An Attribute Involved Public Key Cryptosystem Based on P-Sylow Subgroups and Randomization

Journal Title: Journal of Applied Computer Science & Mathematics - Year 2018, Vol 12, Issue 25

Abstract

The Asymmetric Key Cryptosystem (AKC) or Public Key Encryption (PKE) is a mechanism used to encrypt the messages by using public key and decrypt the enciphered messages by using private key. Of late, the Attribute-Based Encryption (ABE) is an expansion of asymmetric key encryption scheme that allows users to encrypt and decrypt the plaintext messages using the key based on the user’s credentials, called attributes, like social security number, PAN (Permanent Account Number), email ids or Aadhar number etc. Most of the existing ABE schemes rely on the multiple attributes from which the access control policies are derived. These policies define the users’ private keys, required for the decryption process and access to the confidential information. In this paper, we proposed a new attribute based asymmetric cryptosystem that uses the features of both the schemes: PKE and ABE. Here, we used a value of an attribute, personal to the user, for the encryption and the decryption process. This scheme assures that the receiver will only be able to access the secret data if recipient is shared with the valid attribute value. The asymmetric nature is this scheme is based on the concept of p-sylow sub-group assumption. In addition, the randomization factor is used in the encipherment process to strengthen the cipher further. The development of this cryptosystem is an embodiment where the merits of randomized asymmetric encryption technique and the attribute based encryption are integrated to achieve the authentication on top of confidentiality to secure the information transmission over the public networks.

Authors and Affiliations

Sumalatha GUNNALA, Shirisha KAKARLA, Srirama Murthy DASIKA

Keywords

Related Articles

Framework for Urdu News Headlines Classification

Automatic text classification has great significance in the field of text mining and plays a pivotal role in areas such as spam filtering, news classification, noise reduction etc. It is evident from the literature that...

Identification of Core Architecture Classes for Object-Oriented Software Systems

The new member of the software development team needs to understand the software prior making modifications to the unknown system. The core classes that constitute the system architecture can reveal important structural...

A Method of Forming the Optimal Set of Disjoint Path in Computer Networks

This work provides a short analysis of algorithms of multipath routing. The modified algorithm of formation of the maximum set of not crossed paths taking into account their metrics is offered. Optimization of paths is c...

Mining Social Media and DBpedia Data Using Gephi and R

The big data is playing a big role in the field of machine learning and data mining. To extract meaningful and interesting information from big data mining is a challenge. The size of the data at social media and Wikiped...

A Formal Verification Model for Performance Analysis of Reinforcement Learning Algorithms Applied to Dynamic Networks

Routing data packets in a dynamic network is a difficult and important problem in computer networks. As the network is dynamic, it is subject to frequent topology changes and is subject to variable link costs due to cong...

Download PDF file
  • EP ID EP532943
  • DOI 10.4316/JACSM.201801005
  • Views 131
  • Downloads 0

How To Cite

Sumalatha GUNNALA, Shirisha KAKARLA, Srirama Murthy DASIKA (2018). An Attribute Involved Public Key Cryptosystem Based on P-Sylow Subgroups and Randomization. Journal of Applied Computer Science & Mathematics, 12(25), 34-38. https://europub.co.uk/articles/-A-532943