International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Since Year 2012 | Open Access | Double Blind Reviewed

ISSN: 2319-7064




Downloads: 111

Research Paper | Computer Science & Engineering | India | Volume 4 Issue 11, November 2015


Improving Security of Traceable White-Box CPABE with TTP Access Control

Dilu Anil


Abstract: Various encryption schemes have gained popularity for secure transmission of data. CPABE (Ciphertext Policy Attribute Based Encryption) is one among such schemes. The decryption rights are generated based on the attributes of user. Traceability is the property by which the malicious users who intentionally try to leak the data are traced. However it is difficult to find the actual user who leaked the key since there can be many people who share the same decryption rights. In this paper a trusted third party is introduced, which will act as the public auditor. If any malicious user claims to be innocent, then the third party checks and traces all the information transferred by that user.


Keywords: Attribute Based Encryption, Traceability, public auditor, malicious user


Edition: Volume 4 Issue 11, November 2015,


Pages: 1122 - 1125


How to Cite this Article?

Dilu Anil, "Improving Security of Traceable White-Box CPABE with TTP Access Control", International Journal of Science and Research (IJSR), Volume 4 Issue 11, November 2015, pp. 1122-1125, https://www.ijsr.net/get_abstract.php?paper_id=NOV151381

How to Share this Article?






Similar Articles with Keyword 'Attribute Based Encryption'

Downloads: 105

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 1737 - 1740

Enabling Data Dynamics and Achieving Access Control and Assured Deletion in Cloud

Nilam Musale [2] | Vilas Gaikwad [2]

Share this Article

Downloads: 106

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2681 - 2683

Efficient and Confident Sharing of Personal Healthcare Records using Attribute Based Encryption in Cloud Computing

Nitin Raut | Seema Singh [7]

Share this Article


Top