Full Verifiability for Outsourced Decryption in Attribute Based Encryption - 2017


Attribute based mostly encryption (ABE) may be a in style cryptographic technology to shield the safety of users’ knowledge. But, the decryption price and ciphertext size limit the appliance of ABE in practice. For most existing ABE schemes, the decryption cost and ciphertext size grow linearly with the complexity of access structure. This is undesirable to the devices with limited computing capability and cupboard space. Outsourced decryption is taken into account as a possible methodology to reduce the user's decryption overhead, that allows a user to outsource a giant variety of decryption operations to the cloud service provider (CSP). However, outsourced decryption cannot guarantee the correctness of transformation done by the cloud, therefore it's necessary to check the correctness of outsourced decryption to confirm security for users’ information. Current analysis mainly focuses on verifiability of outsourced decryption for the authorized users. It still remains a challenging issue that how to ensure the correctness of outsourced decryption for unauthorized users. In this paper, we propose an ABE scheme with verifiable outsourced decryption (referred to as full verifiability for outsourced decryption), that can simultaneously check the correctness for reworked ciphertext for the authorized users and unauthorized users. The proposed ABE scheme with verifiable outsourced decryption is proved to be selective CPA-secure in the standard model.

Did you like this research project?

To get this research project Guidelines, Training and Code... Click Here

PROJECT TITLE : Network Resource Allocation for Users With Multiple Connections Fairness and Stability - 2014 ABSTRACT: This paper studies network resource allocation between users that manage multiple connections, possibly
PROJECT TITLE : Multi-Core Embedded Wireless Sensor Networks Architecture and Applications - 2014 ABSTRACT: Technological advancements in the silicon industry, as predicted by Moore's law, have enabled integration of billions
PROJECT TITLE : Joint Topology-Transparent Scheduling and QoS Routing in Ad Hoc Networks - 2014 ABSTRACT: This paper considers the problem of joint topologytransparent scheduling (TTS) and quality-of-service (QoS) routing in
PROJECT TITLE : Joint Routing and Resource Allocation for Delay Minimization in Cognitive Radio Based Mesh Networks - 2014 ABSTRACT: This paper studies the joint design of routing and resource allocation algorithms in cognitive
PROJECT TITLE : Hop-by-Hop Message Authenticationand Source Privacy in WirelessSensor Networks - 2014 ABSTRACT: Message authentication is one of the most effective ways to thwart unauthorized and corrupted messages from being

Ready to Complete Your Academic MTech Project Work In Affordable Price ?

Project Enquiry