Ciphertext Policy Attribute Based Access Control For Multiauthority Systems

Ms.Sneha Sanjay Pardeshi, Ms.Bharti Dhote

Abstract


In the most CP-ABE scheme public keys and private keys are issued by single authority in which security can be easily broken if the authority is hacked by hacker.In these system cost
and size of encryption and decryption is depend on the number
of attributes used for encryption and decryption.So if attributes
increased size also increased.There are some multi-authority
CP-ABE scheme in which the authorities need not interact
to generate public information during the system initialization
phase. Besides, the multi-authority ABE eliminates the key
escrow problem, achieves the length of ciphertext optimization
and enhances efficiency of encryption and decryption.We propose
a Ciphertext Policy Attribute Based Access Control Scheme for
multiauthority system.In our system we are going to propose
a system which contains an encryption and decryption process
by using multiple attributes and also we will use attribute
revocation process at each clients as well as server with a multiple
authorities.This multiauthority ABE eliminates the key escrow
problem, achieves the length of ciphertext optimization and
enhances the efficiency of encryption and decryption operations.

Full Text:

PDF

References


Goyal V, Pandey O, Sahai A, et al. Attribute-based encryption for

fine-grained access control of encrypted data, Proc. Thirteenth ACM

Conference on Computer and Communications Security, pp. 89-98, 2006.

ethencourt J, Sahai A, and Waters B, Ciphertextpolicy attribute-based

encryption, Proc. IEEE Symp. Security and Privacy (SP07), pp. 321-334,

May. 2007, doi:10.1109/SP.2007.11.

Waters B, Ciphertext-policy attribute-based encryption: An expressive,

effcient, and provably secure realization, Public Key Cryptography Fourteenth International Conference on Practice and Theory in Public Key

Cryptography, D. Catalano, N. Fazio, R. Gennaro and A. Nicolosi, eds.,

Lecture Notes in Computer Science F6571, International Association for

Cryptologic Research, pp. 53-70 2011.

Emura K, Miyaji A, and Nomura A, A ciphertextpolicy attribute-based

encryption scheme with constant ciphertext length, Information Security

Practice and ExperienceFifth International Conference, F. Bao, H. Li

and G. Wang, eds., Lecture Notes in Computer Science F5451, Berlin:

Springer-Heidelberg, pp. 13-23, 2009.

Herranz J, Laguillaumie F, and Rfols C, Constant size ciphertexts in

threshold attributebased encryption, Public Key Cryptography Thirteenth

International Conference on Practice and Theory in Public Key Cryptography, P.Q. Nguyen and D. Pointcheval, eds., Lecture Notes in Computer

Science F6056, International Association for Cryptologic Research, pp.

-34 2010.

Attrapadung N, Libert B, and Panafieu E.D, Expressive key-policy

attribute-based encryption with constant-size ciphertexts, Public Key Cr

yptographyFourteenth International Conference on Practice and Theory

in Public Key Cryptography, D. Catalano, N. Fazio, R. Gennaro and A.

Nicolosi, eds., Lecture Notes in Computer Science F6571, International

Association for Cryptologic Research, pp. 90-108 201

Chen Cheng, Zhang Zhenfeng, and Feng Dengguo, Efficient ciphertext

policy attributebased encryption with constant-size ciphertext and constant computation-cost, Provable SecurityFifth International Conference,

X. Boyen, and X. Chen, eds., Lecture Notes in Computer Science F6980,

GmbH Berlin: Springer-Verlag, pp. 84-101 2011.

Cheung Land Newport C, Provably secure ciphertext policy ABE,

Proc. Fourteenth ACM Conference on Computer and Communications

Security(CCS007),pp-465,2007 doi:10.1145/1315245.1315302.

Doshi N and Jinwala D, Constant Ciphertext Length in CP-ABE, IACR

Cryptology ePrint Archive, 2012, 2012: 500.

Ge Aijun, Zhang Rui, and Chen Cheng, Threshold ciphertext policy

attribute-based encryption with constant size ciphertexts,Information Security and PrivacySeventeenth Australasian Conference, pp. 336-349,

, doi:10.1007/978- 3-642-31448-3 25.

Attrapadung N, Herranz J, and Laguillaumie F, Attribute-based encryption schemes with constant-size ciphertexts, Theoretical computer science,

vol. 422, pp. 15-38, Mar. 2012.

Chase M, Multi-authority attribute based encryption, Theory of CryptographyFourth Theory of Cryptography Conference, S.P. Vadhan, eds.,

Lecture Notes in Computer Science F4392, Berlin: Springer-Verlag, pp.

-534 2007.

Lin Huang, Cao Zhenfu, Liang Xiaohui, and et al. Secure threshold

multi authority attribute based encryption without a central authority,

Information Sciences, vol. 180, no. 13, pp. 2618- 2632, July. 2010.

Yu Shucheng, Wang Cong, Ren Kui and et al. Attribute based data

sharing with attribute revocation, P ro c . F i f th Symposium on

Information, Computer and Communications Security (ASIACCS 10),

pp. 261-270, 2009, doi:10.1145/1755688.1755720.

Jahid S, Mittal P, and Borisov N, Easier : Encryption-based access

control in social networks with efficient revocation Proc. Sixth ACM

Symposium on Information, Computer and Communications Security

(ASIACCS 11), pp. 411- 415, 2011, doi:10.1145/1966913.1966970.

Hur J and Noh D.K, Attribute-based access control with efficient

revocation in data outsourcing systems, IEEE Trans. Parallel and

Distributed Systems, vol. 22, no. 7, pp. 1214- 1221, July 2011,

doi:10.1109/TPDS.2010.203.


Refbacks

  • There are currently no refbacks.


 

Copyright © IJETT, International Journal on Emerging Trends in Technology