M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 5 Issue 5, May 2016
An Efficiently Subcontracted the Identity-Based Encryption for Revocation in Cloud Computing
Soujanya M A | Lalitha L A
Abstract: Identity-Based encoding (IBE) that simplifies the general public key and certificate management at Public Key Infrastructure (PKI) is a crucial different to public key encoding. However, one amongst the most potency drawbacks of IBE is that the overhead computation at non-public Key Generator (PKG) throughout user revocation. Economical revocation has been well studied in ancient PKI setting, however the cumbersome management of certificates is exactly the burden that IBE strives to alleviate. During this paper, aiming at grappling the essential issue of identity revocation, we have a tendency to introduce outsourcing computation into IBE for the primary time and propose a revocable IBE theme within the server-aided setting. Our theme offloads most of the key generation connected operations throughout key-issuing and key-update processes to a Key Update Cloud Service supplier, exploit solely a continuing range of straightforward operations for PKG and users to perform regionally. This goal is achieved by utilizing a completely unique collusion-resistant technique we have a tendency to use a hybrid non-public key for every user, within which Associate in Nursing AND gate is concerned to attach and sure the identity part and therefore the time part. What is more, we have a tendency to propose another construction that is obvious secure underneath the recently formulized Refereed Delegation of Computation model. Finally, we offer intensive experimental results to demonstrate the potency of our planned construction.
Keywords: Identity-Based encoding, Public Key Infrastructure, public key, identity revocation and Cloud Service Provider
Edition: Volume 5 Issue 5, May 2016,
Pages: 514 - 520
How to Cite this Article?
Soujanya M A, Lalitha L A, "An Efficiently Subcontracted the Identity-Based Encryption for Revocation in Cloud Computing", International Journal of Science and Research (IJSR), Volume 5 Issue 5, May 2016, pp. 514-520, https://www.ijsr.net/get_abstract.php?paper_id=NOV163317
How to Share this Article?
Similar Articles with Keyword 'Public Key Infrastructure'
Detection of Node Replication Attack in MSN Based On PKI
Hemlata B Kadam | Rahul Kulkarni 
A Novel Anonymous and Certificate Less Public Key Infrastructure for MANETs