An Efficient Identity Based Encryption in Cloud Computing with Outsourced Revocation

Authors

  • Dr. U. Vijay Sankar  Associate Professor, Department of C.S.E, Nehru College of Engineering and Research Centre, Kerala, India
  • M. Pavithra  Assistant Professor, Department of C.S.E, Jansons Institute of Technology, Coimbatore, India
  • R Suganya  Assistant Professor, Department of Artificial Intelligence & Data Science, Jansons Institute of Technology, Coimbatore, India

DOI:

https://doi.org/10.32628/CSEIT20668

Keywords:

Identity-based encryption, Revocation, Outsourcing, Cloud computing. Public key encryption.

Abstract

Identity-Based Encryption (IBE) which simplifies the public key and certificate management at Public Key Infrastructure (PKI) is an important alternative to public key encryption. However, one of the main efficiency drawbacks of IBE is the overhead computation at Private Key Generator (PKG) during user revocation. Efficient revocation has been well studied in traditional PKI setting, but the cumbersome management of certificates is precisely the burden that IBE strives to alleviate [2]. It aiming at tackling the critical issue of identity revocation, we introduce outsourcing computation into IBE for the first time and propose a revocable IBE scheme in the server-aided setting. Our scheme offloads most of the key generation related operations during key-issuing and key-update processes to a Key Update Cloud Service Provider, leaving only a constant number of simple operations for PKG and users to perform locally [3]. This goal is achieved by utilizing a novel collusion-resistant technique: we employ a hybrid private key for each user, in which an AND gate is involved to connect and bound the identity component and the time component [4]. Furthermore, we propose another construction which is provable secure under the recently formulized Refereed Delegation of Computation model. Finally, we provide extensive experimental results to demonstrate the efficiency of our proposed construction. In public key encryption every user must have a pair of keys, public key and private key, for encrypting and decrypting messages. An Identity-based encryption (IBE) eliminates the need for a Public Key Infrastructure (PKI). IBE uses the human intelligible identities (e.g., unique name, email address, IP address, etc) as public keys [5]. The sender using IBE encrypts message with the receivers’ identity rather than looking for receivers’ public key and corresponding certificate. Accordingly, receiver decrypts ciphertext using private key associated with the corresponding identity [6]. The private keys of users are obtained from a trusted third party called as Private Key Generator (PKG). The motivation of this paper is to study and review an efficient and secure Identity based encryption scheme with outsourced revocation for cloud computing [7].

References

  1. W. Aiello, S. Lodha, and R. Ostrovsky, “Fast digital identity revocation,” in Advances in Cryptology (CRYPTO‟8). New York, NY, USA: Springer, pp. 137–152, 2008.
  2. V. Goyal, “Certificate revocation using fine grained certificate space partitioning,” in Financial Cryptography and Data Security, S. Dietrich and R. Dhamija, Eds. Berlin, Germany: Springer, vol. 4886, pp. 247–259, 2007.
  3. F. Elwailly, C. Gentry, and Z. Ramzan, “Quasimodo: Efficient certificate validation and revocation,” in Public Key Cryptography (PKC‟04), F. Bao, R. Deng, and J. Zhou, Eds. Berlin, Germany: Springer, vol. 2947, pp. 375–388, 2004.
  4. D. Boneh and M. Franklin, “Identity-based encryption from the Weil pairing,” in Advances in Cryptology (CRYPTO „01), J. Kilian, Ed. Berlin, Germany: Springer, vol. 2139, pp. 213– 229,2001.
  5. A. Boldyreva, V. Goyal, and V. Kumar, “Identity-based encryption with efficient revocation,” in Proc. 15thACMConf. Comput.Commun.Security (CCS‟08), pp. 417 426,2008.
  6. A. Sahai and B. Waters, “Fuzzy identity-based encryption,” in Advances in Cryptology (EUROCRYPT‟05), R. Cramer, Ed. Berlin, Germany: Springer, vol. 3494, pp. 557–557, 2005.
  7. R. Canetti, B. Riva, and G. N. Rothblum, “Two 1-round protocols for delegation of computation,” Cryptology ePrint Archive, Rep. 2011/ 518, 2011 online]. Available: http://eprint.iacr.org/2011/51
  8. D. Chaum and T. P. Pedersen, “Wallet databases with observers,” in Proc. 12th Annu. Int. Cryptology Conf. Adv. Cryptology (CRYPTO‟92), pp. 89–105, 2013.
  9. M. J. Atallah and J. Li, “Secure outsourcing of sequence comparisons,” Int. J. Inf. Security, vol. 4, pp. 277–287, 2005.
  10. M. J. Atallah and K. B. Frikken, “Securely outsourcing linear algebra computations,” in Proc. 5th ACM Symp. Inf. Comput. Commun. Security (ASIACCS‟10), pp. 48–59, 2010.

Downloads

Published

2020-12-30

Issue

Section

Research Articles

How to Cite

[1]
Dr. U. Vijay Sankar, M. Pavithra, R Suganya, " An Efficient Identity Based Encryption in Cloud Computing with Outsourced Revocation" International Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 6, Issue 6, pp.72-82, November-December-2020. Available at doi : https://doi.org/10.32628/CSEIT20668