SlideShare a Scribd company logo
1.
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6.
Off:0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602,
Project Titles: http://shakastech.weebly.com/2015-2016-titles
Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com
IDENTITY-BASED ENCRYPTION WITH OUTSOURCED REVOCATION IN CLOUD
COMPUTING
ABSTRACT
Identity-Based Encryption (IBE) which simplifies the public key and certificate
management at Public Key Infrastructure (PKI) is an important alternative to public key
encryption. However, one of the main efficiency drawbacks of IBE is the overhead computation
at Private Key Generator (PKG) during user revocation. Efficient revocation has been well
studied in traditional PKI setting, but the cumbersome management of certificates is precisely the
burden that IBE strives to alleviate. In this paper, aiming at tackling the critical issue of identity
revocation, we introduce outsourcing computation into IBE for the first time and propose a
revocable IBE scheme in the server-aided setting. Our scheme offloads most of the key
generation related operations during key-issuing and key-update processes to a Key Update
Cloud Service Provider, leaving only a constant number of simple operations for PKG and users
to perform locally. This goal is achieved by utilizing a novel collusion-resistant technique: we
employ a hybrid private key for each user, in which an AND gate is involved to connect and
bound the identity component and the time component. Furthermore, we propose another
construction which is provable secure under the recently formulized Refereed Delegation of
Computation model. Finally, we provide extensive experimental results to demonstrate the
efficiency of our proposed construction.
1.
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6.
Off:0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602,
Project Titles: http://shakastech.weebly.com/2015-2016-titles
Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com
EXISTING SYSTEM:
Introduced and firstly implemented by Boneh and Franklin as well , IBE has been
researched intensively in cryptographic community. On the aspect of construction, these first
schemes were proven secure in random oracle. Some subsequent systems achieved provable
secure in standard model under selective-ID security or adaptive-ID security. Recently, there
have been multiple lattice-based constructions for IBE systems. Nevertheless, concerning on
revocable IBE, there is little work presented. As mentioned before, Boneh and Franklin’s
suggestion is more a viable solution but impractical. Hanaoka et al proposed a way for users to
periodically renew their private keys without interacting with PKG. However, the assumption
required in their work is that each user needs to possess a tamper-resistant hardware device.
Another solution is mediator-aided revocation: In this setting there is a special semi-trusted third
party called a mediator who helps users to decrypt each ciphertext. If an identity is revoked then
the mediator is instructed to stop helping the user. Obviously, it is impractical since all users are
unable to decrypt on their own and they need to communicate with mediator for each decryption.
Recently, Lin et alproposed a space efficient revocable IBE mechanism from non-monotonic
Attribute-Based Encryption (ABE), but their construction requires times bilinear pairing
operations for a single decryption where is the number of revoked users. As far as we know, the
revocable IBE scheme presented by Boldyreva et al. remains the most effective solution right
now. Libert and Vergnaud improved Boldyreva’s construction to achieve adaptive-ID security.
Their work focused on security enhanced, but inherits the similar disadvantage as Boldyreva’s
original construction. As we mentioned before, they are short in storage for both private key at
user and binary tree structure at PKG.
1.
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6.
Off:0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602,
Project Titles: http://shakastech.weebly.com/2015-2016-titles
Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com
PROPOSED SYSTEM:
In this paper, we introduce outsourcing computation into IBE revocation, and formalize
the security definition of outsourced revocable IBE for the first time to the best of our
knowledge. We propose a scheme to offload all the keygeneration related operations during key-
issuing and keyupdate, leaving only a constant number of simple operations for PKG and eligible
users to perform locally. In our scheme, as with the suggestion, we realize revocation through
updating the private keys of the unrevoked users. But unlike that work which trivially
concatenates time period with identity for key generation/update and requires to re-issue the
whole private key for unrevoked users, we propose a novel collusion-resistant key issuing
technique: we employ a hybrid private key for each user, in which an AND gate is involved to
connect and bound two sub-components, namely the identity component and the time
component. At first, user is able to obtain the identity component and a default time component
(i.e., for current time period) from PKG as his/her private key in key-issuing. Afterwards, in
order to maintain decryptability, unrevoked users needs to periodically request on keyupdate for
time component to a newly introduced entity named Key Update Cloud Service Provider (KU-
CSP). Compared with the previous work , our scheme does not have to re-issue the whole private
keys, but just need to update a lightweight component of it at a specialized entity KU-CSP. We
also specify that 1) with the aid of KU-CSP, user needs not to contact with PKG in key-update,
in other words, PKGis allowed to be offline after sending the revocation list to KU-CSP. 2) No
secure channel or user authentication is required during key-update between user and KU-CSP.
Module 1
Identity-Based Encryption
1.
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6.
Off:0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602,
Project Titles: http://shakastech.weebly.com/2015-2016-titles
Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com
An IBE scheme which typically involves two entities, PKG and users (including sender
and receiver) is consisted of the following four algorithms. Setup : The setup algorithm takes as
input a security parameter and outputs the public key and the master key . Note that the master
key is kept secret at PKG. KeyGen : The private key generation algorithm is run by PKG, which
takes as input the master key and user’s identity . It returns a private key corresponding to the
identity . Encrypt : The encryption algorithm is run by sender, which takes as input the receiver’s
identity and a message to be encrypted. It outputs the ciphertext . Decrypt : The decryption
algorithm is run by receiver, which takes as input the ciphertext and his/her private key . It
returns a message or an error . An IBE scheme must satisfy the definition of consistency.
Specifically, when the private key generated by algorithm KeyGen when it is given as the input,
then Decrypt where Encrypt . The motivation of IBE is to simplify certificate management. For
example, when Alice sends an email to Bob at bob@company com, she simply encrypts her
message using Bob’s email address “bob@company com”, but does not need to obtain Bob’s
public key certificate. When Bob receives the encrypted email he authenticate himself at PKG to
obtain his private key, and read his email with such a private key.
Module 2
Efficient ibe with outsourced revocation
Intuition In order to achieve efficient revocation, we introduce the idea of “partial private
key update” into the proposed construction, which operates on two sides: 1) We utilize a “hybrid
private key” for each user in our system, which employs an AND gate connecting two sub-
components namely the identity component and the time component respectively. is generated
by PKG in key-issuing but is updated by the newly introduced KU-CSP in keyupdate; 2) In
encryption, we take as input user’s identity as well as the time period to restrict decryption, more
precisely, a user is allowed to perform successful decryption if and only if the identity and time
period embedded in his/her private key are identical to that associated with the ciphertext. Using
such skill, we are able to revoke user’s decryptability through updating the time component for
1.
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6.
Off:0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602,
Project Titles: http://shakastech.weebly.com/2015-2016-titles
Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com
private key by KU-CSP. Moreover, we remark that it cannot trivially utilize an identical updated
time component for all users because revoked user is able to re-construct his/her ability through
colluding with unrevoked users. To eliminate such collusion, we randomly generate an
outsourcing key for each identity , which essentially decides a “matching relationship” for the
two sub-components. Furthermore, we let KU-CSP maintain a list to record user’s identity and
its corresponding outsourcing key. In key-update, we can use to update the time component for
identity. Suppose a user with identity is revoked at . Even if he/she is able to obtain for identity ,
the revoked user still cannot decrypt ciphertext encrypted under .
Module 3
Key Service Procedures
Based on our algorithm construction, as shown in Fig. 4, the key service procedures
including key-issuing, key-update and revocation in proposed IBE scheme with outsourced
revocation work as follows. Key-issuing. We require that PKG maintains a revocation list and a
time list locally. Upon receiving a private key request on , PKG runs KeyGen to obtain private
key and outsourcing key . Finally, it sends to user and ( ) to KUCSP respectively. As described
in intuition, for each entry ( ) sent from PKG, KU-CSP should add it into a locally maintained
user list . Key-update. If some users have been revoked at time period , each unrevoked user
needs to send key-update request to KU-CSP to maintain decryptability. Upon receiving the
request on identity , KU-CSP runs KeyUpdate to obtain . Finally, it sends such time component
back to user who is able to update his/her private key as Revocation. Similar to key-update, if a
revoked user sends a key-update request on identity , KU-CSP runs KeyUpdate as well.
Nevertheless, since , KU-CSP will return . Therefore, such key-update request is aborted.
Module 4
Advanced Construction
1.
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6.
Off:0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602,
Project Titles: http://shakastech.weebly.com/2015-2016-titles
Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com
RDoC model originates from the model of refereed games , and is later formalized. In
RDoC model, the client is able to interact with multiple servers and it has a right output as long
as there exists one server that follows the proposed protocol. One of the most advantages of
RDoC over traditional model with single server is that the security risk on the single server is
reduced to multiple servers involved in. As the result of both the practicality and utility, RDoC
model recently has been widely utilized in the literature of outsourced computation. In order to
apply RDoC to our setting, we introduce another independent KU-CSPs. Furthermore, we have
three requirements in such model: 1) At least one of the KU-CSPs is honest. 2) Computational
complexity at the honest KU-CSP is not much more than the other required to perform
revocation. 3) PKG’s running time would be much smaller than required to directly perform
revocation.
CONCLUSION
In this paper, focusing on the critical issue of identity revocation, we introduce
outsourcing computation into IBE and propose a revocable scheme in which the revocation
operations are delegated to CSP. With the aid of KU-CSP, the proposed scheme is full-featured:
1) It achieves constant efficiency for both computation at PKG and private key size at user; 2)
User needs not to contact with PKG during keyupdate, in other words, PKG is allowed to be
offline after sending the revocation list to KU-CSP; 3)Nosecure channel or user authentication is
required during key-update between user and KU-CSP. Furthermore, we consider to realize
revocable IBE under a stronger adversary model. We present an advanced construction and show
it is secure underRDoCmodel, in which at least one of the KU-CSPs is assumed to be honest.
Therefore, even if a revoked user and either of the KU-CSPs collude, it is unable to help such
user re-obtain his/her decryptability. Finally, we provide extensive experimental results to
demonstrate the efficiency of our proposed construction.

More Related Content

PDF
iaetsd Robots in oil and gas refineries
DOCX
Identity based encryption with outsourced revocation in cloud computing
DOCX
IDENTITY-BASED ENCRYPTION WITH OUTSOURCED REVOCATION IN CLOUD COMPUTING
PDF
An Overview of Identity Based Encryption
DOCX
IDENTITY-BASED ENCRYPTION WITH OUTSOURCED REVOCATION IN CLOUD COMPUTING
PDF
Identity based encryption with cloud revocation authority and its applications
PDF
A Survey on Identity Based Encryption in Cloud Computing
DOCX
Identity based encryption with outsourced revocation in cloud computing
iaetsd Robots in oil and gas refineries
Identity based encryption with outsourced revocation in cloud computing
IDENTITY-BASED ENCRYPTION WITH OUTSOURCED REVOCATION IN CLOUD COMPUTING
An Overview of Identity Based Encryption
IDENTITY-BASED ENCRYPTION WITH OUTSOURCED REVOCATION IN CLOUD COMPUTING
Identity based encryption with cloud revocation authority and its applications
A Survey on Identity Based Encryption in Cloud Computing
Identity based encryption with outsourced revocation in cloud computing

What's hot (16)

PDF
Privacy Preserving Paradigms of Blockchain Technology
PDF
sweeney_brendan-css527-20141118-research_proposal
PDF
IRJET- Security Empowerment using QR Code and Session Tracking for Cued R...
PDF
Grid security seminar mohit modi
PDF
P8 a blockchain framework for insurance processes
PPTX
E voting authentication with qr-codes
PDF
Ijcnc050205
PPTX
Implementing MITREid - CIS 2014 Presentation
PDF
A Noval Method for Data Auditing and Integrity Checking in Public Cloud
PDF
B.Noviansyah - “National Public Key Infrastructure: Friend or Foe?"
PDF
REMOVAL OF CERTIFICATES FROM SET PROTOCOL USING CERTIFICATELESS PUBLIC KEY CR...
PPTX
Why Assertion-based Access Token is preferred to Handle-based one?
PDF
IRJET- Blockchain Technology for Agriculture Development
PDF
Flexible and fine grained attribute-based data storage in cloud computing
PPTX
Mit 2014 introduction to open id connect and o-auth 2
PDF
A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...
Privacy Preserving Paradigms of Blockchain Technology
sweeney_brendan-css527-20141118-research_proposal
IRJET- Security Empowerment using QR Code and Session Tracking for Cued R...
Grid security seminar mohit modi
P8 a blockchain framework for insurance processes
E voting authentication with qr-codes
Ijcnc050205
Implementing MITREid - CIS 2014 Presentation
A Noval Method for Data Auditing and Integrity Checking in Public Cloud
B.Noviansyah - “National Public Key Infrastructure: Friend or Foe?"
REMOVAL OF CERTIFICATES FROM SET PROTOCOL USING CERTIFICATELESS PUBLIC KEY CR...
Why Assertion-based Access Token is preferred to Handle-based one?
IRJET- Blockchain Technology for Agriculture Development
Flexible and fine grained attribute-based data storage in cloud computing
Mit 2014 introduction to open id connect and o-auth 2
A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...
Ad

Viewers also liked (16)

DOCX
Passive ip traceback disclosing the locations of ip spoofers from path backsc
PDF
Protecting location privacy in sensor networks against a global eavesdropper
DOCX
CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIB...
DOCX
Effective key management in dynamic wireless sensor networks
PDF
Privacypreservingdelegatedaccesscontrolinpublicclouds 141112073315-conversion...
DOCX
Privacy policy inference of user uploaded
DOCX
K nearest neighbor classification over semantically secure encrypted
DOCX
Entity linking with a knowledge baseissues, techniques, and solutions
DOCX
PANDA: PUBLIC AUDITING FOR SHARED DATA WITH EFFICIENT USER REVOCATION IN THE ...
DOCX
A profit maximization scheme with guaranteed quality of service in cloud comp...
DOC
Friendbook a semantic based friend recommendation system for social networks
DOCX
Key updating for leakage resiliency with application to aes modes of operation
DOCX
Circuit ciphertext policy attribute-based hybrid encryption with verifiable d...
PDF
Minimum bandwidth reservations for periodic streams in wireless real time sys...
DOC
PERFORMING INITIATIVE DATA PERFECTING IN DISTRIBUTED FILE SYSTEMS FOR CLOUD C...
DOCX
Behavior rule specification based ntrusion detection for safety critical medi...
Passive ip traceback disclosing the locations of ip spoofers from path backsc
Protecting location privacy in sensor networks against a global eavesdropper
CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIB...
Effective key management in dynamic wireless sensor networks
Privacypreservingdelegatedaccesscontrolinpublicclouds 141112073315-conversion...
Privacy policy inference of user uploaded
K nearest neighbor classification over semantically secure encrypted
Entity linking with a knowledge baseissues, techniques, and solutions
PANDA: PUBLIC AUDITING FOR SHARED DATA WITH EFFICIENT USER REVOCATION IN THE ...
A profit maximization scheme with guaranteed quality of service in cloud comp...
Friendbook a semantic based friend recommendation system for social networks
Key updating for leakage resiliency with application to aes modes of operation
Circuit ciphertext policy attribute-based hybrid encryption with verifiable d...
Minimum bandwidth reservations for periodic streams in wireless real time sys...
PERFORMING INITIATIVE DATA PERFECTING IN DISTRIBUTED FILE SYSTEMS FOR CLOUD C...
Behavior rule specification based ntrusion detection for safety critical medi...
Ad

Similar to Identity based encryption with outsourced revocation in cloud computing (20)

PDF
Identity based encryption with cloud revocation authority and its applications
PDF
Identity based encryption with outsourced revocation in cloud computing
PDF
Identity-Based Encryption with Outsourced Revocation in Cloud Computing
DOCX
Identity-Based Encryption with Outsourced Revocation in Cloud Computing
DOCX
Identity based encryption with outsourced
DOC
An efficient certificate less encryption for
PDF
Flexible and fine grained attribute-based data storage in cloud computing
PDF
Key aggregate cryptosystem for scalable data sharing in cloud storage
PDF
Efficient and Enhanced Proxy Re Encryption Algorithm for Skyline Queries
PDF
Identity based cryptography for client side security in web applications (web...
PDF
IRJET- Secure Data Sharing in Cloud Computing using Revocable Storage Identit...
PDF
A New Pairing Free ID Based Certificate Less Digital Signature (CL-DS) Scheme...
DOCX
Audit free cloud storage via deniable attribute-based encryption
DOCX
Audit free cloud storage via deniable attribute-based encryption
DOCX
Audit free cloud storage via deniable attribute-based encryption
PDF
Distributed private key generator in ibc
PDF
Secure data sharing in cloud computing using revocable storage identity-based...
PDF
Secure data sharing in cloud computing using revocable storage identity-based...
PDF
Identity based proxy-oriented data uploading and remote data integrity checki...
PDF
Identity based proxy-oriented data uploading and remote data integrity checki...
Identity based encryption with cloud revocation authority and its applications
Identity based encryption with outsourced revocation in cloud computing
Identity-Based Encryption with Outsourced Revocation in Cloud Computing
Identity-Based Encryption with Outsourced Revocation in Cloud Computing
Identity based encryption with outsourced
An efficient certificate less encryption for
Flexible and fine grained attribute-based data storage in cloud computing
Key aggregate cryptosystem for scalable data sharing in cloud storage
Efficient and Enhanced Proxy Re Encryption Algorithm for Skyline Queries
Identity based cryptography for client side security in web applications (web...
IRJET- Secure Data Sharing in Cloud Computing using Revocable Storage Identit...
A New Pairing Free ID Based Certificate Less Digital Signature (CL-DS) Scheme...
Audit free cloud storage via deniable attribute-based encryption
Audit free cloud storage via deniable attribute-based encryption
Audit free cloud storage via deniable attribute-based encryption
Distributed private key generator in ibc
Secure data sharing in cloud computing using revocable storage identity-based...
Secure data sharing in cloud computing using revocable storage identity-based...
Identity based proxy-oriented data uploading and remote data integrity checki...
Identity based proxy-oriented data uploading and remote data integrity checki...

More from Shakas Technologies (20)

DOCX
A Review on Deep-Learning-Based Cyberbullying Detection
DOCX
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
DOCX
A Novel Framework for Credit Card.
DOCX
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
DOCX
NS2 Final Year Project Titles 2023- 2024
DOCX
MATLAB Final Year IEEE Project Titles 2023-2024
DOCX
Latest Python IEEE Project Titles 2023-2024
DOCX
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
DOCX
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
DOCX
Detecting Mental Disorders in social Media through Emotional patterns-The cas...
DOCX
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
DOCX
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
DOCX
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
DOCX
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
DOCX
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
DOCX
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
DOCX
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
DOCX
Fighting Money Laundering With Statistics and Machine Learning.docx
DOCX
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
DOCX
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...
A Review on Deep-Learning-Based Cyberbullying Detection
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
A Novel Framework for Credit Card.
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
NS2 Final Year Project Titles 2023- 2024
MATLAB Final Year IEEE Project Titles 2023-2024
Latest Python IEEE Project Titles 2023-2024
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
Detecting Mental Disorders in social Media through Emotional patterns-The cas...
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
Fighting Money Laundering With Statistics and Machine Learning.docx
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...

Recently uploaded (20)

PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPT
Teaching material agriculture food technology
PDF
Electronic commerce courselecture one. Pdf
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Approach and Philosophy of On baking technology
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
NewMind AI Monthly Chronicles - July 2025
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Diabetes mellitus diagnosis method based random forest with bat algorithm
Digital-Transformation-Roadmap-for-Companies.pptx
Per capita expenditure prediction using model stacking based on satellite ima...
Chapter 3 Spatial Domain Image Processing.pdf
“AI and Expert System Decision Support & Business Intelligence Systems”
Teaching material agriculture food technology
Electronic commerce courselecture one. Pdf
The Rise and Fall of 3GPP – Time for a Sabbatical?
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
NewMind AI Weekly Chronicles - August'25 Week I
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Approach and Philosophy of On baking technology
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Dropbox Q2 2025 Financial Results & Investor Presentation
Spectral efficient network and resource selection model in 5G networks
NewMind AI Monthly Chronicles - July 2025

Identity based encryption with outsourced revocation in cloud computing

  • 1. 1. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6. Off:0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602, Project Titles: http://shakastech.weebly.com/2015-2016-titles Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com IDENTITY-BASED ENCRYPTION WITH OUTSOURCED REVOCATION IN CLOUD COMPUTING ABSTRACT Identity-Based Encryption (IBE) which simplifies the public key and certificate management at Public Key Infrastructure (PKI) is an important alternative to public key encryption. However, one of the main efficiency drawbacks of IBE is the overhead computation at Private Key Generator (PKG) during user revocation. Efficient revocation has been well studied in traditional PKI setting, but the cumbersome management of certificates is precisely the burden that IBE strives to alleviate. In this paper, aiming at tackling the critical issue of identity revocation, we introduce outsourcing computation into IBE for the first time and propose a revocable IBE scheme in the server-aided setting. Our scheme offloads most of the key generation related operations during key-issuing and key-update processes to a Key Update Cloud Service Provider, leaving only a constant number of simple operations for PKG and users to perform locally. This goal is achieved by utilizing a novel collusion-resistant technique: we employ a hybrid private key for each user, in which an AND gate is involved to connect and bound the identity component and the time component. Furthermore, we propose another construction which is provable secure under the recently formulized Refereed Delegation of Computation model. Finally, we provide extensive experimental results to demonstrate the efficiency of our proposed construction.
  • 2. 1. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6. Off:0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602, Project Titles: http://shakastech.weebly.com/2015-2016-titles Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com EXISTING SYSTEM: Introduced and firstly implemented by Boneh and Franklin as well , IBE has been researched intensively in cryptographic community. On the aspect of construction, these first schemes were proven secure in random oracle. Some subsequent systems achieved provable secure in standard model under selective-ID security or adaptive-ID security. Recently, there have been multiple lattice-based constructions for IBE systems. Nevertheless, concerning on revocable IBE, there is little work presented. As mentioned before, Boneh and Franklin’s suggestion is more a viable solution but impractical. Hanaoka et al proposed a way for users to periodically renew their private keys without interacting with PKG. However, the assumption required in their work is that each user needs to possess a tamper-resistant hardware device. Another solution is mediator-aided revocation: In this setting there is a special semi-trusted third party called a mediator who helps users to decrypt each ciphertext. If an identity is revoked then the mediator is instructed to stop helping the user. Obviously, it is impractical since all users are unable to decrypt on their own and they need to communicate with mediator for each decryption. Recently, Lin et alproposed a space efficient revocable IBE mechanism from non-monotonic Attribute-Based Encryption (ABE), but their construction requires times bilinear pairing operations for a single decryption where is the number of revoked users. As far as we know, the revocable IBE scheme presented by Boldyreva et al. remains the most effective solution right now. Libert and Vergnaud improved Boldyreva’s construction to achieve adaptive-ID security. Their work focused on security enhanced, but inherits the similar disadvantage as Boldyreva’s original construction. As we mentioned before, they are short in storage for both private key at user and binary tree structure at PKG.
  • 3. 1. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6. Off:0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602, Project Titles: http://shakastech.weebly.com/2015-2016-titles Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com PROPOSED SYSTEM: In this paper, we introduce outsourcing computation into IBE revocation, and formalize the security definition of outsourced revocable IBE for the first time to the best of our knowledge. We propose a scheme to offload all the keygeneration related operations during key- issuing and keyupdate, leaving only a constant number of simple operations for PKG and eligible users to perform locally. In our scheme, as with the suggestion, we realize revocation through updating the private keys of the unrevoked users. But unlike that work which trivially concatenates time period with identity for key generation/update and requires to re-issue the whole private key for unrevoked users, we propose a novel collusion-resistant key issuing technique: we employ a hybrid private key for each user, in which an AND gate is involved to connect and bound two sub-components, namely the identity component and the time component. At first, user is able to obtain the identity component and a default time component (i.e., for current time period) from PKG as his/her private key in key-issuing. Afterwards, in order to maintain decryptability, unrevoked users needs to periodically request on keyupdate for time component to a newly introduced entity named Key Update Cloud Service Provider (KU- CSP). Compared with the previous work , our scheme does not have to re-issue the whole private keys, but just need to update a lightweight component of it at a specialized entity KU-CSP. We also specify that 1) with the aid of KU-CSP, user needs not to contact with PKG in key-update, in other words, PKGis allowed to be offline after sending the revocation list to KU-CSP. 2) No secure channel or user authentication is required during key-update between user and KU-CSP. Module 1 Identity-Based Encryption
  • 4. 1. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6. Off:0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602, Project Titles: http://shakastech.weebly.com/2015-2016-titles Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com An IBE scheme which typically involves two entities, PKG and users (including sender and receiver) is consisted of the following four algorithms. Setup : The setup algorithm takes as input a security parameter and outputs the public key and the master key . Note that the master key is kept secret at PKG. KeyGen : The private key generation algorithm is run by PKG, which takes as input the master key and user’s identity . It returns a private key corresponding to the identity . Encrypt : The encryption algorithm is run by sender, which takes as input the receiver’s identity and a message to be encrypted. It outputs the ciphertext . Decrypt : The decryption algorithm is run by receiver, which takes as input the ciphertext and his/her private key . It returns a message or an error . An IBE scheme must satisfy the definition of consistency. Specifically, when the private key generated by algorithm KeyGen when it is given as the input, then Decrypt where Encrypt . The motivation of IBE is to simplify certificate management. For example, when Alice sends an email to Bob at bob@company com, she simply encrypts her message using Bob’s email address “bob@company com”, but does not need to obtain Bob’s public key certificate. When Bob receives the encrypted email he authenticate himself at PKG to obtain his private key, and read his email with such a private key. Module 2 Efficient ibe with outsourced revocation Intuition In order to achieve efficient revocation, we introduce the idea of “partial private key update” into the proposed construction, which operates on two sides: 1) We utilize a “hybrid private key” for each user in our system, which employs an AND gate connecting two sub- components namely the identity component and the time component respectively. is generated by PKG in key-issuing but is updated by the newly introduced KU-CSP in keyupdate; 2) In encryption, we take as input user’s identity as well as the time period to restrict decryption, more precisely, a user is allowed to perform successful decryption if and only if the identity and time period embedded in his/her private key are identical to that associated with the ciphertext. Using such skill, we are able to revoke user’s decryptability through updating the time component for
  • 5. 1. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6. Off:0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602, Project Titles: http://shakastech.weebly.com/2015-2016-titles Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com private key by KU-CSP. Moreover, we remark that it cannot trivially utilize an identical updated time component for all users because revoked user is able to re-construct his/her ability through colluding with unrevoked users. To eliminate such collusion, we randomly generate an outsourcing key for each identity , which essentially decides a “matching relationship” for the two sub-components. Furthermore, we let KU-CSP maintain a list to record user’s identity and its corresponding outsourcing key. In key-update, we can use to update the time component for identity. Suppose a user with identity is revoked at . Even if he/she is able to obtain for identity , the revoked user still cannot decrypt ciphertext encrypted under . Module 3 Key Service Procedures Based on our algorithm construction, as shown in Fig. 4, the key service procedures including key-issuing, key-update and revocation in proposed IBE scheme with outsourced revocation work as follows. Key-issuing. We require that PKG maintains a revocation list and a time list locally. Upon receiving a private key request on , PKG runs KeyGen to obtain private key and outsourcing key . Finally, it sends to user and ( ) to KUCSP respectively. As described in intuition, for each entry ( ) sent from PKG, KU-CSP should add it into a locally maintained user list . Key-update. If some users have been revoked at time period , each unrevoked user needs to send key-update request to KU-CSP to maintain decryptability. Upon receiving the request on identity , KU-CSP runs KeyUpdate to obtain . Finally, it sends such time component back to user who is able to update his/her private key as Revocation. Similar to key-update, if a revoked user sends a key-update request on identity , KU-CSP runs KeyUpdate as well. Nevertheless, since , KU-CSP will return . Therefore, such key-update request is aborted. Module 4 Advanced Construction
  • 6. 1. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6. Off:0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602, Project Titles: http://shakastech.weebly.com/2015-2016-titles Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com RDoC model originates from the model of refereed games , and is later formalized. In RDoC model, the client is able to interact with multiple servers and it has a right output as long as there exists one server that follows the proposed protocol. One of the most advantages of RDoC over traditional model with single server is that the security risk on the single server is reduced to multiple servers involved in. As the result of both the practicality and utility, RDoC model recently has been widely utilized in the literature of outsourced computation. In order to apply RDoC to our setting, we introduce another independent KU-CSPs. Furthermore, we have three requirements in such model: 1) At least one of the KU-CSPs is honest. 2) Computational complexity at the honest KU-CSP is not much more than the other required to perform revocation. 3) PKG’s running time would be much smaller than required to directly perform revocation. CONCLUSION In this paper, focusing on the critical issue of identity revocation, we introduce outsourcing computation into IBE and propose a revocable scheme in which the revocation operations are delegated to CSP. With the aid of KU-CSP, the proposed scheme is full-featured: 1) It achieves constant efficiency for both computation at PKG and private key size at user; 2) User needs not to contact with PKG during keyupdate, in other words, PKG is allowed to be offline after sending the revocation list to KU-CSP; 3)Nosecure channel or user authentication is required during key-update between user and KU-CSP. Furthermore, we consider to realize revocable IBE under a stronger adversary model. We present an advanced construction and show it is secure underRDoCmodel, in which at least one of the KU-CSPs is assumed to be honest. Therefore, even if a revoked user and either of the KU-CSPs collude, it is unable to help such user re-obtain his/her decryptability. Finally, we provide extensive experimental results to demonstrate the efficiency of our proposed construction.