Secure Operations of Cloud Email System by Using Contingent ID-Based Transmission Proxy Double-Encryption Technique
Keywords:
Proxy Double-Encryption, Cloud Storage, Identity-Based Encryption, Broad Cast Encryption, Secure Cloud EmailAbstract
Firstly, various expanded Proxy Re-Encryptions (PRE), e.g. Contingent (CPRE), ID-based PRE (IPRE) and communicate PRE (BPRE), have been proposed for adaptable applications. By joining CPRE, IPRE and BPRE, this paper proposes an adaptable primitive alluded to as contingent ID-based communicate double encryption and formalizes its semantic security. New proposed system enables a sender to scramble a message to numerous recipients by indicating these receiver’s personalities, and the sender can assign a re-encryption key to an intermediary/proxy with the goal that he can change over the underlying Cipher-Text into another one to another set of planned collectors. In addition, the re-encryption key can be related with a condition to such an extent that only the coordinating Cipher-Texts can be re-scrambled, which enables the first sender to authorize get to control over his remote Cipher-Texts in a fine-grained way. We propose an effective system conspire with provable security. In the instantiated plot, the underlying Cipher-Text, the re-encoded Cipher-Text and the re-encryption enter are all in consistent size, and the parameters to produce a re-encryption key are autonomous of the first recipients of any underlying Cipher-Text. At last, we demonstrate a utilization of our proxy double encryption to secure cloud email framework profitable over existing secure email frameworks in view of Pretty Good Privacy convention or personality based encryption.
References
- J. Shao, G.Wei,Y.Ling, and M.Xie, "Identity-based conditional proxyre-encryption,"inProc.IEEEInt.Conf.Commun.,2011,pp.1–5.
- MAN HO AU, JOSEPH K. LIU, WILLY SUSILO, DUNCAN S. WONG, GUOMIN YANG, TRAN VIET XUAN PHUONG, QI XIE, "A DFA- BASED
- K.Liang,Z.Liu, X.Tan, D.S.Wong, and C.Tang, "ACCA-secure identity- based Conditional proxy re-encryption without random oracles," inProc.15thInt.Conf.Inf. SecurityCryptol.,2012, pp.231–146.
- Cecile Delerablée "Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys"
- D. BONEH AND X. BOYEN "SECURE IDENTITY BASED ENCRYPTION WITHOUT RANDOM ORACLES"
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT

This work is licensed under a Creative Commons Attribution 4.0 International License.