IJSRSET calls volunteers interested to contribute towards the scientific development in the field of Science, Engineering and Technology

Home > IJSRSET184145                                                     


A Review on Identity Based Encryption in Revocable Cloud Storage

Authors(6):

Kalyani Jaltare, Asavari Bhusari, Samiksha Dangre, Shivali Hedau, Shruti Waghmare, Prof. D. B. Khadse
  • Abstract
  • Authors
  • Keywords
  • References
  • Details
Public key infrastructure (PKI) is a substitute decision to open key encryption though the Identity-Based Encryption IBE is open key and confirmation organization. The essential obstruction of IBE in the midst of disavowal is the overhead estimation at private key generator (PKG).In this paper, going for review on unmistakable procedure for dealing with the basic issue of Identity revocation. We also inspected our proposed work which bring outsourcing considering along with IBE inquisitively and propose a revocable IBE orchestrate in the server-helped setting. Our course of action offloads a broad piece of the key time related operations amidst key-issuing and key-overhaul structures to a Key Update Cloud Service Provider, leaving just an anticipated number of central operations for PKG and clients to perform locally. Moreover, we propose another change which is provable secure under the beginning late formulized Refereed giving over of Computation demonstrate.

Kalyani Jaltare, Asavari Bhusari, Samiksha Dangre, Shivali Hedau, Shruti Waghmare, Prof. D. B. Khadse

Identity-Based Encryption (IBE), Revocation, Outsourcing, Cloud Computing

  1. W. Aiello, S. Oldham, and R. Ostrovsky, "Fast digital identity revocation, "in Advances in Cryptology (CRYPTO'98). New York, NY, USA: Springer, 1998, pp. 137-152.
  2. D. Boneh and M. Franklin, "Identity-based encryption from the Weil pairing," in Advances in Cryptology (CRYPTO „01), J. Kilian, Ed.Berlin, Germany: Springer, 2001, vol. 2139, pp. 213-229.
  3. A. Sahai and B. Waters, "Fuzzy identity-based encryption," in Advances in Cryptology (EUROCRYPT'05), R. Cramer, Ed. Berlin, Germany: Springer, 2005, vol. 3494, pp. 557-557.
  4. S. Hohenberger and A. Lysyanskaya, "How to securely outsource cryptographic computations," in Proc. 2nd Int. Conf. Theory Cryptography (TCC'05), 2005, pp. 264- 282
  5. J. Li, C. Jia, J. Li, and X. Chen, "Outsourcing encryption of attributebased encryption with mapreduce," in Information and Communications Security. Berlin, Heidelberg: Springer, 2012, vol. 7618, pp. 191-201.
  6. B. Zhang, J. Wang, K. Ren, and C. Wang, "Privacy assured Trans. Emerging Topics Comput., vol. 1, no. 1, p. 166-177, Jul. Dec. 2013 outsourcing of image reconstruction service in cloud," IEEE.
  7. B. Zhang, J. Wang, K. Ren, and C. Wang, "Privacyassured outsourcing of image reconstruction service in cloud," IEEE Trans. Emerging Topics Comput., vol. 1, no. 1, p. 166-177, Jul./Dec. 2013.
  8. A. Shamir, "Identity-based cryptosystems and signature schemes," in Advances in Cryptology (CRYPTO), G. Blakley and D. Chaum, Eds. Berlin, Germany: Springer, 1985, vol. 196, pp. 47-53.
  9. C. Cocks, "An identity based encryption scheme based on quadratic residues," in Cryptography and Coding, B. Honary, Ed. Berlin/ Heidelberg: Springer, 2001, vol. 2260, pp. 360-363.
  10. R. Canetti, S. Halevi, and J. Katz, "A forward-secure public-key encryption scheme," in Advances in Cryptology (EUROCRYPT'03),E. Biham, Ed. Berlin, Germany: Springer, 2003, vol. 2656, pp. 646-646.
  11. D. Boneh and X. Boyen, "Efficient selective-id secure identity-based encryption without random oracles," in Advances in Cryptology (EUROCRYPT'04), C. Cachin and J. Camenisch, Eds. Berlin,Germany: Springer, 2004, vol. 3027, pp. 223-238.
  12. D. Boneh and X. Boyen, "Secure identity based encryption without random oracles," in Advances in Cryptology (CRYPTO'04),M. Franklin, Ed. Berlin, Germany: Springer, 2004, vol. 3152, pp. 197-206.
  13. B. Waters, "Efficient identity-based encryption without random oracles," in Advances in Cryptology (EUROCRYPT'05), R. Cramer, Ed. Berlin, Germany: Springer, 2005, vol. 3494, pp. 114-127.
  14. C. Gentry, "Practical identity-based encryption without random oracles," in Advances in Cryptology (EUROCRYPT'06), S. Vaudenay, Ed. Berlin, Germany: Springer, 2006, vol. 4004, pp. 445-464.
  15. C. Gentry, C. Peikert, and V. Vaikuntanathan, "Trapdoors for hard lattices and new cryptographic constructions," in Proc. 40th Annu. ACM Symp. Theory Comput. (STOC'08), 2008, pp. 197-206.
  16. S. Agrawal, D. Boneh, and X. Boyen, "Efficient lattice (h)ibe in the standard model," in Advances in Cryptology (EUROCRYPT'10), H. Gilbert, Ed. Berlin, Germany: Springer, 2010, vol. 6110, pp. 553-572.
  17. D. Cash, D. Hofheinz, E. Kiltz, and C. Peikert, "Bonsai trees, or how to delegate a lattice basis," in Advances in Cryptology (EUROCRYPT'10), H. Gilbert, Ed. Berlin, Germany: Springer, 2010,vol. 6110, pp. 523-552
  18. Y. Hanaoka, G. Hanaoka, J. Shikata, and H. Imai, "Identity-based hierarchical strongly key-insulated encryption and its application," in Advances in Cryptology (ASIACRYPT'05), B. Roy, Ed. Berlin, Germany: Springer, 2005, vol. 3788, pp. 495-514.
  19. D. Boneh, X. Ding, G. Tsudik, and C. Wong, "A method for fast revocation of public key certificates and security capabilities," in Proc. 10th USENIX Security Symp., 2001, pp. 297-308.
  20. B. Libert and J.-J. Quisquater, "Efficient revocation and threshold pairing based cryptosystems," in Proc. 22nd Annu. Symp. Principles Distrib. Comput., 2003, pp. 163-171.
  21. H. Lin, Z. Cao, Y. Fang, M. Zhou, and H. Zhu, "Howto design space efficient revocable IBE from nonmonotonic ABE," in Proc. 6th ACM Symp. Inf. Comput. Commun. Security (ASIACCS'11), 2011, pp. 381-385.
  22. B. Libert and D. Vergnaud, "Adaptive-id secure revocable identitybased encryption," in Topics in Cryptology (CT-RSA'09),M. Fischlin, Ed. Berlin, Germany: Springer, 2009, vol. 5473, pp. 1-15.
  23. S. Yu, C. Wang, K. Ren, and W. Lou, "Attribute based data sharing with attribute revocation," in Proc. 5th ACM Symp. Inf. Comput. Commun. Security (ASIACCS'10), 2010, pp. 261-270.
  24. D. Chaum and T. P. Pedersen, "Wallet databases with observers," in Proc. 12th Annu. Int. Cryptology Conf. Adv. Cryptology (CRYPTO'92), 1993, pp. 89-105.
  25. M. J. Atallah, K. Pantazopoulos, J. R. Rice, and E. E. Spafford, "Secure outsourcing of scientific computations," in Trends in Software Engineering, M. V. Zelkowitz, Ed. New York, NY, USA: Elsevier, 2002,vol. 54, pp. 215-272

Publication Details

Published in : Volume 4 | Issue 1 | January-February - 2018
Date of Publication Print ISSN Online ISSN
2018-02-28 2395-1990 2394-4099
Page(s) Manuscript Number   Publisher
146-151 IJSRSET184145   Technoscience Academy

Cite This Article

Kalyani Jaltare, Asavari Bhusari, Samiksha Dangre, Shivali Hedau, Shruti Waghmare, Prof. D. B. Khadse, "A Review on Identity Based Encryption in Revocable Cloud Storage", International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 4, Issue 1, pp.146-151, January-February-2018.
URL : http://ijsrset.com/IJSRSET184145.php