Using The Three Encryption Methods Essay

1439 Words Dec 11th, 2014 6 Pages
• Setup is an algorithm that takes the implicit security parameter as an input and outputs the public parameter PK and a master key MK.

• Encryption is an algorithm that takes the message m, a set of attributes a and the public parameter PK as inputs and it outputs the cipherkey E.

• Key Generation is an algorithm that takes an access structure A, the master key MK and the public parameter PK and it outputs the decryption key D.

• Decryption is an algorithm that takes the ciphertext E that was encrypted under a set of attributes a and the decryption key D for access control structure and the public parameter PK. And it outputs the message if a ϵ A.

PRE is an encryption method in which semi-trusted proxy is able to convert a ciphertext encrypted under X’s public key into another ciphertext that can be opened by y’s private key without seeing the plaintext.

8.2 The Use of Three Encryption Methods

In this algorithm and by using the three encryption techniques mentioned above, each data file is associated with a set of attributes. In addition, each user is assigned an expressive access structure which is defined over these attributes.to enforce this kind of access control KP-ABE is utilized to escort data encryption keys of data files. Using this construction enables a fine-grained access control. However, if this construction was deployed alone, it would introduce a heavy computation overhead and online burden for the data owner as he is in charge of all the…

Related Documents