International Journal of Advanced Research in Computer and Information Security
Volume 1, No. 1, 2017, pp 13-18 | ||
Abstract |
Encrypting the Data in Cloud Computing
|
Identity-based cryptography (ibe) that simplifies the final public key and certificate management at public key infrastructure (pki) may be a crucial numerous to public key cryptography. However, one in every of the foremost efficiency drawbacks of ibe is that the overhead computation at [1] personal key generator (pkg) throughout user revocation. Throughout this paper, aiming at managing the necessary issue of identity revocation. This goal is achieved by utilizing a totally distinctive collusion-resistant technique: we've an inclination to use a hybrid personal key for each user, among that Associate in Nursing logic gate is bothered to connect and sure the part and additionally the time element. Moreover, we've an inclination to propose another construction that's demonstrable secure to a lower place the recently formulized Refereed Delegation of Computation model. Finally, we provide thorough experimental results to demonstrate the efficiency of our planned construction.