. Canetti, B. Riva, and G. N. Rothblum, "Two 1-round protocols for delegation of computation," Cryptology ePrint Archive, Rep. 2011/ 518, 2011 online]. Available: http://eprint.iacr.org/2011/518.
  8. U. Feige and J. Kilian, "Making games short (extended abstract)," in Proc. 29th Annu. ACM Symp. Theory Comput. (STOC‟97), 1997, pp. 506-516.
  9. S. Hohenberger and A. Lysyanskaya, "How to securely outsource cryptographic computations," in Proc. 2nd Int. Conf. Theory Cryptography (TCC‟05), 2005, pp. 264-282.
  10. R. Canetti, B. Riva, and G. Rothblum, "Two protocols for delegation of computation," in Information Theoretic Security, A. Smith, Ed. Berlin, Germany: Springer, 2012, vol. 7412, pp. 37-61.
  11. X. Chen, J. Li, J. Ma, Q. Tang, and W. Lou, "New and secure outsourcing algorithms of modular exponentiations," in Proc. 17th Eur. Symp. Res. Comput. Security (ESORICS), 2012, pp. 541-556.
  12. M. J. Atallah and K. B. Frikken, "Securely outsourcing linear algebra computations," in Proc. 5th ACM Symp. Inf. Comput. Commun. Security (ASIACCS‟10), 2010, pp. 48-59.
  13. A. Shamir, "Identity-based cryptosystems and signature schemes," in Advances in Cryptology (CRYPTO), G. Blakley and D. Chaum, Eds. Berlin, Germany: Springer, 1985, vol. 196, pp. 47-53.
  14. W. Aiello, S. Lodha, and R. Ostrovsky, "Fast digital identity revocation," in Advances in Cryptology - CRYPTO’98. Springer, 1998.
  15. R. Canetti, B. Riva, and G. N. Rothblum, "Two 1- round protocols for delegation of computation," Cryptology ePrint Archive, Report 2011/518, 2011.

Downloads

Published

2018-04-30

Issue

Section

Research Articles

How to Cite

[1]
K. Swetha, " An Outsourced Revocation for Identity Based Encryption in Cloud Computing, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 4, pp.535-540, March-April-2018.