Analysis Of Public Key Encryption


Analysis Of Public Key Encryption


1 INTRODUCTION

Public–key encryption is a powerful mechanism for ensuring the confidentiality of stored and transmitted data. The traditional encryption is regarded as a method to share data to some targeted person or device that the sender knows. This means the sender knows specifically which user he wants to share with. However, in many systems the message sender will want to share date with a group of people whose credentials or attributes accord to some access policy set by the sender.[8][9]A new vision of encryption[10]was presented, where the sender can express how he wants to share data in the encryption algorithm itself. The sender will give an attribute formula to describe the users who can decrypt this data. Then only those whose ... Show more content on Helpwriting.net ...Then, users use their attribute private key to decrypt the cipher text. In this case it is the users attribute instead of the traditional public key that is matched with their private key.

CP–ABE is extremely efficient and secure in the system in terms of the fine–grained access control of attributes. Theoretically, based on some previous researches, this paper will simply introduce the algorithm scheme and how it working. Practically, I will compare some libraries which implement CP–ABE and try to implement a small program using these different libraries

2 BACKGROUND OF RESEARCH

In 2007, a new methodology for realizing Ciphertext–Policy Attribute

Encryption (CP– ABE)[3]under concrete and non–interactive cryptographic assumptions in the standard model came out and a basic framework of this model was constructed. This scheme, referred as BSW scheme, uses threshold secret sharing to enforce the policy. The main drawback of BSW scheme is the complexity and computing time in decryption phase, which requires may expensive pairing and exponentiation operations. In 2009, there is a scheme of CP–ABE mentioned before was presented, which is efficient and provable secure.[5]This scheme can express any access policy involving AND, OR and OF operator (threshold) by defining the privacy policy through access tree instead of threshold secret sharing which


... Get more on HelpWriting.net ...


No comments:

Post a Comment

sample term paper about information technology

@page { size: auto; margin: 0mm; } html { background-color: #FFFFFF; margin: 0px; } body { margin: 1mm 1mm 1mm 1mm; } ...