Identity-Based Encoding with Cloud Abrogation

Authors(2) :-N. Raghupathi, P. V. Ramesh

Identity-based encoding (IBE) may be a public key cryptosystem and eliminates the stress of public key infrastructure (PKI) and certificate administration in typical public key settings. As a result of the absence of PKI, the revocation drawback may be a essential issue in IBE settings. Many voidable IBE schemes are planned concerning this issue. Quite recently, by embedding associate outsourcing computation technique into IBE, Li et al. planned avoidable IBE theme with a key-update cloud service supplier (KU-CSP). However, their theme has 2 shortcomings. One is that the computation and communication prices area unit over previous revocable IBE schemes. The opposite defect is lack of quantifiability within the sense that the KU-CSP should keep a secret worth for every user. Within the article, we tend to propose a replacement voidable IBE theme with a cloud revocation authority (CRA) to unravel the 2 shortcomings, namely, the performance is considerably improved and also the CRA holds solely a system secret for all the users. For security analysis, we demonstrate that the planned theme is semantically secure below the decisional linear Diffie-Hellman (DBDH) assumption. Finally, we extend the planned voidable IBE theme to gift a CRA-aided authentication theme with period-limited privileges for managing an outsized variety of assorted cloud services.

Authors and Affiliations

N. Raghupathi
Student, Dept of Master of Computer Science, RIIMS College, Tirupathi, India
P. V. Ramesh
Associate Professor, Dept of Master of Computer Science, RIIMS College, Tirupathi, India

Encryption, authentication, cloud computing, outsourcing computation, revocation authority

  1. A Shamir, “Identity-based cryptosystems and signature schemes,” Proc. Crypto’84, LNCS, vol. 196, pp. 47-53, 1984.
  2. D Boneh and M. Franklin, “Identity-based encryption from the Weil pairing,” Proc. Crypto’01, LNCS, vol. 2139, pp. 213-229, 2001.
  3. R Housley, W. Polk, W. Ford, and D. Solo, “Internet X.509 public key infrastructure certificate and certificate revocation list (CRL) profile,” IETF, RFC 3280, 2002.
  4. W. Aiello, S. Lodha, and R. Ostrovsky, “Fast digital identity revocation,” Proc. Crypto’98, LNCS, vol. 1462, pp. 137-152, 1998.
  5. M Naor and K. Nissim, “Certificate revocation and certificate update,” IEEE Journal on Selected Areas in Communications, vol. 18 , no. 4, pp. 561 - 570, 2000.
  6. S. Micali, “Novomodo: Scalable certificate validation and simplified PKI management,” Proc. 1st Annual PKI Research Workshop, pp. 15-25, 2002.
  7. F. F. Elwailly, C. Gentry, and Z. Ramzan, “QuasiModo: Efficient certificate validation and revocation,” Proc. PKC’04, LNCS, vol. 2947, pp. 375-388, 2004.
  8. V. Goyal, “Certificate revocation using fine grained certificate space partitioning,” Proc. Financial Cryptography, LNCS, vol. 4886, pp. 247-259, 2007.
  9. D. Boneh, X. Ding, G. Tsudik, and C.-M. Wong, “A Method for fast revocation of public key certificates and security capabilities,” Proc. 10th USENIX Security Symp., pp. 297-310. 2001.
  10. X. Ding and G. Tsudik, “Simple identity-based cryptography with mediated RSA,” Proc. CT-RSA’03, LNCS, vol. 2612, pp. 193-210, 2003.
  11. B. Libert and J. J. Quisquater, “Efficient revocation and threshold pairing based cryptosystems,” Proc. PODC2003, pp. 163-171, 2003.
  12. J. Baek and Y. Zheng, “Identity-based threshold decryption,” Proc. PKC’04, LNCS, vol. 2947, pp. 262-276, 2004.
  13. H.-S. Ju, D.-Y. Kim, D.-H. Lee, H. Park, and K. Chun, “Modified ID-based threshold decryption and its application to mediated IDbased encryption,” Proc. APWeb2006, LNCS, vol. 3841, pp. 720-725, 2006.
  14. A. Boldyreva, V. Goyal, and V. Kumar, “Identity-based encryption with efficient revocation,” Proc. CCS’08, pp. 417-426, 2008.
  15. A. Sahai and B. Waters, “Fuzzy identity-based encryption,” Proc. Eurocrypt’05, LNCS, vol. 3494, pp. 557-557, 2005.

Publication Details

Published in : Volume 4 | Issue 2 | March-April 2018
Date of Publication : 2018-03-31
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 509-512
Manuscript Number : CSEIT184189
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

N. Raghupathi, P. V. Ramesh, "Identity-Based Encoding with Cloud Abrogation", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 4, Issue 2, pp.509-512, March-April-2018.
Journal URL : http://ijsrcseit.com/CSEIT184189

Follow Us

Contact Us