International Research Journal of Engineering and Technology (IRJET)
e-ISSN: 2395 -0056
Volume: 04 Issue: 04 | Apr -2017
p-ISSN: 2395-0072
www.irjet.net
Efficient CIBPRE SCHEME with Provable Security Mrs. Vedika Pansare1, Mrs. Nilima Nikam2, Mr. Harish Barrapatre3 123 Yadavrao 1
Tasgaonkar institute of engineering & Technology, Dept. of Computer Engineering Mumbai
pansareved3534@gmail.com,2nilima.nikam@tasgaonkartech.com,3harishkbarapatre@gmail.com
---------------------------------------------------------------------***--------------------------------------------------------------------intended receiver. Finally, the receiver can decrypt the resulting ciphertext with her private key. The security of PRE usually assures that
Abstract—Cloud computing is an emerging technology in which resources of the computing infrastructures are provided as services of the internet. Cloud allows user to access application without installation and their personal data at any computer with internet access. It provides with a way to share distributed recourses and services that belong to different organizations or sites. In cloud computing environment a number of extended Proxy ReEncryptions (PRE), e.g. Conditional (CPRE), Identity-Based PRE (IPRE) and Broadcast PRE (BPRE), have been proposed for flexible applications. By incorporating CPRE, IPRE and BPRE, this paper proposes a versatile primitive referred to as Proxy Re-encryption Schemes for Data Security in Cloud is a Conditional Identity-based Broadcast PRE (CIBPRE) and formalizes its semantic security. CIBPRE allows a sender to encrypt a message to multiple receivers by specifying these receivers’ identities, and the sender can delegate a re-encryption key to a proxy so that he can convert the initial cipher text into a new one to a new set of intended receivers. We propose an efficient CIBPRE scheme with provable security. In the instantiated scheme, the initial cipher text, the re-encrypted cipher text and the re-encryption key are all in constant size and the parameters to generate a re-encryption key is independent of the original receivers of any initial cipher text. Finally, we show an application of our CIBPRE to secure cloud email system advantageous over existing secure email systems based on Pretty Good Privacy protocol or Identity-Based Encryption. Index Terms—Proxy Re-Encryption, Cloud Identity-based Encryption, Broadcast Encryption
1. Neither the server/proxy nor non-intended receivers can learn any useful information about the (re-)encrypted file, and 2. Before receiving the re-encryption key, the proxy cannot re-encrypt the initial ciphertext in a meaningful way. Efforts have been made to equip PRE with versatile capabilities. The early PRE was proposed in the traditional public-key infrastructure setting which incurs complicated certificate management [2]. To relieve from this problem, several Identity-based PRE (IPRE) schemes [3], [4], [5] were proposed so that the receivers’ recognizable identities can serve as public keys. Instead of fetching and verifying the receivers’ certificates, the sender and the proxy just need to know the receivers’ identities, which is more convenient in practice. PRE and IPRE allow a single receiver. If there are more receivers, the system needs to invoke PRE or IPRE multiple times. To address this issue, the concept of Broadcast PRE (BPRE) has been proposed [9]. BPRE works in a similar way as PRE and IPRE but more versatile. In contrast, BPRE allows a sender to generate an initial ciphertext to a receiver set, instead of a single receiver. Further, the sender can delegate a re-encryption key associated with another receiver set so that the proxy can re-encrypt to.
Storage,
Introduction Proxy Re-Encryption (PRE) [1] provides a secure and flexible method for a sender to store and share data. A user may encrypt his file with his own public key and then store the ciphertext in an honest-butcurious server. When the receiver is decided, the sender can delegate a re-encryption key associated with the receiver to the server as a proxy. Then the proxy re-encrypts the initial ciphertext to the © 2017, IRJET
|
Impact Factor value: 5.181
The above PRE schemes only allow the reencryption procedure is executed in an all-or-nothing manner. The proxy can either re-encrypt all the |
ISO 9001:2008 Certified Journal
|
Page 235