Identity-Based Encryption with Cloud Revocation Authority and Its Applications

Mrs. Shravani, Manpreet Kour, M. Nikhitha, M. Ram Charan


;- In this paper we study regarding information sharing has never been easier with the advances of cloud computing, because of the absence of PKI, the revocation drawback could be a critical issue in IBE settings.  Identity-based encryption (IBE) could be a public key cryptosystem. We want to disregards the difficulties to induce public key infrastructure (PKI) and certificate administration in standard public key settings. Many revocable IBE schemes are planned relating to this issue. Recently solve this drawback exploitation embedding Associate in nursing outsourcing computation technique into Identity-based encryption. Our planned system straightforward to recover the IBE theme with a key-update cloud service supplier (KU-CSP). However, their scheme has two shortcomings. One is lack of scalability within the sense that the KU-CSP should keep a secret worth for every user. The opposite defect could be a computation and communication prices area unit more than previous revocable IBE schemes. Within the article, we tend to propose a replacement revocable IBE theme with a cloud revocation authority (CRA) to unravel the two shortcomings, For security analysis, we have a tendency to demonstrate that the planned scheme is semantically secure below the decisional linear Diffie-Hellman (DBDH) assumption. Namely, the performance is considerably improved and also the CRA holds solely a system secret for all the users. Finally, we extend the planned revocable IBE scheme to gift a CRA-aided authentication scheme with period-limited privileges for managing an outsized range of varied cloud services

Full Text:


Copyright (c) 2017 Edupedia Publications Pvt Ltd

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.


All published Articles are Open Access at 

Paper submission: