Identity-Based Encoding with Cloud Abrogation

Authors

  • N. Raghupathi  Student, Dept of Master of Computer Science, RIIMS College, Tirupathi, India
  • P. V. Ramesh  Associate Professor, Dept of Master of Computer Science, RIIMS College, Tirupathi, India

Keywords:

Encryption, authentication, cloud computing, outsourcing computation, revocation authority

Abstract

Identity-based encoding (IBE) may be a public key cryptosystem and eliminates the stress of public key infrastructure (PKI) and certificate administration in typical public key settings. As a result of the absence of PKI, the revocation drawback may be a essential issue in IBE settings. Many voidable IBE schemes are planned concerning this issue. Quite recently, by embedding associate outsourcing computation technique into IBE, Li et al. planned avoidable IBE theme with a key-update cloud service supplier (KU-CSP). However, their theme has 2 shortcomings. One is that the computation and communication prices area unit over previous revocable IBE schemes. The opposite defect is lack of quantifiability within the sense that the KU-CSP should keep a secret worth for every user. Within the article, we tend to propose a replacement voidable IBE theme with a cloud revocation authority (CRA) to unravel the 2 shortcomings, namely, the performance is considerably improved and also the CRA holds solely a system secret for all the users. For security analysis, we demonstrate that the planned theme is semantically secure below the decisional linear Diffie-Hellman (DBDH) assumption. Finally, we extend the planned voidable IBE theme to gift a CRA-aided authentication theme with period-limited privileges for managing an outsized variety of assorted cloud services.

References

  1. A Shamir, “Identity-based cryptosystems and signature schemes,” Proc. Crypto’84, LNCS, vol. 196, pp. 47-53, 1984.
  2. D Boneh and M. Franklin, “Identity-based encryption from the Weil pairing,” Proc. Crypto’01, LNCS, vol. 2139, pp. 213-229, 2001.
  3. R Housley, W. Polk, W. Ford, and D. Solo, “Internet X.509 public key infrastructure certificate and certificate revocation list (CRL) profile,” IETF, RFC 3280, 2002.
  4. W. Aiello, S. Lodha, and R. Ostrovsky, “Fast digital identity revocation,” Proc. Crypto’98, LNCS, vol. 1462, pp. 137-152, 1998.
  5. M Naor and K. Nissim, “Certificate revocation and certificate update,” IEEE Journal on Selected Areas in Communications, vol. 18 , no. 4, pp. 561 - 570, 2000.
  6. S. Micali, “Novomodo: Scalable certificate validation and simplified PKI management,” Proc. 1st Annual PKI Research Workshop, pp. 15-25, 2002.
  7. F. F. Elwailly, C. Gentry, and Z. Ramzan, “QuasiModo: Efficient certificate validation and revocation,” Proc. PKC’04, LNCS, vol. 2947, pp. 375-388, 2004.
  8. V. Goyal, “Certificate revocation using fine grained certificate space partitioning,” Proc. Financial Cryptography, LNCS, vol. 4886, pp. 247-259, 2007.
  9. D. Boneh, X. Ding, G. Tsudik, and C.-M. Wong, “A Method for fast revocation of public key certificates and security capabilities,” Proc. 10th USENIX Security Symp., pp. 297-310. 2001.
  10. X. Ding and G. Tsudik, “Simple identity-based cryptography with mediated RSA,” Proc. CT-RSA’03, LNCS, vol. 2612, pp. 193-210, 2003.
  11. B. Libert and J. J. Quisquater, “Efficient revocation and threshold pairing based cryptosystems,” Proc. PODC2003, pp. 163-171, 2003.
  12. J. Baek and Y. Zheng, “Identity-based threshold decryption,” Proc. PKC’04, LNCS, vol. 2947, pp. 262-276, 2004.
  13. H.-S. Ju, D.-Y. Kim, D.-H. Lee, H. Park, and K. Chun, “Modified ID-based threshold decryption and its application to mediated IDbased encryption,” Proc. APWeb2006, LNCS, vol. 3841, pp. 720-725, 2006.
  14. A. Boldyreva, V. Goyal, and V. Kumar, “Identity-based encryption with efficient revocation,” Proc. CCS’08, pp. 417-426, 2008.
  15. A. Sahai and B. Waters, “Fuzzy identity-based encryption,” Proc. Eurocrypt’05, LNCS, vol. 3494, pp. 557-557, 2005.

Downloads

Published

2018-03-31

Issue

Section

Research Articles

How to Cite

[1]
N. Raghupathi, P. V. Ramesh, " Identity-Based Encoding with Cloud Abrogation, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 4, Issue 2, pp.509-512, March-April-2018.