Efficient Identity-based Encryption used in Cloud Computing
Author(s):
Priyanka M. Narwade , STES’s Smt. Kashibai Navale College Of Engineering, Pune, Maharashtra.
Keywords:
Cloud computing, identity-based encryption, outsourcing, public key encryption, revocation
Abstract:
In public key encryption every user must have a pair of keys, public key and private key, for encrypting and decrypting messages. An Identity-based encryption (IBE) eliminates the need for a Public Key Infrastructure (PKI). IBE uses the human intelligible identities (e.g., unique name, email address, IP address, etc) as public keys. The sender using IBE encrypts message with the receivers’ identity rather than looking for receivers’ public key and corresponding certificate. Accordingly, receiver decrypts ciphertext using private key associated with the corresponding identity. The private keys of users are obtained from a trusted third party called as Private Key Generator (PKG). The motivation of this paper is to study and review an efficient and secure Identity based encryption scheme with outsourced revocation for cloud computing.
Other Details:
Manuscript Id | : | IJSTEV3I5117
|
Published in | : | Volume : 3, Issue : 5
|
Publication Date | : | 01/12/2016
|
Page(s) | : | 169-172
|
Download Article