Secure Data Retrieval using Cipher Text Policy-Attribute Based Encryption in Hybrid Networks

Authors

  • G.L. Pavani Dept. of CNIS, G. Narayanamma Institute of Technology and Sciences, Hyderabad, India
  • Ch. Ramesh Dept. of CNIS, G. Narayanamma Institute of Technology and Sciences, Hyderabad, India

Keywords:

Broadcast encryption, Braid groups, Asymmetric group key Agreement, Contributory Broadcast Encryption, Provable Security

Abstract

Encrypted information of broadcast is the scheme that a sender encrypts messages for a designated group of receivers, and sends the cipher texts by broadcast over the networks. Many research papers have done it using elliptic curve cryptography. In this paper, we propose the broadcast encryption scheme based on braid groups cryptography which is an alternative method in the public key cryptography and can reduce the computational cost. Here new ancient, a gathering of individuals arrange a typical open encryption key while every part holds an unscrambling key. A sender seeing people in general gathering encryption key can confine the unscrambling to a subset of individuals from his decision. We present a new BE scheme that is aggregately. The aggregatability property is shown to be useful to construct advanced protocols.

 

References

Qianhong Wu, Member, IEEE, Bo Qin, Lei Zhang, Member, IEEE, Josep Domingo-Ferrer, Fellow, IEEE Oriol Farr`as, and Jes´us A. Manj´on, “Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts”, IEEE Transactions On Computers, Vol. Xxx, No. Xxx, Xxx 2015.

A. Fiat and M. Naor, “Broadcast Encryption,” in Proc. Crypto 1993, 1993, vol. LNCS 773, Lecture Notes in Computer Science, pp. 480-491.

I. Ingemarsson, D.T. Tang and C.K. Wong, “A Conference Key Distribution System,” IEEE Transactions on Information Theory, vol. 28, no. 5, pp. 714-720, 1982.

Q. Wu, Y. Mu, W. Susilo, B. Qin and J. Domingo-Ferrer, “Asymmetric Group Key Agreement,” in Proc. Eurocrypt 2009, 2009, vol. LNCS 5479, Lecture Notes in Computer Science, pp. 153-170.

http://en.wikipedia.org/wiki/PRISM surveillance program, 2014.

Q. Wu, B. Qin, L. Zhang, J. Domingo-Ferrer and O. Farr`as, “Bridging Broadcast Encryption and Group Key Agreement,” in Proc. Asiacrypt 2011, 2011, vol. LNCS 7073, Lecture Notes in Computer Science, pp. 143-160.

D. H. Phan, D. Pointcheval and M. Strefler, “Decentralized Dynamic Broadcast Encryption,” in Proc. SCN 2012, 2011, vol. LNCS 7485, Lecture Notes in Computer Science, pp. 166-183.

M. Steiner, G. Tsudik and M. Waidner, “Key Agreement in Dynamic Peer Groups,” IEEE Transactions on Parallel and Distributed Systems, vol. 11, no. 8, pp. 769-780, 2000.

A. Sherman and D. McGrew, “Key Establishment in Large Dynamic Groups Using One-way Function Trees,” IEEE Transactions on Software Engineering, vol. 29, no. 5, pp. 444-458, 2003.

Y. Kim, A. Perrig and G. Tsudik, “Tree-Based Group Key Agreement,” ACM Transactions on Information System Security, vol. 7, no. 1, pp. 60-96, 2004.

Y. Mao, Y. Sun, M. Wu and K.J.R. Liu, “JET: Dynamic Join-Exit-Tree Amortization and Scheduling for Contributory Key Management,” IEEE/ACM Transactions on Networking, vol. 14, no. 5, pp. 1128-1140, 2006.

W.-G. Tzeng, “A Secure Fault-Tolerant Conference-Key Agreement Protocol,” IEEE

Transactions on Computers, vol. 51, no.4, pp. 373- 379, 2002.

X. Yi, “Identity-Based Fault-Tolerant Conference Key Agreement,” IEEE Transactions Dependable Secure Computing vol. 1, no. 3, 170- 178, 2004.

M. Burmester and Y. Desmedt, “A Secure and Efficient Conference Key Distribution System,” in Proc. Eurocrypt 1994, 1994, vol. LNCS 950, Lecture Notes in Computer Science, pp. 275-286.

A. Joux, “A One Round Protocol for Tripartite Diffie-Hellman,” Journal of Cryptology, vol. 17, no. 4, pp. 263-276, 2004.

D. Boneh and A. Silverberg, “Applications of Multilinear Forms to Crytography,” Contemporary Mathematics, vol. 324, pp.71-90, 2003.

Downloads

Published

2017-08-30

How to Cite

[1]
G. Pavani and C. Ramesh, “Secure Data Retrieval using Cipher Text Policy-Attribute Based Encryption in Hybrid Networks”, Int. J. Sci. Res. Comp. Sci. Eng., vol. 5, no. 4, pp. 45–48, Aug. 2017.

Issue

Section

Research Article

Similar Articles

1 2 3 4 5 6 7 8 9 10 > >> 

You may also start an advanced similarity search for this article.