UNDETERMINED CIPHER LANGUAGE PROGRAMMING AND IMPLEMENTATION OF ITS APPLICATION

Chintala Jyothsna, D. Venkateshwarlu

Abstract


We advise impressive anti-collusion circuit clubpenguin-abe construction within this paper because clubpenguin-abe is conceptually nearer to sensational standard get entry to with-holding methods. There are two complementary types of attribute-based file encryption. Powerful first is key-policy attribute-based file encryption, and yet another is ciphertext-policy attribute-based file encryption. Additionally, guess that melodramatic symmetric cipher is 128-bit. Sudden bandwidth from spectacular transmitted ciphertext for that data owner grows using impressive increase from electrifying depths of circuit. For delegation computation, suspenseful servers could be employed to handle and calculate numerous data based on impressive user’s demands. As tense untrusted cloud servers who are able to translate suspenseful initial ciphertext right into a simple you could learn nothing concerning histrionic plaintext in electrifying delegation. Electrifying expense from melodramatic computation and communication consumption reveals that powerful plan is sensible within tense cloud-computing. thus, we're able to put it on make sure spectacular data confidentiality, electrifying fine grained get right of entry to self-discipline and likewise electrifying verifiable delegation in cloud. Throughout tense delegation increasing, a person could validate if sudden cloud server responds a proper transformed ciphertext to assist him/her decrypt electrifying ciphertext immediately and properly. Since insurance policy for general circuits enables to offer suspenseful most powerful type of inlet keep an eye on, a building for realizing circuit ciphertext-policy attribute-based hybrid file encryption with verifiable delegation continues to be considered within our work. In this system, coupled with verifiable computation and secure-then-mac mechanism, tense information confidentiality, sudden rare get admission to hinder and likewise tense decorousness from impressive indirect accruing answers are completely approved collectively.


Keywords


Circuits; Cipher text-policy attribute-based encryption; verifiable delegation; multilinker map; hybrid encryption;

References


M. Green, S. Hohenberger, and B. Waters, “Outsourcing the decryption of ABE Ciphertexts,” in Proc. USENIX Security Symp., San Francisco, CA, USA, 2011, p. 34.

J. Lai, R. H. Deng, C. Guan, and J. Weng, “Attribute-based encryption with verifiable outsourced decryption,” IEEE Trans. Inf. Forensics Secur., vol. 8, no. 8, pp. 1343–1354, Aug. 2013.

S. Garg, C. Gentry, S. Halevi, A. Sahai, and B. Waters, “Attributebased encryption for circuits from multilinear maps,” in Proc. 33rd Int. Cryptol. Conf., 2013, pp. 479–499.

S. Gorbunov, V. Vaikuntanathan, and H. Wee, “Attribute-based encryption for circuits,” in Proc. 45th Annu. ACM Symp. Theory Comput., 2013, pp. 545–554.

R. Cramer and V. Shoup, “Design and analysis of practical publickey encryption schemes secure against adaptive chosen ciphertext attack,” SIAM J. Comput., vol. 33, no. 1, pp. 167–226, 2004.

D. Hofheinz and E. Kiltz R, “Secure hybrid encryption from weakened key encapsulation,” in Proc. 27th Int. Cryptol. Conf., 2007, pp. 553–571.


Full Text: PDF

Refbacks

  • There are currently no refbacks.




Copyright © 2012 - 2021, All rights reserved.| ijitr.com

Creative Commons License
International Journal of Innovative Technology and Research is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJITR , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.