International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Since Year 2012 | Open Access | Double Blind Reviewed

ISSN: 2319-7064




Downloads: 130

M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 5 Issue 5, May 2016


An Efficiently Subcontracted the Identity-Based Encryption for Revocation in Cloud Computing

Soujanya M A | Lalitha L A


Abstract: Identity-Based encoding (IBE) that simplifies the general public key and certificate management at Public Key Infrastructure (PKI) is a crucial different to public key encoding. However, one amongst the most potency drawbacks of IBE is that the overhead computation at non-public Key Generator (PKG) throughout user revocation. Economical revocation has been well studied in ancient PKI setting, however the cumbersome management of certificates is exactly the burden that IBE strives to alleviate. During this paper, aiming at grappling the essential issue of identity revocation, we have a tendency to introduce outsourcing computation into IBE for the primary time and propose a revocable IBE theme within the server-aided setting. Our theme offloads most of the key generation connected operations throughout key-issuing and key-update processes to a Key Update Cloud Service supplier, exploit solely a continuing range of straightforward operations for PKG and users to perform regionally. This goal is achieved by utilizing a completely unique collusion-resistant technique we have a tendency to use a hybrid non-public key for every user, within which Associate in Nursing AND gate is concerned to attach and sure the identity part and therefore the time part. What is more, we have a tendency to propose another construction that is obvious secure underneath the recently formulized Refereed Delegation of Computation model. Finally, we offer intensive experimental results to demonstrate the potency of our planned construction.


Keywords: Identity-Based encoding, Public Key Infrastructure, public key, identity revocation and Cloud Service Provider


Edition: Volume 5 Issue 5, May 2016,


Pages: 514 - 520


How to Cite this Article?

Soujanya M A, Lalitha L A, "An Efficiently Subcontracted the Identity-Based Encryption for Revocation in Cloud Computing", International Journal of Science and Research (IJSR), Volume 5 Issue 5, May 2016, pp. 514-520, https://www.ijsr.net/get_abstract.php?paper_id=NOV163317

How to Share this Article?

Enter Your Email Address




Similar Articles with Keyword 'Public Key Infrastructure'

Downloads: 112

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1419 - 1424

Detection of Node Replication Attack in MSN Based On PKI

Hemlata B Kadam | Rahul Kulkarni [4]

Share this Article

Downloads: 116

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 3, March 2014

Pages: 597 - 601

A Novel Anonymous and Certificate Less Public Key Infrastructure for MANETs

G. Anandhi [3] | S. K. Srivatsa [4]

Share this Article


Top