Submit Search
Upload
A Survey on Identity Based Encryption in Cloud Computing
•
0 likes
•
47 views
IRJET Journal
Follow
https://irjet.net/archives/V4/i2/IRJET-V4I295.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 5
Download now
Download to read offline
Recommended
iaetsd Robots in oil and gas refineries
iaetsd Robots in oil and gas refineries
Iaetsd Iaetsd
Efficient and Enhanced Proxy Re Encryption Algorithm for Skyline Queries
Efficient and Enhanced Proxy Re Encryption Algorithm for Skyline Queries
ijtsrd
IRJET- A Probabilistic Model of Visual Cryptography Scheme for Anti-Phis...
IRJET- A Probabilistic Model of Visual Cryptography Scheme for Anti-Phis...
IRJET Journal
Identity based encryption with outsourced revocation in cloud computing
Identity based encryption with outsourced revocation in cloud computing
Shakas Technologies
Review on Implementation Visual Cryptography & Steganography for Secure Authe...
Review on Implementation Visual Cryptography & Steganography for Secure Authe...
IRJET Journal
A Noval Method for Data Auditing and Integrity Checking in Public Cloud
A Noval Method for Data Auditing and Integrity Checking in Public Cloud
rahulmonikasharma
IRJET- Anchoring of Cloud Information under Key Presentation
IRJET- Anchoring of Cloud Information under Key Presentation
IRJET Journal
IDENTITY-BASED ENCRYPTION WITH OUTSOURCED REVOCATION IN CLOUD COMPUTING
IDENTITY-BASED ENCRYPTION WITH OUTSOURCED REVOCATION IN CLOUD COMPUTING
Nexgen Technology
Recommended
iaetsd Robots in oil and gas refineries
iaetsd Robots in oil and gas refineries
Iaetsd Iaetsd
Efficient and Enhanced Proxy Re Encryption Algorithm for Skyline Queries
Efficient and Enhanced Proxy Re Encryption Algorithm for Skyline Queries
ijtsrd
IRJET- A Probabilistic Model of Visual Cryptography Scheme for Anti-Phis...
IRJET- A Probabilistic Model of Visual Cryptography Scheme for Anti-Phis...
IRJET Journal
Identity based encryption with outsourced revocation in cloud computing
Identity based encryption with outsourced revocation in cloud computing
Shakas Technologies
Review on Implementation Visual Cryptography & Steganography for Secure Authe...
Review on Implementation Visual Cryptography & Steganography for Secure Authe...
IRJET Journal
A Noval Method for Data Auditing and Integrity Checking in Public Cloud
A Noval Method for Data Auditing and Integrity Checking in Public Cloud
rahulmonikasharma
IRJET- Anchoring of Cloud Information under Key Presentation
IRJET- Anchoring of Cloud Information under Key Presentation
IRJET Journal
IDENTITY-BASED ENCRYPTION WITH OUTSOURCED REVOCATION IN CLOUD COMPUTING
IDENTITY-BASED ENCRYPTION WITH OUTSOURCED REVOCATION IN CLOUD COMPUTING
Nexgen Technology
An Overview of Identity Based Encryption
An Overview of Identity Based Encryption
Vertoda System
Identity based encryption with outsourced revocation in cloud computing
Identity based encryption with outsourced revocation in cloud computing
Pvrtechnologies Nellore
Mediated certificateless cryptosystem for the security of data in public cloud
Mediated certificateless cryptosystem for the security of data in public cloud
eSAT Journals
Identity based encryption with outsourced revocation in cloud computing
Identity based encryption with outsourced revocation in cloud computing
CloudTechnologies
Privacy Preserving Location Query Service
Privacy Preserving Location Query Service
IRJET Journal
Password-Authenticated Key Exchange Scheme Using Chaotic Maps towards a New A...
Password-Authenticated Key Exchange Scheme Using Chaotic Maps towards a New A...
dbpublications
Identity-Based Encryption with Outsourced Revocation in Cloud Computing
Identity-Based Encryption with Outsourced Revocation in Cloud Computing
1crore projects
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
Nexgen Technology
IRJET- Implementation of DNA Cryptography in Cloud Computing and using Socket...
IRJET- Implementation of DNA Cryptography in Cloud Computing and using Socket...
IRJET Journal
Distributed private key generator in ibc
Distributed private key generator in ibc
Lokesh Gopu
Implementation of public key cryptography in kerberos with prevention 2
Implementation of public key cryptography in kerberos with prevention 2
IAEME Publication
IRJET- Authentic and Anonymous Data Sharing with Enhanced Key Security
IRJET- Authentic and Anonymous Data Sharing with Enhanced Key Security
IRJET Journal
IRJET- A Novel and Secure Approach to Control and Access Data in Cloud St...
IRJET- A Novel and Secure Approach to Control and Access Data in Cloud St...
IRJET Journal
Identity based encryption with cloud revocation authority and its applications
Identity based encryption with cloud revocation authority and its applications
Shakas Technologies
50120130406006
50120130406006
IAEME Publication
Privacy preserving secure data exchange in mobile p2 p
Privacy preserving secure data exchange in mobile p2 p
www.pixelsolutionbd.com
F018133640.key aggregate paper
F018133640.key aggregate paper
IOSR Journals
IRJET- A Survey on Quantum Key Distribution and Huffman Coding Compression Al...
IRJET- A Survey on Quantum Key Distribution and Huffman Coding Compression Al...
IRJET Journal
A Survey on Secure Data Sharing with Forward Security in Cloud Computing
A Survey on Secure Data Sharing with Forward Security in Cloud Computing
IRJET Journal
IRJET- Integrity Verification and Attribute based Encryption for Cloud Storage
IRJET- Integrity Verification and Attribute based Encryption for Cloud Storage
IRJET Journal
IRJET- Secure Data Sharing in Cloud Computing using Revocable Storage Identit...
IRJET- Secure Data Sharing in Cloud Computing using Revocable Storage Identit...
IRJET Journal
Identity based Encryption Utilizing Revocable Capacity of Distributed Computi...
Identity based Encryption Utilizing Revocable Capacity of Distributed Computi...
ijtsrd
More Related Content
What's hot
An Overview of Identity Based Encryption
An Overview of Identity Based Encryption
Vertoda System
Identity based encryption with outsourced revocation in cloud computing
Identity based encryption with outsourced revocation in cloud computing
Pvrtechnologies Nellore
Mediated certificateless cryptosystem for the security of data in public cloud
Mediated certificateless cryptosystem for the security of data in public cloud
eSAT Journals
Identity based encryption with outsourced revocation in cloud computing
Identity based encryption with outsourced revocation in cloud computing
CloudTechnologies
Privacy Preserving Location Query Service
Privacy Preserving Location Query Service
IRJET Journal
Password-Authenticated Key Exchange Scheme Using Chaotic Maps towards a New A...
Password-Authenticated Key Exchange Scheme Using Chaotic Maps towards a New A...
dbpublications
Identity-Based Encryption with Outsourced Revocation in Cloud Computing
Identity-Based Encryption with Outsourced Revocation in Cloud Computing
1crore projects
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
Nexgen Technology
IRJET- Implementation of DNA Cryptography in Cloud Computing and using Socket...
IRJET- Implementation of DNA Cryptography in Cloud Computing and using Socket...
IRJET Journal
Distributed private key generator in ibc
Distributed private key generator in ibc
Lokesh Gopu
Implementation of public key cryptography in kerberos with prevention 2
Implementation of public key cryptography in kerberos with prevention 2
IAEME Publication
IRJET- Authentic and Anonymous Data Sharing with Enhanced Key Security
IRJET- Authentic and Anonymous Data Sharing with Enhanced Key Security
IRJET Journal
IRJET- A Novel and Secure Approach to Control and Access Data in Cloud St...
IRJET- A Novel and Secure Approach to Control and Access Data in Cloud St...
IRJET Journal
Identity based encryption with cloud revocation authority and its applications
Identity based encryption with cloud revocation authority and its applications
Shakas Technologies
50120130406006
50120130406006
IAEME Publication
Privacy preserving secure data exchange in mobile p2 p
Privacy preserving secure data exchange in mobile p2 p
www.pixelsolutionbd.com
F018133640.key aggregate paper
F018133640.key aggregate paper
IOSR Journals
IRJET- A Survey on Quantum Key Distribution and Huffman Coding Compression Al...
IRJET- A Survey on Quantum Key Distribution and Huffman Coding Compression Al...
IRJET Journal
What's hot
(18)
An Overview of Identity Based Encryption
An Overview of Identity Based Encryption
Identity based encryption with outsourced revocation in cloud computing
Identity based encryption with outsourced revocation in cloud computing
Mediated certificateless cryptosystem for the security of data in public cloud
Mediated certificateless cryptosystem for the security of data in public cloud
Identity based encryption with outsourced revocation in cloud computing
Identity based encryption with outsourced revocation in cloud computing
Privacy Preserving Location Query Service
Privacy Preserving Location Query Service
Password-Authenticated Key Exchange Scheme Using Chaotic Maps towards a New A...
Password-Authenticated Key Exchange Scheme Using Chaotic Maps towards a New A...
Identity-Based Encryption with Outsourced Revocation in Cloud Computing
Identity-Based Encryption with Outsourced Revocation in Cloud Computing
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
IRJET- Implementation of DNA Cryptography in Cloud Computing and using Socket...
IRJET- Implementation of DNA Cryptography in Cloud Computing and using Socket...
Distributed private key generator in ibc
Distributed private key generator in ibc
Implementation of public key cryptography in kerberos with prevention 2
Implementation of public key cryptography in kerberos with prevention 2
IRJET- Authentic and Anonymous Data Sharing with Enhanced Key Security
IRJET- Authentic and Anonymous Data Sharing with Enhanced Key Security
IRJET- A Novel and Secure Approach to Control and Access Data in Cloud St...
IRJET- A Novel and Secure Approach to Control and Access Data in Cloud St...
Identity based encryption with cloud revocation authority and its applications
Identity based encryption with cloud revocation authority and its applications
50120130406006
50120130406006
Privacy preserving secure data exchange in mobile p2 p
Privacy preserving secure data exchange in mobile p2 p
F018133640.key aggregate paper
F018133640.key aggregate paper
IRJET- A Survey on Quantum Key Distribution and Huffman Coding Compression Al...
IRJET- A Survey on Quantum Key Distribution and Huffman Coding Compression Al...
Similar to A Survey on Identity Based Encryption in Cloud Computing
A Survey on Secure Data Sharing with Forward Security in Cloud Computing
A Survey on Secure Data Sharing with Forward Security in Cloud Computing
IRJET Journal
IRJET- Integrity Verification and Attribute based Encryption for Cloud Storage
IRJET- Integrity Verification and Attribute based Encryption for Cloud Storage
IRJET Journal
IRJET- Secure Data Sharing in Cloud Computing using Revocable Storage Identit...
IRJET- Secure Data Sharing in Cloud Computing using Revocable Storage Identit...
IRJET Journal
Identity based Encryption Utilizing Revocable Capacity of Distributed Computi...
Identity based Encryption Utilizing Revocable Capacity of Distributed Computi...
ijtsrd
IRJET- Cipher Text Policy Attribute based Encryption by Deduplication for Tim...
IRJET- Cipher Text Policy Attribute based Encryption by Deduplication for Tim...
IRJET Journal
Identifying the Performance Efficiency Of Attribute Based Encryption With Sec...
Identifying the Performance Efficiency Of Attribute Based Encryption With Sec...
IJSRD
Sharing Secured Scalable Data in Cloud Environment Using Key Aggregate Crypto...
Sharing Secured Scalable Data in Cloud Environment Using Key Aggregate Crypto...
IRJET Journal
IRJET- An Data Sharing in Group Member with High Security using Symmetric Bal...
IRJET- An Data Sharing in Group Member with High Security using Symmetric Bal...
IRJET Journal
IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha...
IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha...
IRJET Journal
A New Pairing Free ID Based Certificate Less Digital Signature (CL-DS) Scheme...
A New Pairing Free ID Based Certificate Less Digital Signature (CL-DS) Scheme...
IJCSIS Research Publications
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
IRJET Journal
Protection Saving Positioned Multi-Keyword Scan for Different Information in ...
Protection Saving Positioned Multi-Keyword Scan for Different Information in ...
IRJET Journal
IRJET- Secure Data Access Control with Cipher Text and It’s Outsourcing in Fo...
IRJET- Secure Data Access Control with Cipher Text and It’s Outsourcing in Fo...
IRJET Journal
IRJET- Secure Database Management and Privacy Preserving in Cloud Server
IRJET- Secure Database Management and Privacy Preserving in Cloud Server
IRJET Journal
EXPLORING WOMEN SECURITY BY DEDUPLICATION OF DATA
EXPLORING WOMEN SECURITY BY DEDUPLICATION OF DATA
IRJET Journal
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...
IRJET Journal
IRJET - Reliable and Efficient Revocation and Data Sharing using Identity...
IRJET - Reliable and Efficient Revocation and Data Sharing using Identity...
IRJET Journal
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
IRJET Journal
IRJET- Exchanging Secure Data in Cloud with Confidentiality and Privacy Goals
IRJET- Exchanging Secure Data in Cloud with Confidentiality and Privacy Goals
IRJET Journal
IRJET- A Novel Approach for Appreciable Group Data Allocation System with...
IRJET- A Novel Approach for Appreciable Group Data Allocation System with...
IRJET Journal
Similar to A Survey on Identity Based Encryption in Cloud Computing
(20)
A Survey on Secure Data Sharing with Forward Security in Cloud Computing
A Survey on Secure Data Sharing with Forward Security in Cloud Computing
IRJET- Integrity Verification and Attribute based Encryption for Cloud Storage
IRJET- Integrity Verification and Attribute based Encryption for Cloud Storage
IRJET- Secure Data Sharing in Cloud Computing using Revocable Storage Identit...
IRJET- Secure Data Sharing in Cloud Computing using Revocable Storage Identit...
Identity based Encryption Utilizing Revocable Capacity of Distributed Computi...
Identity based Encryption Utilizing Revocable Capacity of Distributed Computi...
IRJET- Cipher Text Policy Attribute based Encryption by Deduplication for Tim...
IRJET- Cipher Text Policy Attribute based Encryption by Deduplication for Tim...
Identifying the Performance Efficiency Of Attribute Based Encryption With Sec...
Identifying the Performance Efficiency Of Attribute Based Encryption With Sec...
Sharing Secured Scalable Data in Cloud Environment Using Key Aggregate Crypto...
Sharing Secured Scalable Data in Cloud Environment Using Key Aggregate Crypto...
IRJET- An Data Sharing in Group Member with High Security using Symmetric Bal...
IRJET- An Data Sharing in Group Member with High Security using Symmetric Bal...
IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha...
IRJET- An Approach for Implemented Secure Proxy Server for Multi-User Searcha...
A New Pairing Free ID Based Certificate Less Digital Signature (CL-DS) Scheme...
A New Pairing Free ID Based Certificate Less Digital Signature (CL-DS) Scheme...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
Protection Saving Positioned Multi-Keyword Scan for Different Information in ...
Protection Saving Positioned Multi-Keyword Scan for Different Information in ...
IRJET- Secure Data Access Control with Cipher Text and It’s Outsourcing in Fo...
IRJET- Secure Data Access Control with Cipher Text and It’s Outsourcing in Fo...
IRJET- Secure Database Management and Privacy Preserving in Cloud Server
IRJET- Secure Database Management and Privacy Preserving in Cloud Server
EXPLORING WOMEN SECURITY BY DEDUPLICATION OF DATA
EXPLORING WOMEN SECURITY BY DEDUPLICATION OF DATA
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...
IRJET - Reliable and Efficient Revocation and Data Sharing using Identity...
IRJET - Reliable and Efficient Revocation and Data Sharing using Identity...
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
IRJET- Exchanging Secure Data in Cloud with Confidentiality and Privacy Goals
IRJET- Exchanging Secure Data in Cloud with Confidentiality and Privacy Goals
IRJET- A Novel Approach for Appreciable Group Data Allocation System with...
IRJET- A Novel Approach for Appreciable Group Data Allocation System with...
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
me23b1001
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
britheesh05
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
null - The Open Security Community
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
959SahilShah
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
GDSCAESB
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
vipinkmenon1
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
9953056974 Low Rate Call Girls In Saket, Delhi NCR
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
NikhilNagaraju
Internship report on mechanical engineering
Internship report on mechanical engineering
malavadedarshan25
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
rehmti665
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
Asst.prof M.Gokilavani
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting .
Satyam Kumar
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
João Esperancinha
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
KartikeyaDwivedi3
Past, Present and Future of Generative AI
Past, Present and Future of Generative AI
abhishek36461
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
RajaP95
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
misbanausheenparvam
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
Tsuyoshi Horigome
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
Asst.prof M.Gokilavani
Recently uploaded
(20)
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
Internship report on mechanical engineering
Internship report on mechanical engineering
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting .
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
Past, Present and Future of Generative AI
Past, Present and Future of Generative AI
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
A Survey on Identity Based Encryption in Cloud Computing
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 505 A Survey on Identity Based Encryption in Cloud Computing Sagar Nipane#, Vishal Bhiogade#, Eshan Wanve#, Prof. Omkar Dudhbure* #Student, Dept. of Computer Science & Engineering Manoharbhai Patel Institute of Engineering & Technology Shahapur, Bhandara, India *Assistant Professor, Dept. of Computer Science & Engineering Manoharbhai Patel Institute of Engineering & Technology Shahapur, Bhandara, India ---------------------------------------------------------------***--------------------------------------------------------------- Abstract— Public key infrastructure (PKI) is a substitute other option to open key encryption whereas the Identity- Based Encryption IBE is open key and confirmation organization. The standard disadvantage of IBE in the midst of revocation is the overhead estimation at private key generator (PKG).In this paper, going for survey on unmistakable methodology for dealing with the basic issue of Identity dissent. We similarly discussed our proposed work which bring outsourcing calculation into IBE inquisitively and propose a revocable IBE organize in the server-helped setting. Our game plan offloads a limitless piece of the key time frame related operations amidst key- issuing and key-upgrade structures to a Key Update Cloud Service Provider, leaving just a dependable number of basic operations for PKG and clients to perform locally. What's more, we propose another progression which is provable secure under the beginning late formulized Refereed giving over of Computation model. Keywords— Identity-based encryption (IBE), revocation, outsourcing, cloud computing, PKG I. INTRODUCTION Cloud Storage signifies "the limit of data online in the cloud," where the data is secured in and available from different spread and related resources that deal a cloud. In any case, the conveyed stockpiling is not completely trusted. Whether the data set up away on cloud are or not changes into a gigantic stress of the clients. So to secure data and client Identity ; Identity Based Encryption (IBE) is a captivating decision, which is proposed to streamline key association in an approval, in light of Public Key Infrastructure (PKI) by utilizing human sensible Identities (e.g., uncommon name, email address, IP address, and whatnot) as open keys. In this way, sender utilizing IBE does not have to look upward open key and affirmation, however especially scrambles message with recipient's Identities. As necessities be, beneficiary getting the private key related with the taking a gander at Identity from Private Key Generator (PKG) can unscramble such figure content. In, Boneh and Franklin endorsed that clients overhaul their private keys unpredictably and senders utilize the beneficiaries'. Characters connected with current time. In any case, this framework would understand an overhead load at PKG. In another word, every one of the clients paying little respect to whether their keys have been denied or not, need to contact with PKG spasmodically to show their Identities and overhaul new private keys. It requires that PKG is on the web and the shielded channel must be kept up for all exchanges, which will end up being a bottleneck for IBE structure as the measure of clients makes of systems. In this paper, we bring outsourcing computation into IBE repudiation, and formalize the security criticalness of outsourced revocable IBE oddly to the best of our understanding. II. LITERATURE SURVEY The openness of brisk and reliable Digital Identities is a key component for the productive execution of the all- inclusive community key base of the Internet. All mechanized character arranges must consolidate a method for denying someone's propelled character for the circumstance that this character is stolen (or wiped out) before its end date (like the cancelation of a Master cards for the circumstance that they are stolen). In [1], S. Micali proposed a rich procedure for identity foreswearing which requires no correspondence amidst customers and shifts in the structure. In this paper [2], we extend his arrangement by diminishing the general CA to Directory correspondence, while up 'til now keeping up a similar minor customer to vender correspondence. We separate our arrangement to various suggestions too. In this paper the creator exhibited that propose a totally utilitarian identity based encryption arrange (IBE). The arrangement has picked figure content security in the self- assertive prophet demonstrate tolerating a variety of the computational Diffie-Hellman issue. Our system relies on upon bilinear maps between social occasions. The Weil mixing on elliptic curves is an outline of such a guide. We give correct definitions for secure identity based encryption arranges and give a couple of uses for such structures. In this paper [3] the creator concentrated that another sort of Identity-Based Encryption (IBE) arrange for that we call Fuzzy Personality Based Encryption. In Fuzzy IBE we see a lifestyle as set of illustrative qualities. A Fluffy IBE arrange considers a private key for an identity, !, to unscramble a figure content mixed with an identity, !0, if and just if the characters ! What’s more, 0 are close to each other as measured by the "set cover" partition metric. A Fuzzy IBE plan can be associated with engage encryption
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 506 utilizing biometric contributions as identities; the bungle resistance property of a Fuzzy IBE plan is effectively what considers the use of biometric identities, which naturally will have some confusion each time they are reviewed. Besides, we show that Fuzzy-IBE can be used for a kind of utilization that we term "quality based encryption". In this paper the creator Consider a feeble client that desires to delegate figuring to an untrusted server and have the ability to quickly affirm the exactness of the result. We show traditions in two free varieties of this issue. We rst consider a model where the client designates the figuring to at least two servers, and is guaranteed to yield the correct answer for whatever time allotment that even a singular server is clear. In this model, we show a 1-round quantifiably strong tradition for any log-space uniform NC circuit. Strikingly, in the single server setting all known one- round compact assignment traditions are computationally strong. The tradition builds up the arithmetic frameworks of [Goldwasser-Kalai-Rothblum, STOC 08] and [Feige-Kilian, STOC 97]. Next we consider an inferred point of view of the tradition of [Goldwasser-Kalai-Rothblum, STOC 08] in the single-server model with a no concise, however open, one organize. Using this improvement we fabricate two computationally stable traditions for arrangement of figuring of any circuit Cwith significance d and information length n, even a non-uniform one, to such an extent that the client continues running in time n poly(log(jCj); In this paper [5] the creator addresses the issue of using untrusted (potentially noxious) cryptographic accomplices. We give a formal security definition to securely outsourcing figuring from a computationally obliged contraption to an untrusted accomplice. In our model, the not well arranged environment makes the item for the accomplice, however then does not have coordinate correspondence with it once the device starts relying upon it. Despite security, we similarly give a structure to measuring the adequacy additionally; check capacity of an outsourcing utilization. We present two common sense outsource secure arrangements. Specifically, we show to securely outsource measured exponentiation, which displays the computational bottleneck in most open key cryptography on computationally limited contraptions. Without outsourcing, a contraption would require O (n) specific increases to finish specific exponentiation for n-bit sorts. The pile decreases to O(log2 n) for any exponentiation- based arrangement where the bona fide contraption may use two untrusted exponentiation programs; we highlight the Cramer-Shoup cryptosystem and Schnorr stamps as tests. With an easy-going considered security, we achieve a similar weight diminishment for another CCA2-secure encryption arrange using emerge untrusted Cramer-Shoup encryption program. In this paper [6] the creator showed that the Trait based encryption (ABE) is a promising cryptographic mechanical assembly for fine-grained get to control. In any case, the computational incurred significant injury in encryption normally creates with the versatile nature of get to game plan in existing ABE arranges, which transforms into a bottleneck obliging its application. In this paper, we formulize the novel perspective of outsourcing encryption of ABE to cloud organization provider to quiet neighbourhood figuring inconvenience. We propose an improved advancement with Map Reduce cloud which is secure under the doubt that the master center and in expansion at least one of the slave center points is direct. In the wake of outsourcing, the computational incurred significant damage at customer side in the midst of encryption is diminished to vague four exponentiations, which is relentless. Another purpose of inclination of the proposed advancement is that the customer can allot encryption for any plan. In this paper [7] the creator concentrated that the immense scale picture data sets are generally speaking exponentially made today. Close by such data impact is the rapidly creating example to outsource the photo organization structures to the cloud for its rich handling resources and advantages. The most effective method to guarantee the sensitive data while enabling outsourced picture organizations, nevertheless, transforms into a critical concern. To address these troubles, we propose outsourced picture recovery organization (OIRS), a novel outsourced picture recovery organization development demonstrating, which mishandle different territory advances and takes security, proficiency, and blueprint disperse quality into thought from the most punctual beginning stage of the organization. In particular, we arrange OIRS under the compacted identifying framework, which is known for its ease of restricting together the customary analysing and weight for picture securing. Data proprietors simply need to outsource pressed picture tests to cloud for reduced stockpiling overhead. Besides, OIRS, data customers can handle the cloud to securely repeat pictures without revealing information from either the compacted picture tests or the essential picture content. We start with the OIRS get ready for insufficient data, which is the customary application circumstance for stuffed distinguishing, and after that exhibit its basic development to the general data for vital exchange offs amidst productivity and precision. We did separate the security affirmation of OIRS and conduct wide examinations to show the structure practicality. For satisfaction, we also analyse the ordinary execution speedup of OIRS through hardware gathered in system plot. For satisfaction, we furthermore inspect the ordinary execution speedup of OIRS through gear collected in system layout. III. OTHER IDENTITY BASED ENCRYPTION SCHEMES Taking after the Boneh-Franklin conspire, loads of other personality based encryption has been proposed. Some attempt to enhance the level of security; others attempt to adjust extraordinary sorts of open key cryptosystems (e.g. progressive plans, fluffy plans, and so forth.) to the setting
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 507 of personality based encryption. In this segment we give a short review of some critical frameworks that have been created. A. Identity based encryption without random oracles Since the arbitrary prophet model is quite controversial, a critical open issue after the development of the Boneh- Franklin plan was to build up a character based encryption plot which is provably secure in the standard model. As an initial move towards this objective, Canetti et al. [10] make a personality based encryption conspire which is provably secure without arbitrary prophets, in spite of the fact that in a somewhat weaker security show. In this debilitated model, known as specific personality security, an enemy needs to focus on the character he wishes to assault ahead of time. In the standard character based model, the enemy is permitted to adaptively pick his objective personality. The security of the plan relies on upon the hardness of the DBDH issue and the development is very wasteful. As a change, Boneh and Boyen [11] made two productive personality based encryption plans, both provably secure in the specific character demonstrate and furthermore without depending on arbitrary prophet procedure. The primary framework can be reached out to a proficient progressive personality based encryption framework (see next area) and its security depends on the DBDH issue. The second framework is more productive, however its security lessens to the nonstandard DBDHI issue. A later development because of Boneh and Boyen [12] is demonstrated completely secure without irregular prophets. Its security diminishes to the DBDH issue. Be that as it may, the plan is unrealistic and was just given as a hypothetical build to demonstrate that there undoubtedly exists completely secure character based encryption plans without resorting to irregular prophets. At long last, Waters [13] enhances this outcome and develops a change of the plan which is productive and completely secure without irregular prophets. Its security likewise lessens to the DBDH issue. B. Hierarchical identity based encryption The idea of various leveled character based encryption was initially presented by Horwitz and Lynn [14]. In conventional open key infrastructures there is a root testament specialist, and conceivably a progression of other authentication experts. The root expert can issue authentications to experts on a lower level and the lower level endorsement specialists can issue testaments to clients. To diminish workload, a comparable setup could be valuable in the setting of character based encryption. In character based encryption the trusted party is the private key generator. A characteristic approach to extend this to a two-level various leveled based encryption is to have a root private key generator and space private key generators. Clients would then be connected with their own primitive character in addition to the personality of their separate space, both discretionary strings. Clients can get their private key from a space private key generator, which thus acquires its private key from the root private key generator. More levels can be added to the chain of command by including subdomains, sub subdomains, and so forth.. The principal progressive character based encryption conspire with a self-assertive number of levels is given by Gentry and Silverberg [15]. It is an expansion of the Boneh- Franklin plan and its security relies on upon the hardness of the BDH issue. It additionally utilizes arbitrary prophets. Boneh and Boyen figured out how to develop a various leveled based encryption plot without arbitrary prophets in view of the BDH issue, however it is secure in the weaker particular ID show [16]. In the previously mentioned developments, the time required for encryption and decoding develops straightly in the progressive system profundity, in this manner turning out to be less productive at complex chains of command. In [17], Boneh, Boyen and Goh give a various leveled personality based encryption framework in which the unscrambling time is the same at each chain of command profundity. It is particular ID secure without irregular prophets and in view of the BDHE issue. C. Fuzzy identity based encryption In [18], Sahai and Waters give a Fuzzy identity based encryption framework. In Fuzzy identity based encryption, characters are seen as an arrangement of clear qualities, rather than a series of characters. The thought is that private keys can unscramble messages encoded with the general population key ɸ, additionally messages scrambled with people in general key ɸ' if d (ɸ, ɸ') < ℮ for a specific metric d and an adaptation to non-critical failure esteem ℮. One significant use of fluffy character based encryption is the utilization of biometric personalities. Since two estimations of the same biometric (e.g. an iris output) will never be precisely the same, a specific measure of blunder resilience is required when utilizing such estimations as keys. The security of the Sahai-Waters plot diminishes to the changed DBDH issue. D. Identity based encryption schemes without pairings Another Identity based encryption conspires that was distributed around an indistinguishable time from the Boneh-Franklin plot (yet ended up being designed quite a long while prior) is because of Cocks. The security of the framework depends on the quadratic residuosity issue modulo a composite N = p, q where p, q ɛ Z are prime [19]. Lamentably, this framework delivers huge figure writings contrasted with the blending based frameworks and along these lines is not exceptionally effective. As of late, Boneh et. al. built another character based encryption framework that is not in view of pairings [20]. It is identified with the Cocks framework since the security of it is likewise in view of the quadratic residuosity issue. The framework is space effective yet encryptions are moderate.
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 508 IV. PROBLEM STATEMENT With the fast improvement of flexible cloud administrations, it turns out to be progressively helpless to utilize cloud administrations to share information in a companion hover in the distributed computing environment. Since it is not practical to actualize full lifecycle protection security, get to control turns into a testing undertaking, particularly when we share touchy information on cloud servers. Personality Based Encryption (IBE) which disentangles the general population key and declaration administration at Public Key Infrastructure (PKI) is a critical other option to open key encryption. In any case, one of the fundamental productivity disadvantages of IBE is the overhead calculation at Private Key Generator (PKG) amid client disavowal. Productive disavowal has been all around contemplated in conventional PKI setting, yet the bulky administration of testaments is definitely the weight that IBE endeavours to reduce. V. PROPOSED SYSTEM With the snappy change of versatile cloud associations, it winds up being progressively helpless to utilize cloud associations to share information in an amigo float in the circled figuring environment. Since it is not down to earth to acknowledge full lifecycle affirmation security, get the chance to control changes into a testing undertaking, particularly when we share dubious information on cloud servers. Personality Based Encryption (IBE) which unwinds the general open key and articulation association at Public Key Infrastructure (PKI) is an essential other decision to open key encryption. Notwithstanding, one of the essential effectiveness disservices of IBE is the overhead calculation at Private Key Generator (PKG) amidst client foreswearing. Beneficial renouncement has been all around considered in conventional PKI setting, yet the unwieldy association of affirmations is absolutely the weight that IBE endeavors to reduce. FIG 1 SYSTEM ARCHITECTURE VI.CONCLUSIONS In this paper, focusing on the fundamental issue of character revocation, we bring outsourcing count into IBE and propose a revocable arrangement in which the renouncement operations are relegated to CSP. With the guide of KU-CSP, the proposed plan is full-highlighted: 1) It fulfills predictable efficiency for both figuring at PKG and private key size at customer; 2) User needs not to contact with PKG in the midst of key redesign, so to speak, PKG is allowed to be detached from the net in the wake of sending the foreswearing summary to KU-CSP; 3)No secure channel or customer confirmation is required in the midst of key- update amongst customer and KU-CSP. Authorized under Creative Commons Attribution CC BY Moreover, we consider recognizing revocable IBE under a more grounded foe demonstrate. We display an impelled advancement in addition, show to it is secure under RDoC demonstrate, in which in any occasion one of the KU-CSPs is thought to be totally straightforward. In this way, paying little respect to the likelihood that a denied customer and both of the KU- CSPs plot, it can't to offer. REFERENCES [1] W. Aiello, S. Oldham, and R. Ostrovsky, “Fast digital identity revocation, “in Advances in Cryptology (CRYPTO‟98). New York, NY, USA: Springer, 1998, pp. 137–152. [2] D. Boneh and M. Franklin, “Identity-based encryption from the Weil pairing,” in Advances in Cryptology (CRYPTO „01), J. Kilian, Ed.Berlin, Germany: Springer, 2001, vol. 2139, pp. 213–229. [3] A. Sahai and B. Waters, “Fuzzy identity-based encryption,” in Advances in Cryptology (EUROCRYPT‟05), R. Cramer, Ed. Berlin, Germany: Springer, 2005, vol. 3494, pp. 557–557. [4] S. Hohenberger and A. Lysyanskaya, “How to securely outsource cryptographic computations,” in Proc. 2nd Int. Conf. Theory Cryptography (TCC‟05), 2005, pp. 264– 282 [5] J. Li, C. Jia, J. Li, and X. Chen, “Outsourcing encryption of attributebased encryption with mapreduce,” in Information and Communications Security. Berlin, Heidelberg: Springer, 2012, vol. 7618, pp. 191–201. [6] B. Zhang, J. Wang, K. Ren, and C. Wang, “Privacy assured Trans. Emerging Topics Comput., vol. 1, no. 1, p. 166–177, Jul. Dec. 2013 outsourcing of image reconstruction service in cloud,” IEEE. [7] B. Zhang, J. Wang, K. Ren, and C. Wang, “Privacyassured outsourcing of image reconstruction service in cloud,” IEEE Trans. Emerging Topics Comput., vol. 1, no. 1, p. 166–177, Jul./Dec. 2013. [8] A. Shamir, “Identity-based cryptosystems and signature schemes,” in Advances in Cryptology (CRYPTO), G. Blakley and D. Chaum, Eds. Berlin, Germany: Springer, 1985, vol. 196, pp. 47–53. [9] C. Cocks, “An identity based encryption scheme based on quadratic residues,” in Cryptography and Coding, B. Honary, Ed. Berlin/ Heidelberg: Springer, 2001, vol. 2260, pp. 360–363. [10] R. Canetti, S. Halevi, and J. Katz, “A forward-secure public-key encryption scheme,” in Advances in Cryptology (EUROCRYPT‟03),E. Biham, Ed. Berlin, Germany: Springer, 2003, vol. 2656, pp. 646–646. [11] D. Boneh and X. Boyen, “Efficient selective-id secure identity-based encryption without random oracles,” in Advances in Cryptology (EUROCRYPT‟04), C. Cachin and J. Camenisch, Eds. Berlin,Germany: Springer, 2004, vol. 3027, pp. 223–238. [12] D. Boneh and X. Boyen, “Secure identity based encryption without random oracles,” in Advances in Cryptology (CRYPTO‟04),M. Franklin, Ed. Berlin, Germany: Springer, 2004, vol. 3152, pp. 197– 206. [13] B. Waters, “Efficient identity-based encryption without random oracles,” in Advances in Cryptology (EUROCRYPT‟05), R. Cramer, Ed. Berlin, Germany: Springer, 2005, vol. 3494, pp. 114–127.
5.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 509 [14] C. Gentry, “Practical identity-based encryption without random oracles,” in Advances in Cryptology (EUROCRYPT‟06), S. Vaudenay, Ed. Berlin, Germany: Springer, 2006, vol. 4004, pp. 445–464. [15] C. Gentry, C. Peikert, and V. Vaikuntanathan, “Trapdoors for hard lattices and new cryptographic constructions,” in Proc. 40th Annu. ACM Symp. Theory Comput. (STOC‟08), 2008, pp. 197–206. [16] S. Agrawal, D. Boneh, and X. Boyen, “Efficient lattice (h)ibe in the standard model,” in Advances in Cryptology (EUROCRYPT‟10), H. Gilbert, Ed. Berlin, Germany: Springer, 2010, vol. 6110, pp. 553–572. [17] D. Cash, D. Hofheinz, E. Kiltz, and C. Peikert, “Bonsai trees, or how to delegate a lattice basis,” in Advances in Cryptology (EUROCRYPT‟10), H. Gilbert, Ed. Berlin, Germany: Springer, 2010,vol. 6110, pp. 523–552 [18] Y. Hanaoka, G. Hanaoka, J. Shikata, and H. Imai, “Identity-based hierarchical strongly key-insulated encryption and its application,” in Advances in Cryptology (ASIACRYPT‟05), B. Roy, Ed. Berlin, Germany: Springer, 2005, vol. 3788, pp. 495–514. [19] D. Boneh, X. Ding, G. Tsudik, and C. Wong, “A method for fast revocation of public key certificates and security capabilities,” in Proc. 10th USENIX Security Symp., 2001, pp. 297–308. [20] B. Libert and J.-J. Quisquater, “Efficient revocation and threshold pairing based cryptosystems,” in Proc. 22nd Annu. Symp. Principles Distrib. Comput., 2003, pp. 163–171. [21] H. Lin, Z. Cao, Y. Fang, M. Zhou, and H. Zhu, “Howto design space efficient revocable IBE from nonmonotonic ABE,” in Proc. 6th ACM Symp. Inf. Comput. Commun. Security (ASIACCS‟11), 2011, pp. 381– 385. [22] B. Libert and D. Vergnaud, “Adaptive-id secure revocable identitybased encryption,” in Topics in Cryptology (CT-RSA‟09),M. Fischlin, Ed. Berlin, Germany: Springer, 2009, vol. 5473, pp. 1–15. [23] S. Yu, C. Wang, K. Ren, and W. Lou, “Attribute based data sharing with attribute revocation,” in Proc. 5th ACM Symp. Inf. Comput. Commun. Security (ASIACCS‟10), 2010, pp. 261–270. [24] D. Chaum and T. P. Pedersen, “Wallet databases with observers,” in Proc. 12th Annu. Int. Cryptology Conf. Adv. Cryptology (CRYPTO‟92), 1993, pp. 89–105. [25] M. J. Atallah, K. Pantazopoulos, J. R. Rice, and E. E. Spafford, “Secure outsourcing of scientific computations,” in Trends in Software Engineering, M. V. Zelkowitz, Ed. New York, NY, USA: Elsevier, 2002,vol. 54, pp. 215–272
Download now