An integrated access tree construction and tree encryption to improve the encryption/decryption efficiency

O.Gangadhara Rao, P.Radhika Krupalini

Abstract


This work proposes a useful Ciphertext-Policy Attribute-Based Hierarchical archive grouping Encryption plan named CP-ABHE. By sensible, we infer that CP-ABHE is progressively powerful in both calculation and additional room without surrendering information security. In CP-ABHE, we initially build up a ton of composed access trees subject to the chronicles' attribute sets. We use the insatiable procedure to create the trees bit by bit and build up the trees capably by joining the little ones. By then, all the reports on an organized access tree are encoded together. Particular to existing plans, the leaves in different access trees with a comparative trademark offer a comparable mystery number, which is used to scramble the archives. This fundamentally improves the presentation of CP-ABHE. The security of our arrangement is speculatively exhibited subject to the decisional bilinear Diffine Hellman supposition.


References


J. Bethencourt, A. Sahai, and B.Waters, ``Ciphertext-policy attribute-based encryption,'' in Proc. IEEE Symp.Secur. Privacy, May 2007, pp. 321_334.

D. Boneh and B. Waters, ``Conjunctive, subset, and range queries on encrypted data,'' in Proc. TCC, 2007, pp. 535_554.

N. Cao, C. Wang, M. Li, K. Ren, and W. Lou, ``Privacy-preserving multi-keyword ranked search over encrypted cloud data,'' IEEE Trans. Parallel Distrib. Syst., vol. 25, no. 1, pp. 222_233, Jan. 2014.

A. D. Caro and V. Iovino, ``jPBC: Java pairing based cryptography,'' in Proc. IEEE Symp. Comput. Commun. IEEE Comput. Soc., Jun. 2011, pp. 850_855.

C. Chen et al., ``An ef_cient privacy-preserving ranked keyword search method,'' IEEE Trans. Parallel Distrib. Syst., vol. 27, no. 4, pp. 951_963, Apr. 2016.

R. Curtmola, J. Garay, S. Kamara, and R. Ostrovsky, ``Searchable symmet-ric encryption: Improved de_nitions and ef_cient constructions,'' in Proc. ACM CCS, 2006, pp. 79_88.

H. Deng et al., ``Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts,'' Inf. Sci., vol. 275, pp. 370_384, Aug. 2014.

Z. Fu, K. Ren, J. Shu, X. Sun, and F. Huang, ``Enabling personalized search over encrypted outsourced data with ef_ciency improvement,'' IEEE Trans. Parallel Distrib. Syst., vol. 27, no. 9, pp. 2546_2559, Sep. 2016.

P. Golle, J. Staddon, and B. Waters, ``Secure conjunctive keyword search over encrypted data,'' in Proc. ACNS, 2004, pp. 31_45.

V. Goyal, A. Jain, O. Pandey, and A. Sahai, ``Bounded ciphertext policy attribute based encryption,'' in Automata, Languages and Programming. Berlin, Germany: Springer, 2008, pp. 579_591.

V. Goyal, O. Pandey, A. Sahai, and B.Waters, ``Attribute-based encryption for _ne-grained access control of encrypted data,'' in Proc. 13th ACMConf.Comput. Commun. Secur., 2006, pp. 89_98.

J. Han, W. Susilo, Y. Mu, and J. Yan, ``Privacy-preserving decentralized key-policy attribute-based encryption,'' IEEE Trans. Parallel Distrib. Syst., vol. 23, no. 11, pp. 2150_2162, Nov. 2012.

J. Lai, R. H. Deng, C. Guan, and J.Weng, ``Attribute-based encryption with veri_able outsourced decryption,'' IEEE Trans. Inf. Forensics Security, vol. 8, no. 8, pp. 1343_1354, Aug. 2013.

A. B. Lewko, T. Okamoto, A. Sahai, K. Takashima, and B.Waters, ``Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption,'' in Proc. EUROCRYPT, 2010, pp. 62_91.

A. Lewko, T. Okamoto, A. Sahai, K. Takashima, and B. Waters, ``Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption,'' in Proc. Int. Conf. Theory Appl. Cryptograph. Techn. Berlin, Germany: Springer-Verlag, 2010, pp. 62_91.


Full Text: PDF [Full Text]

Refbacks

  • There are currently no refbacks.


Copyright © 2013, All rights reserved.| ijseat.com

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.

Â