A New Key Issuing Protocol To Resolve Key Escrow Problem

Kokiripati Sai lakshmi, Kasani Vaddikasulu


We return to attribute based information sharing plan keeping in mind the end goal to fathom the key escrow issue additionally enhance the expressiveness of characteristic, so that the subsequent plan is all the more well-disposed to distributed computing applications. We propose an enhanced two-party key issuing protocol that can ensure that neither key expert nor cloud specialist co-op can trade off the entire mystery key of a client separately. In addition, we present the idea of quality with weight, being given to upgrade the outflow of characteristic, which cannot just extend the expression from paired to discretionary state, additionally help the many-sided quality of get to approach. Along these lines, both capacity cost and encryption many-sided quality for a cipher text are assuaged.


J. Baek, Q. H. Vu, J. K. Liu, X. Huang, and Y. Xiang. A secure cloud computing based framework for big data information management of smart grid. IEEE Transactions on Cloud Computing, 3(2):233–244, 2015.

A. Balu and K. Kuppusamy. An expressive and provably secure ciphertext-policy attribute-based encryption. Information Sciences, 276(4):354–362, 2014.

M. Belenkiy, J. Camenisch, M. Chase, M. Kohlweiss, A. Lysyanskaya, and H. Shacham. Randomizable proofs and delegatable anonymous credentials. Proceedings of the 29th Annual International CryptologyConference, pages 108–125, 2009.

J. Bethencourt, A. Sahai, and B. Waters. Ciphertext-policy attributebased encryption. IEEE Symposium on Security and Privacy, pages 321–334, 2007.

D. Boneh, B. Lynn, and H. Shacham. Short signatures from the weil pairing. Journal of Cryptology, 17(4):297–319, 2001.

M. Chase. Multi-authority attribute based encryption. Proceedings of the 4th Conference on Theory of Cryptography, pages 515–534, 2007.

M. Chase and S. S. Chow. Improving privacy and security in multiauthority attribute-based encryption. Proceedings of the 16th ACMConference on Computer and Communications Security, pages 121–130, 2009.

L. Cheung and C. Newport. Provably secure ciphertext policy ABE. Proceedings of the 14th ACM conference on Computer and communicationssecurity, pages 456–465, 2007.

S. S. Chow. Removing escrow from identity-based encryption. Proceedings of the 12th International Conference on Practice and Theory in Public Key Cryptography, pages 256–276, 2009.

C. K. Chu, W. T. Zhu, J. Han, J. K. Liu, J. Xu, and J. Zhou. Security concerns in popular cloud storage services. IEEE Pervasive Computing, 12(4):50–57, 2013.

A. De Caro and V. Iovino. JPBC: java pairing based cryptography. IEEE Symposium on Computers and Communications, 22(3):850–855, 2011.

H. Deng, Q. Wu, B. Qin, J. Domingo-Ferrer, L. Zhang, J. Liu, and W. Shi. Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts. Information Sciences, 275(11):370–384, 2014.

C. Fan, S. Huang, and H. Rung. Arbitrary-state attribute-based encryption with dynamic membership. IEEE Transactions on Computers, 63(8):1951–1961, 2014.

V. Goyal, O. Pandey, A. Sahai, and B. Waters. Attribute-based encryption for fine-grained access control of encrypted data. Proceedings ofthe 13th ACM conference on Computer and communications security, pages 89–98, 2006.

J. Hur. Improving security and efficiency in attribute-based data sharing. IEEE Transactions on Knowledge and Data Engineering, 25(10):2271– 2282, 2013.

Full Text: PDF [Full Text]


  • There are currently no refbacks.

Copyright © 2013, All rights reserved.| ijseat.com

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.