ABSTRACT BASED CRYPTOGRAPHY
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 30, Vol 4, Issue 7
Abstract
The issues of confidentiality, authenticity and anonymity have been known from long time in Security i.e. Cryptography , and the idea of provable security is the basic foundation for most, if not all, latest cryptographic research. With highly advance and improved technology, there is also a need to define these methods of security under various approaches. One such current approach of security is the attribute based view that has been established by the requirements in a distributed setting. Attribute based encryption and signature concept have been developed in order to give a more better grained access control. Currently attribute-based method have large area applicability in a number of new decentralized settings and address some already exciting problems. In this thesis we studied an efficient attribute-based encryption(ABE) method , with support for multi-level threshold predicates. We also discuss regarding the security of some attribute-based signature(ABS) schemes and give the implementation for a threshold ABS method based on a novel approach. In this paper we first look at ABE. Anonymous access control is a highly required property in various applications, e.g. encrypted data in distributed Systems; and attribute based encryption method is a cryptographic methods that is targeted to achieve this property. ABE is an encryption mechanism that is helpful in settings where the list of users may not be known apriority. Here, all users may possess some credentials, and these are used to know access control and also give a reasonable degree of anonymity with respect to the user’s identity. Cipher text policy attribute based encryption is a scheme that gives a natural way to separate the credentials from the access policy and cleverly combine them at a later stage to provide secure access to protected data. In most ABE schemes the size of the cipher text is quite large and is of the order of the number of attributes. In this work we present our approach for a multilevel threshold attribute based encryption which is independent of the number of attributes.
Authors and Affiliations
Arun Kumar*,
Testing of Randomness of the Number Generated by Fisher and Yates
Proper randomness of the numbers generated by Fisher and Yates has been examined by Chakrabarty in2010 by computing the probability of occurrence of each digit in the table of generated numbers and then applying t...
MODELING OF PHOTOVOLTAIC MODULE USING BUCK-BOOST CONVERTER WITH PWM CONTROLLING
Our aim is to increase the efficiency and get the maximum power from the pv system. It is also required that constant voltage be supplied to the load irrespective of the variation in solar irradiance and temperatu...
- Dichotomy for Linear Dynamic Systems on Time Scales
The intent of this paper is to develop some explicit sufficient criteria for the existence and roughness of exponential Ψ-dichotomies of linear dynamic system of the form x(t)=A(t)x(t) on time scales. It is more inter...
Teaching Writing Skills for Engineering Students
This research paper focuses on the writing skills of the Engineering students of all the branches especially at the time of placements. Writing in English is almost a prerequisite for the job. Now- a-days testing...
SPATIAL IDENTIFICATION AND CLASSIFICATION OF SOIL EROSION PRONE ZONES USING REMOTE SENSING & GIS INTEGRATED ‘RUSLE’ MODEL AND ‘SATEEC GIS SYSTEM’
Soil erosion by water is pronounced critical problem in Himalayan regions due to anthropogenic pressure on its mountainous landscape. Its assessment and mapping of erosion prone areas are very essential for soil co...