An Attribute Involved Public Key Cryptosystem Based on P-Sylow Subgroups and Randomization

Journal Title: Journal of Applied Computer Science & Mathematics - Year 2018, Vol 12, Issue 25

Abstract

The Asymmetric Key Cryptosystem (AKC) or Public Key Encryption (PKE) is a mechanism used to encrypt the messages by using public key and decrypt the enciphered messages by using private key. Of late, the Attribute-Based Encryption (ABE) is an expansion of asymmetric key encryption scheme that allows users to encrypt and decrypt the plaintext messages using the key based on the user’s credentials, called attributes, like social security number, PAN (Permanent Account Number), email ids or Aadhar number etc. Most of the existing ABE schemes rely on the multiple attributes from which the access control policies are derived. These policies define the users’ private keys, required for the decryption process and access to the confidential information. In this paper, we proposed a new attribute based asymmetric cryptosystem that uses the features of both the schemes: PKE and ABE. Here, we used a value of an attribute, personal to the user, for the encryption and the decryption process. This scheme assures that the receiver will only be able to access the secret data if recipient is shared with the valid attribute value. The asymmetric nature is this scheme is based on the concept of p-sylow sub-group assumption. In addition, the randomization factor is used in the encipherment process to strengthen the cipher further. The development of this cryptosystem is an embodiment where the merits of randomized asymmetric encryption technique and the attribute based encryption are integrated to achieve the authentication on top of confidentiality to secure the information transmission over the public networks.

Authors and Affiliations

Sumalatha GUNNALA, Shirisha KAKARLA, Srirama Murthy DASIKA

Keywords

Related Articles

Secure and Efficient Diffusion Layers for Block Ciphers

Abstract–Modern block ciphers are designed to meet confusion and diffusion criteria. Substitution and permutation layers are used in the round function for this purpose. In this paper, we present a number of choices for...

Two-dimensional Spectral Approximation

In this article, we propose a two-dimensional polynomial basis which extends Legendre series approximation to bivariate functions. We also present a theoretical study of the stability and the error estimation of the Ta...

Application of Stand-PSO Technique for Optimization Cameras’ 2D Dispositions in a MoCap system

In this paper, a detailed study of the Particle Swarm Optimization (PSO) technique is given in its standard version to solve a network camera placement problem and to ensure the coverage of a reflector point by, at least...

Real World Applications of MGR, Neeva and KN-Hash

Hash functions have prominent role in cryptography because of their ubiquitous applications in real world. Earlier, it was used for authentication only but with continuous research and development, it has been started us...

Reduced Differential Transform Method for Exact Solution of Parabolic and Hyperbolic Partial Differential Equations

Aim of the paper is to obtain solution of parabolic, elliptical and coupled partial differential equation using Reduced Differential Transform Method (RDTM). The results are compared with solution obtained by other metho...

Download PDF file
  • EP ID EP532943
  • DOI 10.4316/JACSM.201801005
  • Views 164
  • Downloads 0

How To Cite

Sumalatha GUNNALA, Shirisha KAKARLA, Srirama Murthy DASIKA (2018). An Attribute Involved Public Key Cryptosystem Based on P-Sylow Subgroups and Randomization. Journal of Applied Computer Science & Mathematics, 12(25), 34-38. https://europub.co.uk/articles/-A-532943