Dr H Shaheen Profile Dr H Shaheen

Characteristics-centered cryptography with cloud revocation authority and its applications

  • Authors Details :  
  • Dr. H.shaheen

752 Views Research reports

Identity-based encryption (IBE) is a public key cryptosystem and eliminates the demands of public key infrastructure (PKI) and certificate administration in conventional public key settings. Because of the absence of PKI, the revocation drawback could be a crucial issue in IBE settings. Many rescindable IBE schemes are planned relating to this issue. Quite recently, by embedding associate outsourcing computation technique into IBE, Li et al. planned a rescindable IBE theme with a key-update cloud service supplier (KU-CSP). However, their theme has 2 shortcomings. One is that the computation and communication prices are above previous rescindable IBE schemes. The opposite disadvantage is lack of measurability within the sense that the KU-CSP should keep a secret worth for every user. Within the article, we have a tendency to propose a replacement rescindable IBE theme with a cloud revocation authority (CRA) to resolve the 2 shortcomings, namely, the performance is significantly improved and the CRA holds only a system secret for all the users. For security analysis, we demonstrate that the proposed scheme is semantically secure under the Decisional Bilinear Diffie-Hellman (DBDH) assumption. Finally, we have a tendency to extend the planned rescindable IBE theme to gift a CRA-aided authentication theme with period-limited privileges for managing an outsized range of varied cloud services.

Article Subject Details




Article File

Full Text PDF





More Article by Dr H Shaheen

A pervasive multi-distribution perceptron and hidden markov model for context aware systems

Fueled by the recent advancements in pervasive environment, affluent context aware systems is among the rousing in computing today, including embedded environment, different wirele...

An improved scheme for organizing ecommercebased websites using semantic web mining

In the running of the internet world, ecommerce industry has its own benchmark in terms of its rapid growth and has made itself an established sector that is indispensable for ever...

Secured data transmission in vanet using vehicular digital hash gen model

Vehicular adhoc structures (vanets) handle the public key infrastructure (pki) and certificate revocation lists (crls) for their security. in any pki structure, the check of a got ...

Open iot service platform technology with semantic web

This paper centers around how innovations adds to enhancing interoperability between iot gadgets, and making effectively utilization of iot gadgets. the proposed stage innovation g...