CFP last date
20 December 2024
Reseach Article

Attribute based Encryption and Decryption Technique

by P. Jyothi, D. Raghavaraju, S. Vasundara
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 132 - Number 5
Year of Publication: 2015
Authors: P. Jyothi, D. Raghavaraju, S. Vasundara
10.5120/ijca2015907369

P. Jyothi, D. Raghavaraju, S. Vasundara . Attribute based Encryption and Decryption Technique. International Journal of Computer Applications. 132, 5 ( December 2015), 40-42. DOI=10.5120/ijca2015907369

@article{ 10.5120/ijca2015907369,
author = { P. Jyothi, D. Raghavaraju, S. Vasundara },
title = { Attribute based Encryption and Decryption Technique },
journal = { International Journal of Computer Applications },
issue_date = { December 2015 },
volume = { 132 },
number = { 5 },
month = { December },
year = { 2015 },
issn = { 0975-8887 },
pages = { 40-42 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume132/number5/23594-2015907369/ },
doi = { 10.5120/ijca2015907369 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:28:23.521858+05:30
%A P. Jyothi
%A D. Raghavaraju
%A S. Vasundara
%T Attribute based Encryption and Decryption Technique
%J International Journal of Computer Applications
%@ 0975-8887
%V 132
%N 5
%P 40-42
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Inside a dispersed foriegn atmosphere, anyone receives a untrusted company which has a change for better crucial allowing this foriegn to turn any kind of ABE ciphertext fulfilled through the wearer's features. Stability of ABE technique with outsourced decryption makes certain that a foe (including any destructive cloud) aren't going to be capable to study everything about the encrypted meaning. Anyway, this product doesn't ensure this correctness with the change for better completed through the foriegn. Verifiability ensures if thez change for better offers transpired appropriately or maybe certainly not. With this paper, it all recommend a improvised version of ABE with verifiability. A new concrete scheme pertaining to ABE with verifiable outsourced decryption can be recommended which is both safe along with verifiable without having based after hit-or-miss oracles.

References
  1. Junzuo Lai, Robert H. Deng, Chaowen Guan, and JianWeng,"Attribute-Based Encryption With VerifiableOutsourcedDecryption",IEEETRANSACTIONS ON INFORMATIONFORENSICSANDSECURITY, VOL. 8, NO. 8, AUGUST 2013 1343.
  2. A. B. Lewko, T. Okamoto, A. Sahai, K. Takashima, and B. Waters,“Fully secure functional encryption: Attribute-based encryption and(hierarchical) inner product encryption,” in Proc. EUROCRYPT, 2010, pp. 62–91.
  3. M. Green, S. Hohenberger, and B.Waters, “Outsourcing thedecryption of ABE ciphertexts,” in Proc. USENIX Security Symp.,San Francisco, CA, USA, 2011.
  4. C. Dwork, “Differential Privacy: A Survey of Results,” Proc. FifthInt’l Conf. Theory and Applications of Models of Computation (TAMC),pp. 1-19, 2008.
  5. M. Green, A. Akinyele, and M. Rushanan, Libfenc: The FunctionalEncryption Library
  6. M. Bellare, A. Boldyreva, and A. Palacio, “An uninstantiablerandomoracle- model scheme for a hybrid-encryption problem,” in Proc. EUROCRYPT, 2004, pp. 171–188.
Index Terms

Computer Science
Information Sciences

Keywords

ABE CP-ABE Verifiable C-ABE Concrete ABE.