Improving Security of Traceable White-Box CPABE with TTP Access Control
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064



Downloads: 110 | Weekly Hits: ⮙3 | Monthly Hits: ⮙14

Research Paper | Computer Science & Engineering | India | Volume 4 Issue 11, November 2015

Improving Security of Traceable White-Box CPABE with TTP Access Control

Dilu Anil

Various encryption schemes have gained popularity for secure transmission of data. CPABE (Ciphertext Policy Attribute Based Encryption) is one among such schemes. The decryption rights are generated based on the attributes of user. Traceability is the property by which the malicious users who intentionally try to leak the data are traced. However it is difficult to find the actual user who leaked the key since there can be many people who share the same decryption rights. In this paper a trusted third party is introduced, which will act as the public auditor. If any malicious user claims to be innocent, then the third party checks and traces all the information transferred by that user.

Keywords: Attribute Based Encryption, Traceability, public auditor, malicious user

Edition: Volume 4 Issue 11, November 2015

Pages: 1122 - 1125

Share this Article

How to Cite this Article?

Dilu Anil, "Improving Security of Traceable White-Box CPABE with TTP Access Control", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=NOV151381, Volume 4 Issue 11, November 2015, 1122 - 1125

Enter Your Registered Email Address





Similar Articles with Keyword 'Attribute Based Encryption'

Downloads: 104 | Weekly Hits: ⮙1 | Monthly Hits: ⮙13

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 1737 - 1740

Enabling Data Dynamics and Achieving Access Control and Assured Deletion in Cloud

Nilam Musale, Vilas Gaikwad

Share this Article

Downloads: 106 | Weekly Hits: ⮙2 | Monthly Hits: ⮙13

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2681 - 2683

Efficient and Confident Sharing of Personal Healthcare Records using Attribute Based Encryption in Cloud Computing

Nitin Raut, Seema Singh

Share this Article

Downloads: 106 | Weekly Hits: ⮙1 | Monthly Hits: ⮙9

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 1899 - 1902

Privacy Preservation in Cloud Using Attribute Based Encryption

T. Arokiaarun, D. Saveetha

Share this Article

Downloads: 106 | Weekly Hits: ⮙3 | Monthly Hits: ⮙9

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 2165 - 2166

Securing and Low Time Consuming for Sharing High Sensitive and Relevant Data

Princy.B, Nishley Elizabeth Joseph

Share this Article

Downloads: 107 | Monthly Hits: ⮙11

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 3093 - 3098

Privacy-Conserved Health Care Information System with Efficient Cloud Security

R. Pradeep, T. P. Dayana Peter

Share this Article

Similar Articles with Keyword 'Traceability'

Downloads: 3 | Weekly Hits: ⮙2 | Monthly Hits: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 4, April 2021

Pages: 1292 - 1297

Supply Chain Using Blockchain (Healthcare Industry)

Prof. Mangesh G. Ingale, Shyam Jamman Parmeshwar, Yash G. Purohit, Divyani Sable, Vishaksha Kachane

Share this Article

Downloads: 108 | Weekly Hits: ⮙2 | Monthly Hits: ⮙10

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2750 - 2752

Secrecy Preserving Public Ascertaining for Cloud Storage Using Digital Signature

Rekha A, Padmashree G

Share this Article

Downloads: 109 | Weekly Hits: ⮙1 | Monthly Hits: ⮙12

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016

Pages: 1093 - 1096

Integrity Auditing for Dynamic Cloud Using Homomorphic Encryption with Group User Revocation

Madhuri. P, Jayavarthini. C

Share this Article

Downloads: 110 | Weekly Hits: ⮙3 | Monthly Hits: ⮙14

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1122 - 1125

Improving Security of Traceable White-Box CPABE with TTP Access Control

Dilu Anil

Share this Article

Downloads: 187 | Weekly Hits: ⮙2 | Monthly Hits: ⮙8

Review Papers, Computer Science & Engineering, India, Volume 6 Issue 4, April 2017

Pages: 8 - 10

Various Authentication Techniques for Trustworthy Pervasive Social Networking

Bhagyashri Mitkari, Dr. Khan Rahat Afreen

Share this Article

Similar Articles with Keyword 'public auditor'

Downloads: 110 | Weekly Hits: ⮙6 | Monthly Hits: ⮙15

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2124 - 2127

A Review on Privacy-Conserving Public Auditing for Shared Data in Cloud Computing, with a Focus on User Revocation

Mahesh Shinde, Y.B.Gurav

Share this Article

Downloads: 110 | Weekly Hits: ⮙3 | Monthly Hits: ⮙14

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1122 - 1125

Improving Security of Traceable White-Box CPABE with TTP Access Control

Dilu Anil

Share this Article

Similar Articles with Keyword 'malicious user'

Downloads: 107 | Monthly Hits: ⮙9

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 984 - 986

Survey for Detecting Malicious user using Trust Evaluation and User Correlation for Protecting Online Reputation Systems

Vrushali G. Chabilwad, A. D. Gujar

Share this Article

Downloads: 108 | Monthly Hits: ⮙6

Informative Article, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 1548 - 1550

Joint Task Migration and Power Management in Wireless Computing

Dayanand G Savakar, Anand S Ghuli

Share this Article

Downloads: 109 | Monthly Hits: ⮙8

Survey Paper, Computer Science & Engineering, India, Volume 6 Issue 9, September 2017

Pages: 1588 - 1590

Highly Secure and Flexible Authentication Scheme for Ad hoc Wireless Sensor Networks

Apurva J. Shastri, S. R. Tandle

Share this Article

Downloads: 110 | Weekly Hits: ⮙3 | Monthly Hits: ⮙14

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1122 - 1125

Improving Security of Traceable White-Box CPABE with TTP Access Control

Dilu Anil

Share this Article

Downloads: 110 | Weekly Hits: ⮙3

Informative Article, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 1551 - 1554

Implementation of Encryption and Decryption Technique

Dayanand G Savakar, Anand S Ghuli

Share this Article



Top