Pavani Gottimukkala, E. Raveendra Reddy


We present ingenious recovery of understanding by way of CE for decentralized disruption-tolerant systems were introduced where numerous key government physiques control their attributes individually. The suggested technique of key generation made up of personal key generation adopted by protocols of attribute key generation it exploits arithmetic secure two-party computation procedure to get rid of key escrow difficulty by which nobody of presidency physiques can conclude whole crucial aspects of users individually. Attribute-basis system of file encryption assists an access control above encrypted information by way of access policies among cipher-texts. We've broaden a disparity within the CE formula partly according to Beth escort et al.’s building to improve expressiveness of access control policy as opposed to construction in the novel CE system on your own. The confidentiality of understanding is cryptographically forced against interested key government physiques inside the forecasted plan. Setback of key escrow is intrinsic to make sure that key authority decrypts each cipher-text that's addressed to users in system by way of generating their secret keys at any instance and additionally the issue was resolved to make certain that privacy of stored facts are assured still underneath the hostile atmosphere where key government physiques very might be not completely reliable.


Attribute-Based Encryption; Disruption-Tolerant Networks; Key Escrow; Cryptographic;


C. K.Wong,M. Gouda, and S. S. Lam, “Secure group communications using key graphs,” in Proc. ACM SIGCOMM, 1998, pp. 68–79.

V.Goyal, A. Jain,O. Pandey, andA. Sahai, “Bounded ciphertext policy attribute-based encryption,” in Proc. ICALP, 2008, pp. 579–591.

M. Chase and S. S. M. Chow, “Improving privacy and security inmultiauthority attribute-based encryption,” in Proc. ACM Conf. Comput. Commun. Security, 2009, pp. 121–130.

M.Belenkiy, J. Camenisch, M. Chase, M. Kohlweiss,A.Hysyanskaya,and H. Shacham, “Randomizable proofs and delegatable anonymous credentials,” in Proc. Crypto, LNCS 5677, pp. 108–125.

D. Naor, M. Naor, and J. Lotspiech, “Revocation and tracing schemes for stateless receivers,” in Proc. CRYPTO, 2001, LNCS 2139, pp. 41–62.

X. Liang, Z. Cao, H. Lin, and D. Xing, “Provably secure and efficient bounded ciphertext policy attribute based encryption,” in Proc. ASIACCS, 2009, pp. 343–352.

Full Text: PDF


  • There are currently no refbacks.

Copyright © 2012 - 2021, All rights reserved.|

Creative Commons License
International Journal of Innovative Technology and Research is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJITR , Permissions beyond the scope of this license may be available at