SlideShare a Scribd company logo
1 of 4
Download to read offline
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6.
Off: 0416-2247353 / 6066663 Mo: +91 9500218218
Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com
CONTRIBUTORY BROADCAST ENCRYPTION WITH EFFICIENT ENCRYPTION
AND SHORT CIPHERTEXTS
ABSTRACT:
Traditional broadcast encryption (BE) schemes allow a sender to securely broadcast to
any subset of members but require a trusted party to distribute decryption keys. Group key
agreement (GKA) protocols enable a group of members to negotiate a common encryption key
via open networks so that only the group members can decrypt the ciphertexts encrypted under
the shared encryption key, but a sender cannot exclude any particular member from decrypting
the ciphertexts. In this paper, we bridge these two notions with a hybrid primitive referred to as
contributory broadcast encryption (ConBE). In this new primitive, a group of members negotiate
a common public encryption key while each member holds a decryption key. A sender seeing the
public group encryption key can limit the decryption to a subset of members of his choice.
Following this model, we propose a ConBE scheme with short ciphertexts. The scheme is proven
to be fully collusion-resistant under the decision n-Bilinear Diffie-Hellman Exponentiation
(BDHE) assumption in the standard model. Of independent interest, we present a new BE
scheme that is aggregatable. The aggregatability property is shown to be useful to construct
advanced protocols.
EXISTING SYSTEM:
 Group key agreement (GKA) is another well-understood cryptographic primitive to
secure group-oriented communications. A conventional GKA allows a group of members
to establish a common secret key via open networks. However, whenever a sender wants
to send a message to a group, he must first join the group and run a GKA protocol to
share a secret key with the intended members.
 More recently, and to overcome this limitation, Wu et al. introduced asymmetric GKA, in
which only a common group public key is negotiated and each group member holds a
different decryption key.
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6.
Off: 0416-2247353 / 6066663 Mo: +91 9500218218
Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com
 However, neither conventional symmetric GKA nor the newly introduced asymmetric
GKA allow the sender to unilaterally exclude any particular member from reading the
plaintext. Hence, it is essential to find more flexible cryptographic primitives allowing
dynamic broadcasts without a fully trusted dealer.
DISADVANTAGES OF EXISTING SYSTEM:
 Need a fully trusted third party to set up the system.
 Existing GKA protocols cannot handle sender/member changes efficiently.
PROPOSED SYSTEM:
 We present the Contributory Broadcast Encryption (ConBE) primitive, which is a hybrid
of GKA and BE.
 This full paper provides complete security proofs, illustrates the necessity of the
aggregatability of the underlying BE building block and shows the practicality of our
ConBE scheme with experiments.
 First, we model the ConBE primitive and formalize its security definitions. ConBE
incorporates the underlying ideas of GKA and BE. A group of members interact via open
networks to negotiate a public encryption key while each member holds a different secret
decryption key. Using the public encryption key, anyone can encrypt any message to any
subset of the group members and only the intended receivers can decrypt.
 We formalize collusion resistance by defining an attacker who can fully control all the
members outside the intended receivers but cannot extract useful information from the
ciphertext.
 Second, we present the notion of aggregatable broadcast encryption (AggBE). Coarsely
speaking, a BE scheme is aggregatable if its secure instances can be aggregated into a
new secure instance of the BE scheme. Specifically, only the aggregated decryption keys
of the same user are valid decryption keys corresponding to the aggregated public keys of
the underlying BE instances.
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6.
Off: 0416-2247353 / 6066663 Mo: +91 9500218218
Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com
 Finally, we construct an efficient ConBE scheme with our AggBE scheme as a building
block. The ConBE construction is proven to be semi-adaptively secure under the decision
BDHE assumption in the standard model.
ADVANTAGES OF PROPOSED SYSTEM:
 We construct a concrete AggBE scheme tightly proven to be fully collusion-resistant
under the decision BDHE assumption.
 The proposed AggBE scheme offers efficient encryption/decryption and short
ciphertexts.
 Only one round is required to establish the public group encryption key and set up the
ConBE system.
SYSTEM ARCHITECTURE:
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6.
Off: 0416-2247353 / 6066663 Mo: +91 9500218218
Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com
SYSTEM REQUIREMENTS
HARDWARE REQUIREMENTS:
 System : Pentium IV 2.4 GHz.
 Hard Disk : 40 GB.
 Floppy Drive : 1.44 Mb.
 Monitor : 15 VGA Colour.
 Mouse : Logitech.
 Ram : 512 Mb.
SOFTWARE REQUIREMENTS:
 Operating system : Windows XP/7.
 Coding Language : JAVA
 IDE : Netbeans 7.4
 Database : MYSQL
REFERENCE:
 Qianhong Wu, Member, IEEE, Bo Qin, Lei Zhang, Member, IEEE, Josep Domingo-
Ferrer, Fellow, IEEE Oriol Farr`as, and Jes´us A. Manj´on, “Contributory Broadcast
Encryption with Efficient Encryption and Short Ciphertexts”, IEEE TRANSACTIONS
ON COMPUTERS 2015.

More Related Content

What's hot

Bitcoin and blockchain basics
Bitcoin and blockchain basicsBitcoin and blockchain basics
Bitcoin and blockchain basics
Michele Pace
 

What's hot (9)

Programming smart contracts in solidity
Programming smart contracts in solidityProgramming smart contracts in solidity
Programming smart contracts in solidity
 
Klaytn: Service-Oriented Enterprise-Grade Public Blockchain Platform
Klaytn: Service-Oriented Enterprise-Grade Public Blockchain PlatformKlaytn: Service-Oriented Enterprise-Grade Public Blockchain Platform
Klaytn: Service-Oriented Enterprise-Grade Public Blockchain Platform
 
DaoLiName-Decentralized Identity as Public Key
DaoLiName-Decentralized Identity as Public KeyDaoLiName-Decentralized Identity as Public Key
DaoLiName-Decentralized Identity as Public Key
 
Creating Smart Contract
Creating Smart ContractCreating Smart Contract
Creating Smart Contract
 
Sarwar sayeed , hector marco gisbert, tom caira ieee
Sarwar sayeed , hector marco gisbert, tom caira ieeeSarwar sayeed , hector marco gisbert, tom caira ieee
Sarwar sayeed , hector marco gisbert, tom caira ieee
 
Blockchain
BlockchainBlockchain
Blockchain
 
Bitcoin and blockchain basics
Bitcoin and blockchain basicsBitcoin and blockchain basics
Bitcoin and blockchain basics
 
Applying Blockchain to Transactive Energy
Applying Blockchain to Transactive EnergyApplying Blockchain to Transactive Energy
Applying Blockchain to Transactive Energy
 
Blockchain Technology
Blockchain TechnologyBlockchain Technology
Blockchain Technology
 

Viewers also liked

Viewers also liked (16)

An exploration of geographic authentication schemes
An exploration of geographic authentication schemesAn exploration of geographic authentication schemes
An exploration of geographic authentication schemes
 
Traffic load adaptive medium access control for fully connected mobile ad hoc...
Traffic load adaptive medium access control for fully connected mobile ad hoc...Traffic load adaptive medium access control for fully connected mobile ad hoc...
Traffic load adaptive medium access control for fully connected mobile ad hoc...
 
Contributory broadcast encryption with efficient encryption and short ciphert...
Contributory broadcast encryption with efficient encryption and short ciphert...Contributory broadcast encryption with efficient encryption and short ciphert...
Contributory broadcast encryption with efficient encryption and short ciphert...
 
Distributed and adaptive medium access control for internet of-things-enabled...
Distributed and adaptive medium access control for internet of-things-enabled...Distributed and adaptive medium access control for internet of-things-enabled...
Distributed and adaptive medium access control for internet of-things-enabled...
 
Inference attack on browsing history of twitter users using public click anal...
Inference attack on browsing history of twitter users using public click anal...Inference attack on browsing history of twitter users using public click anal...
Inference attack on browsing history of twitter users using public click anal...
 
Domain sensitive recommendation with user-item subgroup analysis
Domain sensitive recommendation with user-item subgroup analysisDomain sensitive recommendation with user-item subgroup analysis
Domain sensitive recommendation with user-item subgroup analysis
 
Nearest keyword set search in multi dimensional datasets
Nearest keyword set search in multi dimensional datasetsNearest keyword set search in multi dimensional datasets
Nearest keyword set search in multi dimensional datasets
 
Clustering data streams based on shared density between micro clusters
Clustering data streams based on shared density between micro clustersClustering data streams based on shared density between micro clusters
Clustering data streams based on shared density between micro clusters
 
Using hash tag graph based topic model to connect semantically-related words ...
Using hash tag graph based topic model to connect semantically-related words ...Using hash tag graph based topic model to connect semantically-related words ...
Using hash tag graph based topic model to connect semantically-related words ...
 
Probabilistic static load balancing of parallel mining of frequent sequences
Probabilistic static load balancing of parallel mining of frequent sequencesProbabilistic static load balancing of parallel mining of frequent sequences
Probabilistic static load balancing of parallel mining of frequent sequences
 
Efficient algorithms for mining top k high utility item sets
Efficient algorithms for mining top k high utility item setsEfficient algorithms for mining top k high utility item sets
Efficient algorithms for mining top k high utility item sets
 
D2 d delay aware distributed dynamic adaptation of contention windowin wirele...
D2 d delay aware distributed dynamic adaptation of contention windowin wirele...D2 d delay aware distributed dynamic adaptation of contention windowin wirele...
D2 d delay aware distributed dynamic adaptation of contention windowin wirele...
 
Location aware keyword query suggestion based on document proximity
Location aware keyword query suggestion based on document proximityLocation aware keyword query suggestion based on document proximity
Location aware keyword query suggestion based on document proximity
 
Madam effective and efficient behavior based android malware detection and pr...
Madam effective and efficient behavior based android malware detection and pr...Madam effective and efficient behavior based android malware detection and pr...
Madam effective and efficient behavior based android malware detection and pr...
 
Fine grained two-factor access control for web-based cloud computing services
Fine grained two-factor access control for web-based cloud computing servicesFine grained two-factor access control for web-based cloud computing services
Fine grained two-factor access control for web-based cloud computing services
 
A comprehensive study on willingness maximization for social activity plannin...
A comprehensive study on willingness maximization for social activity plannin...A comprehensive study on willingness maximization for social activity plannin...
A comprehensive study on willingness maximization for social activity plannin...
 

Similar to Contributory broadcast encryption with efficient encryption and short ciphertexts

Contributory Broadcast Encryption with Efficient Encryption and Short Ciphert...
Contributory Broadcast Encryption with Efficient Encryption and Short Ciphert...Contributory Broadcast Encryption with Efficient Encryption and Short Ciphert...
Contributory Broadcast Encryption with Efficient Encryption and Short Ciphert...
1crore projects
 
IDENTITY-BASED ENCRYPTION WITH OUTSOURCED REVOCATION IN CLOUD COMPUTING
IDENTITY-BASED ENCRYPTION WITH OUTSOURCED REVOCATION IN CLOUD COMPUTINGIDENTITY-BASED ENCRYPTION WITH OUTSOURCED REVOCATION IN CLOUD COMPUTING
IDENTITY-BASED ENCRYPTION WITH OUTSOURCED REVOCATION IN CLOUD COMPUTING
Shakas Technologies
 

Similar to Contributory broadcast encryption with efficient encryption and short ciphertexts (20)

Contributory Broadcast Encryption with Efficient Encryption and Short Ciphert...
Contributory Broadcast Encryption with Efficient Encryption and Short Ciphert...Contributory Broadcast Encryption with Efficient Encryption and Short Ciphert...
Contributory Broadcast Encryption with Efficient Encryption and Short Ciphert...
 
Identity based encryption with outsourced revocation in cloud computing
Identity based encryption with outsourced revocation in cloud computingIdentity based encryption with outsourced revocation in cloud computing
Identity based encryption with outsourced revocation in cloud computing
 
Identity based encryption with outsourced revocation in cloud computing
Identity based encryption with outsourced revocation in cloud computingIdentity based encryption with outsourced revocation in cloud computing
Identity based encryption with outsourced revocation in cloud computing
 
Key aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storageKey aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storage
 
Audit free cloud storage via deniable attribute-based encryption
Audit free cloud storage via deniable attribute-based encryptionAudit free cloud storage via deniable attribute-based encryption
Audit free cloud storage via deniable attribute-based encryption
 
Audit free cloud storage via deniable attribute-based encryption
Audit free cloud storage via deniable attribute-based encryptionAudit free cloud storage via deniable attribute-based encryption
Audit free cloud storage via deniable attribute-based encryption
 
A secure anti collusion data sharing scheme for dynamic groups in the cloud
A secure anti collusion data sharing scheme for dynamic groups in the cloudA secure anti collusion data sharing scheme for dynamic groups in the cloud
A secure anti collusion data sharing scheme for dynamic groups in the cloud
 
Audit free cloud storage via deniable attribute-based encryption
Audit free cloud storage via deniable attribute-based encryptionAudit free cloud storage via deniable attribute-based encryption
Audit free cloud storage via deniable attribute-based encryption
 
IDENTITY-BASED ENCRYPTION WITH OUTSOURCED REVOCATION IN CLOUD COMPUTING
IDENTITY-BASED ENCRYPTION WITH OUTSOURCED REVOCATION IN CLOUD COMPUTINGIDENTITY-BASED ENCRYPTION WITH OUTSOURCED REVOCATION IN CLOUD COMPUTING
IDENTITY-BASED ENCRYPTION WITH OUTSOURCED REVOCATION IN CLOUD COMPUTING
 
Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...
 
An efficient distributed group key management using hierarchical approach wit...
An efficient distributed group key management using hierarchical approach wit...An efficient distributed group key management using hierarchical approach wit...
An efficient distributed group key management using hierarchical approach wit...
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
Dual server public-key encryption with keyword search for secure cloud storage
Dual server public-key encryption with keyword search for secure cloud storageDual server public-key encryption with keyword search for secure cloud storage
Dual server public-key encryption with keyword search for secure cloud storage
 
A secure group key management scheme for sensor networks
A secure group key management scheme for sensor networksA secure group key management scheme for sensor networks
A secure group key management scheme for sensor networks
 
Flexible and fine grained attribute-based data storage in cloud computing
Flexible and fine grained attribute-based data storage in cloud computingFlexible and fine grained attribute-based data storage in cloud computing
Flexible and fine grained attribute-based data storage in cloud computing
 
Flexible and fine grained attribute-based data storage in cloud computing
Flexible and fine grained attribute-based data storage in cloud computingFlexible and fine grained attribute-based data storage in cloud computing
Flexible and fine grained attribute-based data storage in cloud computing
 
Design of Secure Hash Algorithm(SHA)
Design of Secure Hash Algorithm(SHA)Design of Secure Hash Algorithm(SHA)
Design of Secure Hash Algorithm(SHA)
 
Efficient rekeying framework for secure multicast with diverse subscription-p...
Efficient rekeying framework for secure multicast with diverse subscription-p...Efficient rekeying framework for secure multicast with diverse subscription-p...
Efficient rekeying framework for secure multicast with diverse subscription-p...
 
Secure data sharing in cloud computing using revocable storage identity-based...
Secure data sharing in cloud computing using revocable storage identity-based...Secure data sharing in cloud computing using revocable storage identity-based...
Secure data sharing in cloud computing using revocable storage identity-based...
 
Secure data sharing in cloud computing using revocable storage identity-based...
Secure data sharing in cloud computing using revocable storage identity-based...Secure data sharing in cloud computing using revocable storage identity-based...
Secure data sharing in cloud computing using revocable storage identity-based...
 

More from Shakas Technologies

More from Shakas Technologies (20)

A Review on Deep-Learning-Based Cyberbullying Detection
A Review on Deep-Learning-Based Cyberbullying DetectionA Review on Deep-Learning-Based Cyberbullying Detection
A Review on Deep-Learning-Based Cyberbullying Detection
 
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
 
A Novel Framework for Credit Card.
A Novel Framework for Credit Card.A Novel Framework for Credit Card.
A Novel Framework for Credit Card.
 
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
 
NS2 Final Year Project Titles 2023- 2024
NS2 Final Year Project Titles 2023- 2024NS2 Final Year Project Titles 2023- 2024
NS2 Final Year Project Titles 2023- 2024
 
MATLAB Final Year IEEE Project Titles 2023-2024
MATLAB Final Year IEEE Project Titles 2023-2024MATLAB Final Year IEEE Project Titles 2023-2024
MATLAB Final Year IEEE Project Titles 2023-2024
 
Latest Python IEEE Project Titles 2023-2024
Latest Python IEEE Project Titles 2023-2024Latest Python IEEE Project Titles 2023-2024
Latest Python IEEE Project Titles 2023-2024
 
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
 
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSECYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
 
Detecting Mental Disorders in social Media through Emotional patterns-The cas...
Detecting Mental Disorders in social Media through Emotional patterns-The cas...Detecting Mental Disorders in social Media through Emotional patterns-The cas...
Detecting Mental Disorders in social Media through Emotional patterns-The cas...
 
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTIONCOMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
 
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCECO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
 
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
 
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
 
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
 
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
 
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
 
Fighting Money Laundering With Statistics and Machine Learning.docx
Fighting Money Laundering With Statistics and Machine Learning.docxFighting Money Laundering With Statistics and Machine Learning.docx
Fighting Money Laundering With Statistics and Machine Learning.docx
 
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
 
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...
 

Recently uploaded

Call Girls in Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in  Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in  Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Recently uploaded (20)

Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
latest AZ-104 Exam Questions and Answers
latest AZ-104 Exam Questions and Answerslatest AZ-104 Exam Questions and Answers
latest AZ-104 Exam Questions and Answers
 
Call Girls in Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in  Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in  Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.ppt
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
dusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learningdusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learning
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
 
How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Philosophy of china and it's charactistics
Philosophy of china and it's charactisticsPhilosophy of china and it's charactistics
Philosophy of china and it's charactistics
 

Contributory broadcast encryption with efficient encryption and short ciphertexts

  • 1. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6. Off: 0416-2247353 / 6066663 Mo: +91 9500218218 Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com CONTRIBUTORY BROADCAST ENCRYPTION WITH EFFICIENT ENCRYPTION AND SHORT CIPHERTEXTS ABSTRACT: Traditional broadcast encryption (BE) schemes allow a sender to securely broadcast to any subset of members but require a trusted party to distribute decryption keys. Group key agreement (GKA) protocols enable a group of members to negotiate a common encryption key via open networks so that only the group members can decrypt the ciphertexts encrypted under the shared encryption key, but a sender cannot exclude any particular member from decrypting the ciphertexts. In this paper, we bridge these two notions with a hybrid primitive referred to as contributory broadcast encryption (ConBE). In this new primitive, a group of members negotiate a common public encryption key while each member holds a decryption key. A sender seeing the public group encryption key can limit the decryption to a subset of members of his choice. Following this model, we propose a ConBE scheme with short ciphertexts. The scheme is proven to be fully collusion-resistant under the decision n-Bilinear Diffie-Hellman Exponentiation (BDHE) assumption in the standard model. Of independent interest, we present a new BE scheme that is aggregatable. The aggregatability property is shown to be useful to construct advanced protocols. EXISTING SYSTEM:  Group key agreement (GKA) is another well-understood cryptographic primitive to secure group-oriented communications. A conventional GKA allows a group of members to establish a common secret key via open networks. However, whenever a sender wants to send a message to a group, he must first join the group and run a GKA protocol to share a secret key with the intended members.  More recently, and to overcome this limitation, Wu et al. introduced asymmetric GKA, in which only a common group public key is negotiated and each group member holds a different decryption key.
  • 2. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6. Off: 0416-2247353 / 6066663 Mo: +91 9500218218 Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com  However, neither conventional symmetric GKA nor the newly introduced asymmetric GKA allow the sender to unilaterally exclude any particular member from reading the plaintext. Hence, it is essential to find more flexible cryptographic primitives allowing dynamic broadcasts without a fully trusted dealer. DISADVANTAGES OF EXISTING SYSTEM:  Need a fully trusted third party to set up the system.  Existing GKA protocols cannot handle sender/member changes efficiently. PROPOSED SYSTEM:  We present the Contributory Broadcast Encryption (ConBE) primitive, which is a hybrid of GKA and BE.  This full paper provides complete security proofs, illustrates the necessity of the aggregatability of the underlying BE building block and shows the practicality of our ConBE scheme with experiments.  First, we model the ConBE primitive and formalize its security definitions. ConBE incorporates the underlying ideas of GKA and BE. A group of members interact via open networks to negotiate a public encryption key while each member holds a different secret decryption key. Using the public encryption key, anyone can encrypt any message to any subset of the group members and only the intended receivers can decrypt.  We formalize collusion resistance by defining an attacker who can fully control all the members outside the intended receivers but cannot extract useful information from the ciphertext.  Second, we present the notion of aggregatable broadcast encryption (AggBE). Coarsely speaking, a BE scheme is aggregatable if its secure instances can be aggregated into a new secure instance of the BE scheme. Specifically, only the aggregated decryption keys of the same user are valid decryption keys corresponding to the aggregated public keys of the underlying BE instances.
  • 3. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6. Off: 0416-2247353 / 6066663 Mo: +91 9500218218 Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com  Finally, we construct an efficient ConBE scheme with our AggBE scheme as a building block. The ConBE construction is proven to be semi-adaptively secure under the decision BDHE assumption in the standard model. ADVANTAGES OF PROPOSED SYSTEM:  We construct a concrete AggBE scheme tightly proven to be fully collusion-resistant under the decision BDHE assumption.  The proposed AggBE scheme offers efficient encryption/decryption and short ciphertexts.  Only one round is required to establish the public group encryption key and set up the ConBE system. SYSTEM ARCHITECTURE:
  • 4. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore – 6. Off: 0416-2247353 / 6066663 Mo: +91 9500218218 Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com SYSTEM REQUIREMENTS HARDWARE REQUIREMENTS:  System : Pentium IV 2.4 GHz.  Hard Disk : 40 GB.  Floppy Drive : 1.44 Mb.  Monitor : 15 VGA Colour.  Mouse : Logitech.  Ram : 512 Mb. SOFTWARE REQUIREMENTS:  Operating system : Windows XP/7.  Coding Language : JAVA  IDE : Netbeans 7.4  Database : MYSQL REFERENCE:  Qianhong Wu, Member, IEEE, Bo Qin, Lei Zhang, Member, IEEE, Josep Domingo- Ferrer, Fellow, IEEE Oriol Farr`as, and Jes´us A. Manj´on, “Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts”, IEEE TRANSACTIONS ON COMPUTERS 2015.