Abstract
Public Key Infrastructure (PKI) is an important tool for securing information in the communication. Presently, a PKI framework demonstrates a pattern toward an emerging worldwide PKI which turns out to be more complicated. In this paper, we address the issue of a contact acquiring a message that it missed, from different contacts of the client while keeping up the secrecy of all gatherings required in the networks. Along these lines in this paper, we built up a specific peer-to-peer public key framework model realizing efficient hierarchical identity-based encryption a modification to the proposed by Boneh HIBE. The proposed scheme need not set up a maximum potential recipients set ahead of time, and it has steady size of the general public key, private key, and header of cipher content. We have utilized our proposed key issuing method to distribute private keys of the users to avoid escrow issue problem. We have presented performance analysis with comparison results assuming a PKI network environment.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Shamir, A.: Identity-based cryptosystems and signature schemes. In: Advances in Cryptology Crypto’84, LNCS, vol. 196, pp. 47–53. Springer (1984)
Boneh, D., Franklin, M.K.: Identity-based encryption from the Weil pairing. In: Kilian, J. (ed.) Advances in Cryptology—CRYPTO 2001, volume 2139 of Lecture Notes in Computer Science, pp. 213–229. Springer (2001)
Boneh, D., Boyen, X.: Efficient selective id secure identity-based encryption without random oracles. In: EUROCRYPT 2004, vol. 3027, pp. 223–238. Springer (2004)
Boneh, D., Boyen, X., Goh, E.: Hierarchical identity based encryption with constant size ciphertext. In: EUROCRYPT 2005, vol. 3494, pp. 440–456. Springer (2005)
Gentry, C., Silverberg, A.: Hierarchical id-based cryptography. In: Zheng, Y. (ed.) Advances in Cryptology—ASIACRYPT 2002, vol. 2501, pp. 548–566. Springer (2002)
Gentry, C.: Practical identity based encryption without random oracles. In: Vaudenay, S. (ed.) Advances in Cryptology—EUROCRYPT 2006, vol. 4004, pp. 445–464. Springer (2006)
Gentry, C., Halevi, S.: Hierarchical identity based encryption with polynomially many levels. In: Reingold, O. (ed.) Theory of Cryptography—TCC 2009, vol. 5444, pp. 437–456. Springer (2009)
Horwitz, J., Lynn, B.: Toward hierarchical identity-based encryption. In: Knudsen, L.R. (ed.) Advances in Cryptology—EUROCRYPT 2002, vol. 2332, pp. 466–481. Springer (2002)
Boldyreva, A., Goyal, V., Kumar, V.: Identity-based encryption with efficient revocation. In: Ning, P., Syverson, P.F., Jha, S. (eds.) ACM Conference on Computer and Communications Security, pp. 417–426. ACM (2008)
Waters, B.: Efficient identity-based encryption without random oracles. In: EUROCRYPT 2005, vol. 3494, pp. 114–127. Springer (2005)
Boyen, X., Waters, B.: Anonymous hierarchical identity based encryption (without random oracles). In: CRYPTO 2006, vol. 4117, pp. 290–307. Springer (2006)
Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Cramer, R. (ed.) Advances in Cryptology—EUROCRYPT 2005, vol. 3494, pp. 457–473. Springer (2005)
Seo, J.H., Emura, K.: Efficient delegation of key generation and revocation functionalities in identity-based encryption. In: Dawson, Ed. (ed.) Topics in Cryptology—CT-RSA 2013, vol. 7779, pp. 343–358 (2013)
Pedersen, T.P.: Non-interactive and information-theoretic secure verifiable secret sharing. In: Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology, CRYPTO91, pp. 129–140. Springer, London, UK (1992)
Lee, B., Boyd, E., Daeson, E., Kim, K., Yang, J., Yoo, S.: Secure key issuing in ID-based cryptography. In: Proceedings of the Second Australian Information Security Workshop-AISW 2004, pp. 69–74
Gangishetti, R., Gorantla, M.C., Das, M.L., Saxena, A., Gulati, V.P.: An efficient secure key issuing protocol in ID-based cryptosystems. In: Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC’05), vol. 1, pp. 674–678. IEEE Computer Society (2005)
Kalyani, D., Sridevi, R.: Robust distributed key issuing protocol for identity based cryptography. In: 2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI), Jaipur, 2016, pp. 821–825. https://doi.org/10.1109/ICACCI.2016.7732147
Baden, R., Bender, A., Spring, N., Bhattacharjee, B., Starin, D.: Persona: an online social network with user-defined privacy. SIGCOMM Comput. Commun. Rev. 39(4), 135146 (2009). https://doi.org/10.1145/1594977.1592585
Gunther, F., Manulis, M., Strufe, T.: Cryptographic treatment of private user profiles. In: Danezis, G., Dietrich, S., Sako, K. (eds.) Proceedings of the RLCPS FC 2011 Workshops, LNCS, vol. 7126, pp. 40–54. Springer (2011)
Guha, S., Tang, K., Francis, P.: NOYB: privacy in online social networks. Proceedings of the WOSN, p. 4954. ACM, New York, NY, USA (2008)
Luo, W., Xie, Q., Hengartner, U.: Facecloak: an architecture for user privacy on social networking sites. In: Proceedings of the IEEE CSE, pp. 26–33. IEEE, Washington, DC, USA (2009)
Gentry, C.: Practical identity-based encryption without random oracles. In: Vaudenay, S. (ed.) Proceedings of the Advances in Cryptology—EUROCRYPT 2006, vol. 4004, pp. 445–464 (2006)
Tentu, A.N., Mahapatra, B., Venkaiah, V.Ch., Kamakshi Prasad, V.: New secret sharing scheme for multipartite access structures with threshold changeability. In: ICACCI 2015, Kochi, India, 10–13 August 2015
Tentu, A.N., Rao, A.A.: Efficient Verifiable Multi-secret Sharing Based on Y.C.H. CSS 2014, vol. 448, pp. 100–109
Tentu, A.N., Paul, P., Venkaiah, V.Ch.: Conjunctive hierarchical secret sharing scheme based on MDS codes. In: IWOCA 2013, vol. 8288, pp. 463–467
Jahid, S., Mittal, P., Borisov, N.: EASiER: encryption-based access control in social networks with efficient revocation, pp. 411–415. ACM (2011)
Kalyani, D., Sridevi, R.: Survey on identity based and hierarchical identity based encryption schemes. Int. J. Comput. Appl. 134(14), 32–37 (2016)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Kalyani, D., Sridevi, R. (2019). Private Communication Based on Hierarchical Identity-Based Cryptography. In: Abraham, A., Dutta, P., Mandal, J., Bhattacharya, A., Dutta, S. (eds) Emerging Technologies in Data Mining and Information Security. Advances in Intelligent Systems and Computing, vol 755. Springer, Singapore. https://doi.org/10.1007/978-981-13-1951-8_67
Download citation
DOI: https://doi.org/10.1007/978-981-13-1951-8_67
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-1950-1
Online ISBN: 978-981-13-1951-8
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)