A Tangible Structure To Comprehend Circuits Cipher text-Policy Based Hybrid Encryption With Verifiable Delegation (VD-CPABE)

D. Shravani, J.Bala Ambedkar

Abstract


Since strategy for general circuits empowers to accomplish the most grounded type of access control, a development for acknowledging circuit ciphertext-approach attribute based half and half encryption with obvious assignment has been considered in our work. In such a framework, joined with irrefutable calculation and encode then-mac mechanism the information privacy, the fine-grained get to control and the rightness of the assigned figuring results are very much ensured in the meantime. In addition, our plan accomplishes security against picked plaintext attacks under the k-multilinear Decisional Diffie-Hellman presumption. In addition, a broad simulation campaign affirms the practicality and effectiveness of the proposed arrangement.


References


M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. H. Katz, A. Konwinski, G. Lee, D. A. Patterson, A. Rabkin, I. Stoica and M. Zaharia, ”Above the Clouds: A Berkeley View of Cloud Computing,” University of California, Berkeley, Technical Report, no. UCB/EECS-2009-28, 2009.

M. Green, S. Hohenberger and B. Waters, ”Outsourcing the Decryption of ABE Ciphertexts,” in Proc. USENIX Security Symp., San Francisco, CA, USA, 2011.

J. Lai, R. H. Deng, C. Guan and J. Weng, ”Attribute-Based Encryption with Verifiable Outsourced Decryption,” in Proc. IEEE Transactions on information forensics and security, vol. 8, NO. 8, pp.1343-1354, 2013.

A. Lewko and B. Waters, ”Decentralizing Attribute-Based Encryption,” in Proc. EUROCRYPT, pp.568-588, Springer-Verlag Berlin, Heidelberg, 2011.

B. Waters, ”Ciphertext-Policy Attribute-Based Encryption: an Expressive, Enficient, and Provably Secure Realization,” in Proc. PKC, pp.53-70, Springer-Verlag Berlin, Heidelberg, 2011.

B. Parno, M. Raykova and V. Vaikuntanathan, ”How to Delegate and Verify in Public: verifiable computation from attribute-based encryption,” in Proc. TCC, pp.422-439, Springer-Verlag Berlin, Heidelberg, 2012.

S. Yamada, N. Attrapadung and B. Santoso, ”Verifiable Predicate Encryption and Applications to CCA Security and Anonymous Predicate Authentication,” in Proc. PKC, pp.243-261, Springer-Verlag Berlin, Heidelberg, 2012.

J. Han, W. Susilo, Y. Mu and J. Yan, ”Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption,” in Proc. IEEE Transactions on Parallel and Distributed Systems, 2012.

S. Garg, C. Gentry, S. Halevi, A. Sahai and B. Waters, ”Attribute-Based Encryption for Circuits from Multilinear Maps,” in Proc. CRYPTO, pp.479-499, Springer-Verlag Berlin, Heidelberg, 2013.

S. Gorbunov, V. Vaikuntanathan and H. Wee, ”Attribute-Based Encryption for Circuits,” in Proc. STOC, pp.545-554, ACM New York, NY, USA, 2013.

A. Sahai and B. Waters, ”Fuzzy Identity Based Encryption,” in Proc. EUROCRYPT, pp.457-473, Springer-Verlag Berlin, Heidelberg, 2005.

V. Goyal, O. Pandey, A. Sahai and B. Waters, ”Attribute-based Encryption for Fine-grained access control of encrypted data,” in Proc. CCS, pp.89-98, ACM New York, NY, USA, 2006.

R. Cramer and V. Shoup, ”A Practical Public Key Cryptosystem Provably Secure against Adaptive Chosen Ciphertext Attack,” in Proc. CRYPTO, pp.13-25, Springer-Verlag Berlin, Heidelberg, 1998.

R. Cramer and V. Shoup, ”Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack,” in Proc. SIAM Journal on Computing, vol. 33, NO. 1, pp.167-226, 2004.

D. Hofheinz and E. Kiltz R, ”Secure hybrid encryption from weakened key encapsulation,” in Proc. CRYPTO, pp.553-571, Springer-Verlag Berlin, Heidelberg, 2007.


Full Text: PDF [Full Text]

Refbacks

  • There are currently no refbacks.


Copyright © 2013, All rights reserved.| ijseat.com

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.