IMPLEMENTING CLOUD REVOCATION AUTHORITY WITH IDENTITY BASED ENCRYPTION AND ITS APPLICATIONS

Authors

  • Andal S. CSE,Ghousia College of Engineering,India
  • TaheraTasneem CSE,Ghousia College of Engineering,India
  • MeghanaMary M. CSE,Ghousia College of Engineering,India
  • Ranjitha G. C. CSE,Ghousia College of Engineering,India
  • Deepak N.A. HOD, CSE,Ghousia College of Engineering,India

DOI:

https://doi.org/10.29121/granthaalayah.v5.i4RACSIT.2017.3348

Keywords:

Cloud Revocation Authority, Private Key Generator, MasterTime Key, Time Update Key, Identity Key;Identity Based Encryption, Public Key Infrastructure

Abstract [English]

Identity-based encryption(IBE) is a public key cryptosystem(encoding and decoding) and eliminates the demands of public key infrastructure(PKI) and certificate administration in conventional public key settings. Due to the absence of PKI, the revocation problem is a critical issue in IBE settings. Several revocable IBE schemes have been proposed regarding this issue. Quite recently, by embedding an outsourcing computation technique into IBE, a revocable IBE scheme with a key-update cloud service provider (KU-CSP) was proposed.However, their scheme has two shortcomings. One is that the computation and communication costs are higher than previous revocable IBE schemes. The other shortcoming is lack of scalability in the sense that the KU-CSP must keep a secret value for each user. In the article, we propose a new revocable IBE scheme with a cloud revocation authority (CRA) to solve the two shortcomings namely, the performance is significantly improved and the CRA holds only a system secret for all the users. For security analysis, we demonstrate that the proposed scheme is semantically secure under the decisional bilinear Diffie-Hellman (DBDH) assumption. Finally,we extend the proposed revocable IBE scheme to present a CRA-aided authentication scheme with period-limited privileges for managing a large number of various cloud services.

Downloads

Download data is not yet available.

References

Yuh-Min Tseng, Tung-Tso Tsai, Sen-Shan Huang, and Chung-Peng Huang, “Identity-Based Encryption with Cloud Revocation Authority and Its Applications , IEEE TRANS. CLOUD COMPUTING 2016.

Downloads

Published

2017-04-30

How to Cite

S., A., Tasneem, T., Mary, M., G. C., R., & N.A., D. (2017). IMPLEMENTING CLOUD REVOCATION AUTHORITY WITH IDENTITY BASED ENCRYPTION AND ITS APPLICATIONS. International Journal of Research -GRANTHAALAYAH, 5(4RACSIT), 38–40. https://doi.org/10.29121/granthaalayah.v5.i4RACSIT.2017.3348