Two Efficient Outsourced ABS (OABS) Schemes Denoted By OABS-I And OABS-II To Build An Efficient Outsourced Verifying Protocol
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2015, Vol 3, Issue 11
Abstract
Attribute-based signature (ABS) facilitates revelry to mark a message with fine-grained access control over make out information. Particularly, in an ABS system, users get hold of their attribute private keys from an attribute authority, with which they can presently sign messages for any predicate fulfilled by their attributes. We first advise and formalize a new concept called Outsourced ABS, i.e., OABS, in which the computational overhead at user side is really concentrated through outsourcing concentrated computations to an untrusted signing-cloud service provider (S-CSP). In addition, we be relevant this novel paradigm to existing ABS schemes to decrease the difficulty.
Authors and Affiliations
M. Vamsi Krishna| Dept. of CSE, Chaitanya Institute of Science & Technology, Kakinada, AP, India, S. Madhuri| Dept. of CSE, Chaitanya Institute of Science & Technology, Kakinada, AP, India, Y. Praveen Kumar| Dept. of CSE, Chaitanya Institute of Science & Technology, Kakinada, AP, India
An opportunistic routing algorithm adopts no awareness about the channel statistics and network, but practices a reinforcement learning framework in order to qualify the nodes to familiarize their routing strategies,...
Semi Z Source Inverter (QZSI) an improvement to Z Source Inverter (ZSI). The benefits of QZSI can be recorded as lower segment appraisals, decreases exchanging ripples, reduced segment tally and rearranged control te...
Effective Stint Harmonisation For Mobile In Marine Sensor Networks
Deploy underwater sensors to record data during the monitoring mission, and then recover the instruments. This approach has the problems on Real time monitoring is not possible. No interaction is possible between ons...
Contribution of Information Sharing In Wireless Sensor Network With Prune Delay
The increase in the number of smart phone users has lead to the increase in the peer-to-peer adhoc content sharing. Traditional data delivery schemes are not suitable for such networks due to intermittent connectivit...
Seculation Routing With Fortification Wireless Networks
Wireless sensor networks having so many problems a number of solutios enough? security issues, discusses some existing solutions, and suggests possible research directions like key establishment secrecy,authenticatio...