Amelioration of Decentralized Cipher Text Policy Attribute Based Encryption with Mediator technique by adding Salt
Main Article Content
Abstract
Downloads
Article Details
COPYRIGHT
Submission of a manuscript implies: that the work described has not been published before, that it is not under consideration for publication elsewhere; that if and when the manuscript is accepted for publication, the authors agree to automatic transfer of the copyright to the publisher.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work
- The journal allows the author(s) to retain publishing rights without restrictions.
- The journal allows the author(s) to hold the copyright without restrictions.
References
A. Sahai and B. Waters, “Fuzzy identity-based encryption,†in Advances in Cryptology (Lecture Notes in Computer Science), vol. 3494. Heidelberg, Germany: Springer-Verlag, 2005, pp. 457–473.
M. Chase and S. S. Chow, “Improving privacy and security in multiauthority attribute-based encryption,†in Proc. 16th ACM Conf. CCS, 2009, pp. 121–130.
M. Chase, “Multi-authority attribute based encryption,†in Theory of Cryptography 2007, (Lecture Notes in Computer Science), vol. 4392. Heidelberg, Germany: Springer-Verlag, pp. 515– 534.
A. Lewko and B. Waters, “Decentralizing attributebased encryption,†in Advances in Cryptology (Lecture Notes in Computer Science), vol. 6632. Heid.elberg, Germany: Springer-Verlag, 2011, pp. 568–588.
Varsha Thanaji Mulik, Shinu A, Suraj Rasal. [2016] Privacy Preserving Through Mediator in Decentralized Ciphertext policy Attribute Based Encryption, IJRET: International Journal of Research in Engineering and Technology, 05 ( 06) | June.
Varsha Thanaji Mulik, Shinu A, Suraj Rasal. [2016] A Survey on Improving Privacy and Security in Decentralized Cipher Text-Policy Attribute-Based Encryption, IJAECS: International Journal of Advances in Electronics and Computer Science, vol. 03 (05) | May.
D. Boneh and M. K. Franklin. Identity-based encryption from the Weil pairing. In CRYPTO, pages213–229, 2001
D. Boneh and X. Boyen. “Secure identity based encryption without random oraclesâ€. In CRYPTO, pages 443-459, 2004.
D. Boneh and X. Boyen. “Efficient selective-id secure identity based encryption without random oraclesâ€. In EUROCRYPT, pages 223 - 238, 2004.
Adi Shamir,‖Identity Based Cryptosystems and Signature schemes‖ Departments of applied mathematics, 1998.
A. Sahai and B. Waters, “Fuzzy identity-based encryption,†in Advances in Cryptology (Lecture Notes in Computer Science), vol. 3494. Heidelberg, Germany: Springer-Verlag, 2005, pp. 457–473.
J. Herranz, F. Laguillaumie, and C. Rà fols, “Constant size cipher texts in threshold attribute-based encryption,†in Public Key Cryptography (Lecture Notes in Computer Science), vol. 6056. Heidelberg, Germany: Springer-Verlag, 2010, pp. 19–34.
R.Ostrovsky, A. Sahai, and B. Waters, “Attribute based encryption with non-monotonic access structures,†in Proc. 14th ACM Conf. CCS, 2007, pp. 195–203.
V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-based encryption for fine-grained access control of encrypted data,†in Proc. 13th ACM Conf. CCS, 2006, pp. 89–98.
H. Lin, Z. Cao, X. Liang, and J. Shao, “Secure threshold multi authority attribute based encryption without a central authority,†in Progress in Cryptology (Lecture Notes in Computer Science), vol. 5365. Heidelberg, Germany: Springer-Verlag, 2008, pp. 426–436. 678 ieee transactions on information forensics and security, vol. 10, no. 3, march 2015.
Kan Yang, student member, ieee, and xiaohua jia, fellow, ieee. (july 2014). expressive, efficient, and revocable data access control for multi-authority cloud storage. ieee transactions on parallel and distributed systems. vol. 25, no. 7 (1), 1735-1744
J.Bethencourt, A. Sahai, and B. Waters, “Cipher text policy attribute based encryption,†in Proc. IEEE Symp. SP, May 2007, pp. 321–334.
H. Qian, J. Li, and Y. Zhang, “Privacy-preserving decentralized cipher text-policy attribute-based encryption with fully hidden access structure,†in Information and Communications Security (Lecture Notes in Computer Science), vol. 8233. Heidelberg, Germany: Springer-Verlag, 2013, pp. 363–372.
J. Han, W. Susilo, Y. Mu, and J. Yan, “Privacy preserving decentralized key-policy attribute based encryption,†IEEE Trans. Parallel Distrib. Syst., vol. 23, no. 11, pp. 2162, Nov. 2012.
Jinguang han, member, ieee, willy susilo, senior member, ieee, yi mu, senior member, ieee, jianying zhou, and man ho allen au, member, ieee. (march 2015). improving privacy and security in decentralized ciphertext-policy attribute-based
encryption. ieee transactions on information forensics and security. vol. 10, no. 3 (1), 665-678.
Suraj Rasal, Karan Saxena ,Sanya Relan. (2016/5). OTP Processing using UABE & DABE with Session Management. International Journal of Advanced Research in Computer Science and Software Engineering. 6 (5), 57-59.
Varsha S Rasal, Suraj U Rasal, Shraddha T Shelar. (2016/10). ENHANCING PRIVACY AND SECURITY THROUGH MEDIATOR USING DCP-ABE WITH OTP. IIOAB-Institute of Integrative Omics and Applied Biotechnology . 7 (1), 277-283.