Main Reference PaperAccountable Proxy Re-Encryption for Secure Data Sharing, IEEE Transactions on Dependable and Secure Computing, 2018[Java].
  • According to Proxy Re-Encryption schemes, proxy and any delegatee can collude to derive and distribute the delegator’s decryption capability, which has been the major concerns for users utilizing cloud data sharing services. We introduce the concept of accountable PRE to resolve this problem, first formalized the notion of accountable PRE, in which the proxy that abuses its re-encryption key can be identified by the judge algorithm. Then we present Accountable PRE scheme which is non-interactive and public accountable and proved its CPA security and accountability under DBDH assumption in the standard model.

Description
  • According to Proxy Re-Encryption schemes, proxy and any delegatee can collude to derive and distribute the delegator’s decryption capability, which has been the major concerns for users utilizing cloud data sharing services. We introduce the concept of accountable PRE to resolve this problem, first formalized the notion of accountable PRE, in which the proxy that abuses its re-encryption key can be identified by the judge algorithm. Then we present Accountable PRE scheme which is non-interactive and public accountable and proved its CPA security and accountability under DBDH assumption in the standard model.

  • To prove its Chosen-Plaintext Attack (CPA) security and accountability under DBDH assumption in the standard model.

Aim & Objectives
  • To prove its Chosen-Plaintext Attack (CPA) security and accountability under DBDH assumption in the standard model.

  • The CPA and CCA schemes are taking into consideration.

Contribution
  • The CPA and CCA schemes are taking into consideration.

  • M.E / M.Tech / MS / Ph.D.- Customized according to the client requirements.

Project Recommended For
  • M.E / M.Tech / MS / Ph.D.- Customized according to the client requirements.

  • No Readymade Projects-project delivery Depending on the complexity of the project and requirements.

Order To Delivery
  • No Readymade Projects-project delivery Depending on the complexity of the project and requirements.

Professional Ethics: We S-Logix would appreciate the students those who willingly contribute with atleast a line of thinking of their own while preparing the project with us. It is advised that the project given by us be considered only as a model project and be applied with confidence to contribute your own ideas through our expert guidance and enrich your knowledge.

Leave Comment

Your email address will not be published. Required fields are marked *

clear formSubmit