Hidden Ciphertext Policy Attribute-Based Encryption Under Standard Assumptions


We propose two new ciphertext policy attribute-based mostly encryption (CP-ABE) schemes where the access policy is outlined by AND-gate with wildcard. In the primary theme, we have a tendency to present a new technique that uses solely one cluster part to represent an attribute, whereas the present ABE schemes of the same kind need to use 3 completely different group components to represent an attribute for the three possible values (namely, positive, negative, and wildcard). Our new technique ends up in a new CP-ABE theme with constant ciphertext size, which, but, cannot hide the access policy used for encryption. The main contribution of this paper is to propose a replacement CP-ABE scheme with the property of hidden access policy by extending the technique we employed in the construction of our first scheme. In particular, we have a tendency to show a way to bridge ABE based mostly on AND-gate with wildcard with inner product encryption and then use the latter to attain the goal of hidden access policy. We tend to prove that our second scheme is secure below the quality decisional linear and decisional bilinear Diffie–Hellman assumptions.

Did you like this research project?

To get this research project Guidelines, Training and Code... Click Here

PROJECT TITLE :LAW: A Novel Mechanism for Addressing Hidden Terminal Problem in LTE-U and Wi-Fi Networks - 2018ABSTRACT:Recently, the use of LTE in unlicensed spectrum (LTE-U) has gained a lot of attention. One of the daunting
PROJECT TITLE : Wormhole: The Hidden Virus Propagation Power of a Search Engine in Social Networks - 2017 ABSTRACT: Today search engines are tightly let alone social networks, and present users with a double-edged sword: they're
PROJECT TITLE :Dynamic Detection of Transmission Line Outages Using Hidden Markov ModelsABSTRACT:We tend to study the matter of detecting transmission line outages in power grids. We have a tendency to model the time series of
PROJECT TITLE :Empirical analysis of Tor Hidden ServicesABSTRACT:Tor hidden services permit someone to host a website or other transmission control protocol (TCP) service whilst remaining anonymous to visitors. The assortment
PROJECT TITLE :Hidden Markov Models for the Prediction of Impending FaultsABSTRACT:Reliability and safety are 2 vital ideas in industrial applications. So, the development of monitoring tools, which are in a position to make sure

Ready to Complete Your Academic MTech Project Work In Affordable Price ?

Project Enquiry