Call for Paper - May 2023 Edition
IJCA solicits original research papers for the May 2023 Edition. Last date of manuscript submission is April 20, 2023. Read More

Improving Revocation Scheme to Enhance the Performance in Multi-Authority ABE

Print
PDF
International Journal of Computer Applications
© 2014 by IJCA Journal
Volume 90 - Number 18
Year of Publication: 2014
Authors:
Shraddha U. Rasal
Bharat Tidke
10.5120/15818-4542

Shraddha U Rasal and Bharat Tidke. Article: Improving Revocation Scheme to Enhance the Performance in Multi-Authority ABE. International Journal of Computer Applications 90(18):5-10, March 2014. Full text available. BibTeX

@article{key:article,
	author = {Shraddha U. Rasal and Bharat Tidke},
	title = {Article: Improving Revocation Scheme to Enhance the Performance in Multi-Authority ABE},
	journal = {International Journal of Computer Applications},
	year = {2014},
	volume = {90},
	number = {18},
	pages = {5-10},
	month = {March},
	note = {Full text available}
}

Abstract

Traditional system in cryptography allows just sharing of keys between the sender and receiver, for such a technique only the signature storage is provided for the user's public key. But as the number of users increases, it's became a challenging job to have such a certificate storage as well as key distribution, to overcome this Identity Based Encryption (IBE) was proposed, but again it had created the time consuming environment as it was supporting only to one-to-one communication. After IBE Attribute Based encryption (ABE) made possibility to provide multicast communication between users but it was limited to only key policy based encryption as well as could not provide the revocation phenomenon for keys. So this paper aims to develop an existing system using MAMM (Multiple Authority Multiple Mediator) with the use of distributed CP-ABE (Cipher Policy ABE) which enhances the revocation and improves the performance.

References

  • Adi Shamir,"Identity Based Cryptosystems and Signature schemes" Departments of applied mathematics, 1998.
  • Alexandra Boldyreva,Vipul Goyal, "Identity- based Encryption with Efficient Revocation",2008.
  • D. Boneh and M. K Franklin, "Identity-based encryption from the weil pairing". CRYPTO, pages 213–229, 2001.
  • Sahai and B. Waters, "Fuzzy identity based encryption,"Advances in Cryptology Eu-rocrypt, LNCS, Springer, vol. 3494, pp. 457–473, 2005.
  • V. Miller, "Use of elliptic curves in cryptography". In H. Williams, editor, Advances in Cryptology— CRYPTO'85, volume 218 of Lecture Notes in Computer. Sci. , pages 417–428. Springer, 1986.
  • Antoine Joux, "The Weil and Tate Pairings as BuildingBlocks for Public Key Cryptosystems". Computer Science, Edited by G. Goos, J. Hartmanis, and J. van Leeuwen.
  • Boneh, B. Lynn, and H. Shacham, "Short signatures from the Weil pairing". In C. Boyd, editor, Proceedings of ASIACRYPT'2001, volume 2248 of Lecture Notes in Computer. Sci. , pages 514–532. Springer, 2001.
  • P. Barreto, H. Kim, B. Lynn, and M. Scott. Efficient algorithms for pairing based cryptosystems. Cryptology 2002. Number 2002/008.
  • G. Frey, M. Muller, and H. -G. Ruck, "The Tate pairing and the discrete logarithm applied to elliptic curve cryptosystems". IEEE Transactions on Information Theory, 45(5):1717–1718, 1999.
  • S. D. Galbraith, K. Harrison, and D. Soldera, "Implementing the Tate pairing". Springer-Verlag, 2002.
  • Piyi Yang, Zhenfu Cao and Xiaolei Dong, "Fuzzy identity based signature," 2008.
  • Allison Lewko and Brent Waters, "Decentralizing attribute-based encryption," K. G. Paterson (Ed. ): Eurocrypt 2011, LNCS, vol. 6632, pp. 568–588, 2011.
  • Chase, M. : "Multi-authority attribute-based encryption". The Fourth Theory Of cryptography Conference (TCC 2007), LNCS. 4392, 513{534 (2007).
  • Waters, B. : "Cipher-text policy attribute based encryption an expressive, Efficient, and provably secure realization". PKC 2011, LNCS, Springer Heidelberg. 6571, (2011).
  • Luan, I. , Milan, P. , Svetla, N. , Pieter, H. , Willem, J. : Mediated cipher-text Policy attribute-based encryption and its application. WISA 2009, LNCS, Springers, Ver- lag. 5932, 309{323 (2009).
  • Pirretti, M. , Traynor, P, McDaniel, P, Waters, B. : "Secure attribute-based Systems". ACM CCS'06. 6377, 111{118 (2006).
  • Shucheng, Yu, Cong Wang, Kui, R. , and Wenjing, Lou: "Attribute based data Sharing with attribute revocation". ASIACCS10. (2010).
  • Alexandra, B. , Vipul, G. , Virendra, K. : "Identity-basedencryption with Efficient revocation". CCS. (2008).
  • Melissa chase "Multi-authority Attribute Based Encryption", Computer Science Department Brown University Providence, RI 02912.
  • V. Goyal, O. Pandey, A. Sahai, B. Waters, "Attribute based encryption for fine Grained access control of encrypted data. " ACM Conference on Computer and Communications Security, pp. 88–98, 2006.
  • Bethencourt John, Sahai Amit, Waters Brent, "Ciphertext-policy attribute- Based encryption," IEEE Symposium on Security and Privacy, pp. 321–334, 2007.
  • Sonia Jahid, Prateek Mittal, Nikita Borisov, "Easier: Encryption-based access Control in social networks with efficient revocation," ASIACCS11, March 2011.
  • Riddhi mankad, Devesh Jinwala "Investigating multi authority attribute-based Encryption with revocation", NIT Surat, 2012.
  • M. Bellare and P. Rogaway. Random oracles are practical: A paradigm for Designing efficient protocols. In ACM conference on Computer and Communications Security (ACM CCS), pages 62{73, 1993.
  • Vipul Goyal," Reducing Trust in the PKG in Identity Based Cryptosystems" Department of Computer Science, University of California, Los Angeles, CRYPTO 2007, LNCS 4622, pp. 430–447, 2007.
  • Sascha M¨uller, Stefan Katzenbeisser, "Distributed Attribute Based Encryption", P. J. Lee and J. H. Cheon (Eds. ): ICISC 2008, LNCS 5461, pp. 20–36, 2009. Springer-Verlag Berlin Heidelberg 2009.