International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 130 | Views: 201

M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 5 Issue 5, May 2016


An Efficiently Subcontracted the Identity-Based Encryption for Revocation in Cloud Computing

Soujanya M A | Lalitha L A


Abstract: Identity-Based encoding (IBE) that simplifies the general public key and certificate management at Public Key Infrastructure (PKI) is a crucial different to public key encoding. However, one amongst the most potency drawbacks of IBE is that the overhead computation at non-public Key Generator (PKG) throughout user revocation. Economical revocation has been well studied in ancient PKI setting, however the cumbersome management of certificates is exactly the burden that IBE strives to alleviate. During this paper, aiming at grappling the essential issue of identity revocation, we have a tendency to introduce outsourcing computation into IBE for the primary time and propose a revocable IBE theme within the server-aided setting. Our theme offloads most of the key generation connected operations throughout key-issuing and key-update processes to a Key Update Cloud Service supplier, exploit solely a continuing range of straightforward operations for PKG and users to perform regionally. This goal is achieved by utilizing a completely unique collusion-resistant technique we have a tendency to use a hybrid non-public key for every user, within which Associate in Nursing AND gate is concerned to attach and sure the identity part and therefore the time part. What is more, we have a tendency to propose another construction that is obvious secure underneath the recently formulized Refereed Delegation of Computation model. Finally, we offer intensive experimental results to demonstrate the potency of our planned construction.


Keywords: Identity-Based encoding, Public Key Infrastructure, public key, identity revocation and Cloud Service Provider


Edition: Volume 5 Issue 5, May 2016,


Pages: 514 - 520


How to Download this Article?

Type Your Valid Email Address below to Receive the Article PDF Link


Verification Code will appear in 2 Seconds ... Wait

Top