A multi Ability CP-ABE access control scheme for public cloud storage

The main personality of the cryptography structure based on communication with writings of stable figures and private keys [1-4]. Our development is a key encapsulation mechanism (KEM), so long messages can be coded under a short symmetric key. In our response, the writings of the figures and the pr...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Journal of physics. Conference series 2019-05, Vol.1228 (1), p.12018
Hauptverfasser: Deepthi, Kothapalli Chaitanya, Ashok, Dasari, Krishna, M
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:The main personality of the cryptography structure based on communication with writings of stable figures and private keys [1-4]. Our development is a key encapsulation mechanism (KEM), so long messages can be coded under a short symmetric key. In our response, the writings of the figures and the private keys have stable dimensions and the people in general are directly in the maximum estimate of s. Furthermore, in our plan, the private key generator (PKG) can potentially include new people without modifying the already widespread data (as in the EIB's plans). We also note that there is no chain of importance between the characters, despite HIBE. The income of the general population is directed at the maximum size of S, and not in the amount of decoding keys that can be transmitted, which is the amount of conceivable characters. In this case, use a simple situation to find out about the group classification and main administration test problems. Think about a source that sends information to a provision of beneficiaries in a multicast session. Session security is supervised by two principles of useful substances: a Group Controller (GC) responsible for confirmation, approval and control and a Key Server (KS). To ensure classification in the middle of the multicast session, the sender (source) shares a mysterious symmetric key with all the individuals in the legitimate collection, called the Traffic Encryption Key (TEK). To multicast a mysterious message, the source encodes the message with the TEK using a symmetric encryption calculation. From previous documents, we look at how to share protected information in the cloud without losing keys. In this article, we present a new digital brand, an SSH key, hash functionality, and major escrow calculations.
ISSN:1742-6588
1742-6596
DOI:10.1088/1742-6596/1228/1/012018