ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

A Threshold Multi-Authority Access Control System

Journal: International Journal of Computer Techniques (Vol.3, No. 4)

Publication Date:

Authors : ;

Page : 55-59

Keywords : Keywords — Bit-Exchange based encryption; Attribute Based Encryption(ABE); Threshold Secret Sharing(t; n).;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Bit-Exchange Encryption is the cryptographic conducting tool to assurance data owners enduring control above their data in public cloud storage. The earlier ABE plans include one and only power (Authority) to keep up the entire trait (Key) set, which can carry a solitary (single) point bottleneck on both safety and execution. In this way, some multi- power (Multi-Authority) plans are proposed, in which various powers independently keep up disjoint attribute subsets. In any case, the single-point bottleneck issue stays unsolved. In this paper, from another point of view, we conduct a threshold multi-authority CP- ABE access control plan for open distributed storage, named TMACS, in which various powers together deal with a uniform characteristic set. In [9] TMACS, taking advantage of (t; n) limit mystery sharing, the expert (Master) key can be shared among numerous powers, and a legitimate client can produce his/her mystery (Private) key by cooperating with any t powers. Security and execution investigation results demonstrate that system is not just undeniable secure when not as much as t powers are traded off, additionally dynamic when no not as a great deal as t powers are alive in the framework. Besides, by proficiently joining the customary multi-power plan with system, we build hybrid one, which fulfils the attributes originating from various authorities and accomplishing security.

Last modified: 2017-12-12 12:06:44