Secure and Efficient Implementation of Identity Based Encryption in Cloud Computing
Volume: 6 - Issue: 08 - Date: 01-08-2017
Approved ISSN: 2278-1412
Published Id: IJAECESTU317 | Page No.: 801-805
Author: Yogesh Kumar Darwai
Co- Author: Vimal Shukla
Abstract:-In our scheme, like the suggestion, we tend to understand revocation through change
the private keys of the unrevoked users. however not like that work that trivially concatenates
period of time with identity for key generation/update and needs to re-issue the entire private key
for unrevoked users, we tend to propose a completely unique collusion-resistant key issue
technique: we tend to use a hybrid private key for every user, during which an AND gate is
concerned to connect and bound 2 sub-components, specifically the identity part and also the time
component. Moreover, we tend to consider realizing revocable IBE with a semi-honest KU-CSP.
To realize this goal, we tend to present a security increased construction under the recently
formalized Refereed Delegation of Computation (RDoC) model.
Key Words:-Outsourcing, Private Key Generator, Cloud Server Provider, Cloud Computing, Identity-based encryption, Key Distribution.
Area:-Engineering
Download Paper:
Preview This Article