An Attribute Involved Public Key Cryptosystem Based on P-Sylow Subgroups and Randomization

Journal Title: Journal of Applied Computer Science & Mathematics - Year 2018, Vol 12, Issue 25


The Asymmetric Key Cryptosystem (AKC) or Public Key Encryption (PKE) is a mechanism used to encrypt the messages by using public key and decrypt the enciphered messages by using private key. Of late, the Attribute-Based Encryption (ABE) is an expansion of asymmetric key encryption scheme that allows users to encrypt and decrypt the plaintext messages using the key based on the user’s credentials, called attributes, like social security number, PAN (Permanent Account Number), email ids or Aadhar number etc. Most of the existing ABE schemes rely on the multiple attributes from which the access control policies are derived. These policies define the users’ private keys, required for the decryption process and access to the confidential information. In this paper, we proposed a new attribute based asymmetric cryptosystem that uses the features of both the schemes: PKE and ABE. Here, we used a value of an attribute, personal to the user, for the encryption and the decryption process. This scheme assures that the receiver will only be able to access the secret data if recipient is shared with the valid attribute value. The asymmetric nature is this scheme is based on the concept of p-sylow sub-group assumption. In addition, the randomization factor is used in the encipherment process to strengthen the cipher further. The development of this cryptosystem is an embodiment where the merits of randomized asymmetric encryption technique and the attribute based encryption are integrated to achieve the authentication on top of confidentiality to secure the information transmission over the public networks.

Authors and Affiliations

Sumalatha GUNNALA, Shirisha KAKARLA, Srirama Murthy DASIKA


Related Articles

Reduced Differential Transform Method for Exact Solution of Parabolic and Hyperbolic Partial Differential Equations

Aim of the paper is to obtain solution of parabolic, elliptical and coupled partial differential equation using Reduced Differential Transform Method (RDTM). The results are compared with solution obtained by other metho...

Secure and Efficient Diffusion Layers for Block Ciphers

Abstract–Modern block ciphers are designed to meet confusion and diffusion criteria. Substitution and permutation layers are used in the round function for this purpose. In this paper, we present a number of choices for...

Kalman Filters for Estimating the potential GDP

The estimation of the potential GDP has a twofold importance: on one hand its accurate estimation allows the correct dimensioning of the macroeconomic policies and on the other hand, the study of potential GDP is a resea...

Framework for Urdu News Headlines Classification

Automatic text classification has great significance in the field of text mining and plays a pivotal role in areas such as spam filtering, news classification, noise reduction etc. It is evident from the literature that...

A Formal Verification Model for Performance Analysis of Reinforcement Learning Algorithms Applied to Dynamic Networks

Routing data packets in a dynamic network is a difficult and important problem in computer networks. As the network is dynamic, it is subject to frequent topology changes and is subject to variable link costs due to cong...

Download PDF file
  • EP ID EP532943
  • DOI 10.4316/JACSM.201801005
  • Views 79
  • Downloads 0

How To Cite

Sumalatha GUNNALA, Shirisha KAKARLA, Srirama Murthy DASIKA (2018). An Attribute Involved Public Key Cryptosystem Based on P-Sylow Subgroups and Randomization. Journal of Applied Computer Science & Mathematics, 12(25), 34-38.