Abstract

The demand of cloud computing and 5G networks has increased in the current scenario due to their attractive features and also the security related to the data over the cloud. In the context of cloud security, there is a number of computationally hard methods available. One of the most popular methods used to secure data over the cloud is the identity-based encryption (IBE). It is an access policy that allows only authorized users to access legible data in order to avoid a malicious attack. IBE comprises of four stages, namely, setup, key generation or extract, encryption, and decryption. Key generation is one of the important and time-consuming phases in which a security key is generated. It is a computational and decisional hard problem for generating unbreakable and nonderivable secure keys. This paper proposes an enhanced identity-based encryption approach where a secure key is generated using part of an identity bit string in order to avoid leakage of users’ identity even if an adversary or attacker decodes the key or encrypted data. Experiment results show that the prosed algorithm takes less time in the encryption and decryption as compared to the competitive approach named efficient selective-ID secure identity-based encryption approach. One of the most important features of the proposed approach is that it hides the user’s identity by using the Lagrange coefficient, which consists of a polynomial interpolation function. The security of the system depends on the hardness of computing the bilinear Diffie-Hellman problem.

Highlights

  • Public key infrastructure (PKI) is one of the most common approaches which is used to secure the communication between two parties

  • Private key generator (PKG) is used to generate master public key and master private key which is used for encryption and decryption, respectively

  • This paper presents an improved identity-based encryption (IBE) method which takes lesser time as compared to the competitive approach

Read more

Summary

Introduction

Public key infrastructure (PKI) is one of the most common approaches which is used to secure the communication between two parties. PKI is based on private and public keys where public key is a simple identity of the user like email and organization name and known to everyone, whereas private key is generated at the time of communication. In 1984, Shamir [2] introduced first RSA-inspired identitybased cryptography approach to secure the communication between two users. This approach uses two keys, i.e., master public key and master private key. Providing an efficient key generation method for a large number of service accessors or users in identity-based approach is a challenge task because most of the computational time is spent in generating the private key [3, 4].

Objectives
Results
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call