Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

Flexibility of the Natural Source of Attribute Based Encryption Based on the Network

Author : C.Selvalakshmi 1 M.Karthikeyan 2

Date of Publication :29th March 2018

Abstract: Attribute based encryption (ABE) is a famous cryptographic generation to protect the security of users’ data. However, the decryption cost and cipher text size restriction the utility of ABE in exercise. For most present ABE schemes, the decryption price and cipher text size develop linearly with the complexity of access structure. This is unwanted to the gadgets with restrained computing functionality and garage area. Outsourced decryption is taken into consideration as a possible method to lessen the consumer's decryption overhead, which allows a person to outsource a big variety of decryption operations to the cloud provider issuer (CSP). However, outsourced decryption cannot guarantee the correctness of transformation finished by means of the cloud, so it's far vital to test the correctness of outsourced decryption to make certain safety for users’ facts. Current research mainly specializes in verifiability of outsourced decryption for the legal users. It nonetheless stays a hard difficulty that a way to guarantee the correctness of outsourced decryption for unauthorized users. In this paper, we recommend an ABE scheme with verifiable outsourced decryption (called full verifiability for outsourced decryption), that could simultaneously test the correctness for transformed cipher text for the authorized customers and unauthorized customers. The proposed ABE scheme with verifiable outsourced decryption is proved to be selective CPA at ease within the standard version

Reference :

    1.  A. Sahai, B. Waters, “Fuzzy identity based encryption,” Proc. EU-ROCRYPT 2005, LNCS 3494, Springer, pp. 457–473, 2005.
    2. V. Goyal, O. Pandey, A. Sahai and B. Waters, “Attribute-based encryption for fine-grained access control of encrypted data,” Proc. 13th ACM conference on Computer and Communications Security, pp. 89-98, 2006.
    3.  J. Bethencourt, A. Sahai and B. Waters, “Cipher text-policy attribute-based encryption,” Proc. IEEE Symposium on Security and Privacy, pp. 321-334, 2007.
    4. B. Waters, “Cipher text-policy attribute-based encryption: an expressive, efficient, and provably secure realization,” in Public Key Cryptog-raphy (PKC '11), pp. 53-70, 2011.
    5. L. Cheung and C. Newport, “Provably secure cipher text policy ABE,” Proc. 14th ACM conference on Computer and Communications Security, pp. 456-465, 2007.
    6. L. Inraimi, Q. Tang, P. Hartel and W. Jonker, “Efficient and provable secure cipher text-policy attribute-based encryption schemes,” Proc. ISPEC 2009, LNCS 5451, Springer, pp. 1-12, 2009.
    7. S. Yu, K. Ren and W. Lou, “Attribute-based content distribution with hidden policy,” Proc. IEEE 4th Workshop on Secure Network Protocols, pp. 39-44, 2008.
    8. F. K, A.M J and J. Li, “Attribute-based access control with hidden policies and hidden credentials,” IEEE Trans. Computers, vol. 55, no. 10 pp. 1259-1270, 2006, doi:10.1109/TC.2006.158. 

Recent Article