An Efficient Revocable IBE Scheme with CRA

Authors(2) :-Padmaja V, P. Madhura

Cloud computing is getting increasingly consideration from the data and correspondence advances industry as of late. In existing, an approach which utilizing logs model to building a measurable neighborly framework. Utilizing this model we can rapidly accumulate data from distributed computing for a few sorts of measurable reason. Furthermore, this will diminish the many sided quality of those sorts of legal sciences. we propose another revocable IBE conspire with a cloud renouncement specialist (CRA) to understand the two inadequacies, in particular, the execution is essentially enhanced and the CRA holds just a framework mystery for every one of the clients. For security examination, we exhibit that the proposed conspire is semantically secure under the decisional bilinear Diffie-Hellman (DBDH) suspicion. At long last, we broaden the proposed revocable IBE plan to introduce a CRA-helped confirmation plot with period-restricted benefits for dealing with countless cloud administrations.

Authors and Affiliations

Padmaja V
Department of MCA, Mother Theresa Institute of Computer Applications, Palamaner, India
P. Madhura
Department of MCA, Mother Theresa Institute of Computer Applications, Palamaner, India

Cloud computing, IBE scheme, cloud revocation authority (CRA)

  1. G. Hanaoka and J. Weng. Generic constructions of parallel key-insulated encryption. In SCN, volume 6280 of LNCS, pages 36–53. Springer, 2010.
  2. Y. Hanaoka, G. Hanaoka, J. Shikata, and H. Imai. Identity-based hierarchical strongly key-insulated encryption and its application. In ASIACRYPT 2005, volume 3788 of LNCS, pages 495–514. Springer, 2005.
  3. J. Horwitz and B. Lynn. Towards hierarchical identity-based encryption. In EUROCRYPT 2002, volume 2332 of LNCS, pages 466–481. Springer-Verlag, 2002.
  4. A. B. Lewko and B. Waters. New techniques for dual system encryption and fully secure HIBE with short ciphertexts. In TCC 2010, volume 5978 of LNCS, pages 455–479. Springer, 2010.
  5. A. B. Lewko and B. Waters. Unbounded HIBE and attribute-based encryption. In EUROCRYPT 2011, volume 6632 of LNCS, pages 547–567. Springer, 2011.
  6. B. Libert, J.-J. Quisquater, and M. Yung. Parallel key-insulated public key encryption without random oracles. In PKC 2007, volume 4450 of LNCS, pages 298–314. Springer, 2007.
  7. B. Libert and D. Vergnaud. Adaptive-ID secure revocable identity-based encryption. In CT-RSA 2009, volume 5473 of LNCS, pages 1–15. Springer, 2009.
  8. J. H. Seo and K. Emura. Efficient delegation of key generation and revocation functionalities in identitybased encryption. In CT-RSA 2013, volume 7779 of LNCS, pages 343–358. Springer, 2013.
  9. B. Waters. Dual system encryption: Realizing fully secure IBE and HIBE under simple assumptions. In S. Halevi, editor, CRYPTO 2009, volume 5677 of LNCS, pages 619–636. Springer-Verlag, 2009.
  10. J. Weng, S. Liu, K. Chen, D. Zheng, and W. Qiu. Identity-based threshold key-insulated encryption without random oracles. In CT-RSA 2008, volume 4964 of LNCS, pages 203–220. Springer, 2008.
  11. M. Bellare and A. Palacio. Protecting against key exposure: strongly key-insulated encryption with optimal threshold. In IACR Cryptology ePrint Archive 2002:064, 2002. 12 A. Boldyreva, V. Goyal, and V. Kumar. Identity-based encryption with efficient revocation. In ACM CCS 2008, pages 417–426, 2008.
  12. D. Boneh and X. Boyen. Efficient selective-id identity based encryption without random oracles. In EUROCRYPT 2004, volume 3027 of LNCS, pages 223–238. Springer-Verlag, 2004.
  13. N. Potlapally, S. Ravi, A. Raghunathan and N. K. Jha, "Analyzing the Energy Consumption of Security Protocols", ISLPED 2003.
  14. C. K. Koc, "High-speed RSA implementation", Tech. Rep. TR 201, RSA Laboratories, November 1994.
  15. D. Hankerson, A. Menezes, S. Vanstone, "Guide to Elliptic Curve Cryptography", Springer-Verlag New York, Inc. 2004. ISBN 0-387-95273-X.
  16. B. Kaliski, "TWIRL and RSA Key Size", RSA Laboratories Technical Note, May 2003.
  17. D. Eastlake, P. Jones, "US Secure Hash Algorithm 1 (SHA1)", IETF Request for Comments 3174, 2001.
  18. J. Polastre, J. Hill, D. Culler, "Versatile Low Power Media Access for Wireless Sensor Networks", SenSys, 2004.
  19. M. Hamilton, M. Allen, D. Estrin, J. Rottenberry, P. Rundel, M. Srivastava, and S. Soatto. "Extensible Sensing System: An advanced Network Design for Microclimate Sensing", http://www.cens.ucla.edu

Publication Details

Published in : Volume 4 | Issue 2 | March-April 2018
Date of Publication : 2018-03-31
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 385-387
Manuscript Number : CSEIT184103
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

Padmaja V, P. Madhura, "An Efficient Revocable IBE Scheme with CRA", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 4, Issue 2, pp.385-387, March-April-2018.
Journal URL : http://ijsrcseit.com/CSEIT184103

Follow Us

Contact Us