International Journal of Advance Computational Engineering and Networking (IJACEN)
current issues
Volume-8,Issue-5  ( May, 2020 )
Past issues
  1. Volume-8,Issue-4  ( Apr, 2020 )
  2. Volume-8,Issue-3  ( Mar, 2020 )
  3. Volume-8,Issue-2  ( Feb, 2020 )
  4. Volume-8,Issue-1  ( Jan, 2020 )
  5. Volume-7,Issue-12  ( Dec, 2019 )
  6. Volume-7,Issue-11  ( Nov, 2019 )
  7. Volume-7, Issue-10  ( Oct, 2019 )
  8. Volume-7, Issue-9  ( Sep, 2019 )
  9. Volume-7, Issue-8  ( Aug, 2019 )
  10. Volume-7, Issue-7  ( Jul, 2019 )

Statistics report
Aug. 2020
Submitted Papers : 80
Accepted Papers : 10
Rejected Papers : 70
Acc. Perc : 12%
Issue Published : 88
Paper Published : 1238
No. of Authors : 3111
  Journal Paper

Paper Title
Secure Multi-Possessor Quality-Based Verifiable Outsource Decryption

A secure multi owner data sharing scheme, named Mona, for dynamic groups in the cloud. By leveraging group signature and dynamic broadcast encryption techniques, any cloud user can anonymously share data with others. Meanwhile, the storage overhead and encryption computation cost of our scheme are independent with the number of revoked users. In addition, we analyze the security of our scheme with rigorous proofs, and demonstrate the efficiency of our scheme in experiments. One of the main efficiency drawbacks of the existing ABE schemes is that d encryption involves expensive pairing operations and the number of such operations grows with the complexity of the access policy. Recently, Green et al. proposed an ABE system with outsourced decryption that largely eliminates the decryption overhead for users. In such a system, a user provides an untrusted server, say a cloud service provider, with a transformation key that allows the cloud to translate any ABE ciphertext satisfied by that user’s attributes or access policy into a simple ciphertext, and it only incurs a small computational overhead for the user to recover the plaintext from the transformed ciphertext. Security of an ABE system with outsourced decryption ensures that an adversary (including a malicious cloud) will not be able to learn anything about the encrypted message; however, it does not guarantee the correctness of the transformation done by the cloud. In this paper, we consider a new requirement of ABE with outsourced d ecryption: verifiability. Informally, verifiability guarantees that a user can efficiently check if the transformation is done correctly. We give the formal model of ABE with verifiable outsourced decryption and propose a concrete scheme. We prove that our new scheme is both secure and verifiable, without relying on random oracles. Finally, we show an implementation of our scheme and result of performance measurements, which indicates asignificant reduction on computing resources imposed on users.

Author - G. Sudarsanam, D.Lavanya

| PDF |
Viewed - 54
| Published on 2014-11-05
IRAJ Other Journals
IJACEN updates
Paper Submission is open now for upcoming Issue.
The Conference World