UGC APPROVED    ISSN 2278-1412

Archive

  Volume 13 | Issue 1

  Volume 13 | Issue 6

  Volume 13 | Issue 5

  Volume 13 | Issue 3

  Volume 12 | Issue 7

  Volume 12 | Issue 5

  Volume 12 | Issue 8

  Volume 12 | Issue 2

  Volume 12 | Issue 12

  Volume 12 | Issue 1

  Volume 12 | Issue 9

  Volume 12 | Issue 3

  Volume 12 | Issue 11

  Volume 12 | Issue 6

  Volume 12 | Issue 4

  Volume 12 | Issue 10

  Volume 11 | Issue 8

  Volume 11 | Issue 1

  Volume 11 | Issue 12

  Volume 11 | Issue 7

  Volume 11 | Issue 10

  Volume 11 | Issue 6

  Volume 11 | Issue 3

  Volume 11 | Issue 11

  Volume 10 | Issue 3

  Volume 10 | Issue 8

  Volume 10 | Issue 6

  Volume 10 | Issue 2

  Volume 10 | Issue 1

  Volume 10 | Issue 12

  Volume 9 | Issue 10

  Volume 8 | Issue 7

  Volume 8 | Issue 11

  Volume 7 | Issue 3

  Volume 7 | Issue 8

  Volume 7 | Issue 1

  Volume 7 | Issue 5

  Volume 7 | Issue 4

  Volume 7 | Issue 2

  Volume 7 | Issue 6

  Volume 7 | Issue 7

  Volume 6 | Issue 5

  Volume 6 | Issue 9

  Volume 6 | Issue 3

  Volume 6 | Issue 6

  Volume 6 | Issue 10

  Volume 6 | Issue 7

  Volume 6 | Issue 1

  Volume 6 | Issue 4

  Volume 6 | Issue 8

  Volume 6 | Issue 2

  Volume 6 | Issue 12

  Volume 5 | Issue 7

  Volume 5 | Issue 2

  Volume 5 | Issue 12

  Volume 5 | Issue 8

  Volume 5 | Issue 3

  Volume 5 | Issue 5

  Volume 5 | Issue 1

  Volume 5 | Issue 9

  Volume 5 | Issue 11

  Volume 5 | Issue 6

  Volume 5 | Issue 4

  Volume 5 | Issue 10

  Volume 4 | Issue 7

  Volume 4 | Issue 4

  Volume 4 | Issue 8

  Volume 4 | Issue 12

  Volume 4 | Issue 10

  Volume 4 | Issue 5

  Volume 4 | Issue 1

  Volume 4 | Issue 6

  Volume 4 | Issue 2

  Volume 3 | Issue 4

  Volume 3 | Issue 10

  Volume 3 | Issue 1

  Volume 3 | Issue 5

  Volume 3 | Issue 2

  Volume 3 | Issue 6

  Volume 3 | Issue 3

  Volume 3 | Issue 8

  Volume 2 | Issue 10

  Volume 2 | Issue 7

  Volume 2 | Issue 11

  Volume 2 | Issue 8

  Volume 2 | Issue 2

  Volume 2 | Issue 9

  Volume 2 | Issue 12

  Volume 1 | Issue 7

  Volume 1 | Issue 1

  Volume 1 | Issue 8

  Volume 1 | Issue 4

  Volume 1 | Issue 2

  Volume 1 | Issue 9

  Volume 1 | Issue 6

  Volume 1 | Issue 3


Current Volume 13 | Issue 07

Title:  Security Enhancement in Cloud Environment Using Identity Based Encryption and Hyper Chaotic Searchable Image Encryption
Volume:  7 - Issue: 07 - Date: 01-07-2018
Approved ISSN:  2278-1412
Published Id:  IJAECESTU343 |  Page No.: 701-704
Author: Shruti Kirti Dixit
Co- Author:  Dr. Tripti Arjariya
Abstract:-

In our scheme, as with the suggestion, we realize revocation through updating the private keys of the unrevoked users. But unlike that work which trivially concatenates time period with identity for key generation/update and requires to re-issue the whole private key for unrevoked users, we propose a novel collusion-resistant key issuing technique: we employ a hybrid private key for each user, in which an AND gate is involved to connect and bound two subcomponents, namely the identity component and the time component. Furthermore, we consider realizing revocable IBE with a semi-honest KU-CSP. To achieve this goal, we present a security enhanced construction under the recently formalized Refereed Delegation of Computation (RDoC) model. 


Key Words:-IBE, HCIE, Cloud computing, PKG, KU-CSP
Area:-Engineering
DOI Member: 186.53.344
DOI Member: 
Preview This Article

Unable to display PDF file. Download instead.


Download Paper

Downlaod Paper

No. of Download
00031

Impact Factor


7.4

Ijaece

Upcoming Events


Special Issue For Paper


Upcoming Conference


Call For Paper