Proxy Re-Encryption in cloud using ALBC (adaptive lattice based cryptography)
In recent days, data sharing has provided the flexibility to share the data, store the data, and perform operation on data virtually as well as cost effectively. Data sharing in cloud is one of the feature, which is being popular and widely accepted. However, the concern here is to ensure the data s...
Saved in:
Main Authors: | , |
---|---|
Format: | EJournal Article |
Published: |
Institute of Advanced Engineering and Science,
2019-12-01.
|
Subjects: | |
Online Access: | Get fulltext |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
LEADER | 02471 am a22003013u 4500 | ||
---|---|---|---|
001 | ijeecs18056_13181 | ||
042 | |a dc | ||
100 | 1 | 0 | |a B M, Chandrakala |e author |
100 | 1 | 0 | |e contributor |
700 | 1 | 0 | |a Lingareddy, S C |e author |
245 | 0 | 0 | |a Proxy Re-Encryption in cloud using ALBC (adaptive lattice based cryptography) |
260 | |b Institute of Advanced Engineering and Science, |c 2019-12-01. | ||
500 | |a https://ijeecs.iaescore.com/index.php/IJEECS/article/view/18056 | ||
520 | |a In recent days, data sharing has provided the flexibility to share the data, store the data, and perform operation on data virtually as well as cost effectively. Data sharing in cloud is one of the feature, which is being popular and widely accepted. However, the concern here is to ensure the data security and this has led the researcher to research in this area. To provide the security several Proxy re-encryption scheme has been introduced, however all these method lacks of efficiency. Hence In this paper, we propose a scheme known as ALBC (Adaptive Lattice Based Cryptography), this scheme follows the two phase i.e. encryption and Re-encryption. Encryption phase has few algorithms such as Key_Gen, Enc, Dec. Similarly ALBC Re-Enc has five algorithm i.e. Key_Gen, Key_ReGen, Enc, Re-Enc, Dec. our algorithm not only provides the security but also solves the problem of RL(Ring-learning) with errors problems. In order to evaluate, our algorithm is compared with the existing model in terms of encryption time, decryption time, re-encryption time, key generation and key regeneration by varying the various key size. When we observe the comparative analysis, it is observed that our algorithm outperforms the existing algorithm. | ||
540 | |a Copyright (c) 2019 Institute of Advanced Engineering and Science | ||
540 | |a http://creativecommons.org/licenses/by-nc/4.0 | ||
546 | |a eng | ||
690 | |||
690 | |a Encryption, Re-Encryption, Proxy Re-Encryption | ||
655 | 7 | |a info:eu-repo/semantics/article |2 local | |
655 | 7 | |a info:eu-repo/semantics/publishedVersion |2 local | |
655 | 7 | |2 local | |
786 | 0 | |n Indonesian Journal of Electrical Engineering and Computer Science; Vol 16, No 3: December 2019; 1455-1463 | |
786 | 0 | |n 2502-4760 | |
786 | 0 | |n 2502-4752 | |
786 | 0 | |n 10.11591/ijeecs.v16.i3 | |
787 | 0 | |n https://ijeecs.iaescore.com/index.php/IJEECS/article/view/18056/13181 | |
856 | 4 | 1 | |u https://ijeecs.iaescore.com/index.php/IJEECS/article/view/18056/13181 |z Get fulltext |