SlideShare a Scribd company logo
Attribute-Based Encryption With Verifiable Outsourced Decryption
ABSTRACT:
Attribute-based encryption (ABE) is a public-keybased one-to-many encryption that allows
users to encrypt and decrypt data based on user attributes. A promising application of ABE is
flexible access control of encrypted data stored in the cloud, using access polices and ascribed
attributes associated with private keys and ciphertexts.One of themain efficiency drawbacks of
the existing ABE schemes is that decryption involves expensive pairing operations and the
number of such operations grows with the complexity of the access policy. Recently, Green et
al. proposed an ABE system with outsourced decryption that largely eliminates the decryption
overhead for users. In such a system, a user provides an untrusted server, say a cloud service
provider, with a transformation key that allows the cloud to translate any ABE ciphertext
satisfied by that user’s attributes or access policy into a simple ciphertext, and it only incurs a
small computational overhead for the user to recover the plaintext from the transformed
ciphertext. Security of an ABE system with outsourced decryption ensures that an adversary
(including a malicious cloud) will not be able to learn anything about the encrypted message;
however, it does not guarantee the correctness of the transformation done by the cloud. In this
paper, we consider a new requirement of ABE with outsourced decryption: verifiability.
Informally, verifiability guarantees that a user can efficiently check if the transformation is done
correctly. We give the formal model of ABE with verifiable outsourced decryption and propose
GLOBALSOFT TECHNOLOGIES
IEEE PROJECTS & SOFTWARE DEVELOPMENTS
IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE
BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS
CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401
Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com
a concrete scheme. We prove that our new scheme is both secure and verifiable, without relying
on random oracles. Finally, we show an implementation of our scheme and result of
performance measurements, which indicates a significant reduction on computing resources
imposed on users.
EXISTING SYSTEM:
Green et al. proposed an ABE system with outsourced decryption that largely eliminates the
decryption overhead for users. In such a system, a user provides an untrusted server, say a cloud
service provider, with a transformation key that allows the cloud to translate any ABE
ciphertext satisfied by that user’s attributes or access policy into a simple ciphertext, and it only
incurs a small computational overhead for the user to recover the plaintext from the transformed
ciphertext.
DISADVANTAGES OF EXISTING SYSTEM:
One of the main efficiency drawbacks of the most existing ABE schemes is that decryption is
expensive for resource-limited devices due to pairing operations, and the number of pairing
operations required to decrypt a ciphertext grows with the complexity of the access policy. At
the cost of security, only proven in a weak model (i.e., selective security), there exist several
expressive ABE schemes where the decryption algorithm only requires a constant number of
pairing computations.
PROPOSED SYSTEM:
In this paper, we first modify the original model of ABE with outsourced decryption in existing
system to allow for verifiability of the transformations. After describing the formal definition of
verifiability, we propose a new ABE model and based on this new model construct a concrete
ABE scheme with verifiable outsourced decryption. Our scheme does not rely on random
oracles.
ADVANTAGES OF PROPOSED SYSTEM:
 Proposed scheme does not rely on random oracles
 The scheme substantially reduced the computation time required for resource-limited
devices to recover plaintexts.
SYSTEM ARCHITECTURE:
ALGORITHMS
USED:
 Setup
 KeyGen
 Encrypt
 Decrypt
 GenTK
 Transform
 Decrypt out
SYSTEM CONFIGURATION:-
HARDWARE CONFIGURATION:-
 Processor - Pentium –IV
 Speed - 1.1 Ghz
 RAM - 256 MB(min)
 Hard Disk - 20 GB
 Key Board - Standard Windows Keyboard
 Mouse - Two or Three Button Mouse
 Monitor - SVGA
SOFTWARE CONFIGURATION:-
 Operating System : Windows XP
 Programming Language : JAVA/J2EE.
 Java Version : JDK 1.6 & above.
 Database : MYSQL
REFERENCE:
Junzuo Lai, Robert H. Deng, Chaowen Guan, and Jian Weng, “Attribute-Based Encryption
With Verifiable Outsourced Decryption”, IEEE TRANSACTIONS ON INFORMATION
FORENSICS AND SECURITY, VOL. 8, NO. 8, AUGUST 2013.
DOMAIN: WIRELESS NETWORK PROJECTS

More Related Content

What's hot (20)

DOCX
Privacy preserving public auditing for regenerating-code-based cloud storage
parry prabhu
 
DOCX
expressive, efficient, and revocable data access control for multi authority ...
swathi78
 
PDF
Privacy preserving public auditing for regenerating code based cloud storage
kitechsolutions
 
DOC
Hasbe a hierarchical attribute based solution
IMPULSE_TECHNOLOGY
 
DOC
An efficient certificate less encryption for
Shakas Technologies
 
DOCX
Audit free cloud storage via deniable attribute based encryption
Mano Sriram
 
PPTX
Privacy preserving public auditing
vmshimavm
 
PPT
Privacy preserving public auditing for secure cloud storage
Mustaq Syed
 
PPTX
Privacy preserving public auditing for regenerating-code-based cloud storage
Nagamalleswararao Tadikonda
 
PDF
Privacy preserving public auditing for regenerating-code-based cloud storage
LeMeniz Infotech
 
PPTX
An efficient certificateless encryption for data sharing on public cloud
Abhijeet Patil
 
DOCX
An Attribute-based Controlled Collaborative Access Control Scheme for Public ...
JAYAPRAKASH JPINFOTECH
 
PPT
Privacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
Girish Chandra
 
PDF
IRJET- Data Centric Access Control Solution with Role baesd Proxy Re-Encryption
IRJET Journal
 
PPTX
PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING
Kayalvizhi Selvaraj
 
DOCX
Attribute based encryption with verifiable outsourced decryption
JPINFOTECH JAYAPRAKASH
 
PPTX
PUBLIC AUDITING FOR SECURE CLOUD STORAGE ...
Bharath Nair
 
PPT
Privacy preserving public auditing for regenerating-code-based
Nagamalleswararao Tadikonda
 
PPTX
cloud computing preservity
chennuruvishnu
 
PDF
Acquisition of Secured Data from Cloud
IJMTST Journal
 
Privacy preserving public auditing for regenerating-code-based cloud storage
parry prabhu
 
expressive, efficient, and revocable data access control for multi authority ...
swathi78
 
Privacy preserving public auditing for regenerating code based cloud storage
kitechsolutions
 
Hasbe a hierarchical attribute based solution
IMPULSE_TECHNOLOGY
 
An efficient certificate less encryption for
Shakas Technologies
 
Audit free cloud storage via deniable attribute based encryption
Mano Sriram
 
Privacy preserving public auditing
vmshimavm
 
Privacy preserving public auditing for secure cloud storage
Mustaq Syed
 
Privacy preserving public auditing for regenerating-code-based cloud storage
Nagamalleswararao Tadikonda
 
Privacy preserving public auditing for regenerating-code-based cloud storage
LeMeniz Infotech
 
An efficient certificateless encryption for data sharing on public cloud
Abhijeet Patil
 
An Attribute-based Controlled Collaborative Access Control Scheme for Public ...
JAYAPRAKASH JPINFOTECH
 
Privacy Preserving Public Auditing for Data Storage Security in Cloud.ppt
Girish Chandra
 
IRJET- Data Centric Access Control Solution with Role baesd Proxy Re-Encryption
IRJET Journal
 
PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING
Kayalvizhi Selvaraj
 
Attribute based encryption with verifiable outsourced decryption
JPINFOTECH JAYAPRAKASH
 
PUBLIC AUDITING FOR SECURE CLOUD STORAGE ...
Bharath Nair
 
Privacy preserving public auditing for regenerating-code-based
Nagamalleswararao Tadikonda
 
cloud computing preservity
chennuruvishnu
 
Acquisition of Secured Data from Cloud
IJMTST Journal
 

Similar to Attribute based encryption with verifiable outsourced decryption (20)

PDF
Identifying the Performance Efficiency Of Attribute Based Encryption With Sec...
IJSRD
 
PDF
Key aggregate cryptosystem for scalable data sharing in cloud storage
Shakas Technologies
 
PDF
Outsourced kp abe with chosen ciphertext security
csandit
 
PDF
IRJET- Integrity Verification and Attribute based Encryption for Cloud Storage
IRJET Journal
 
DOC
Key aggregate cryptosystem for scalable data sharing in cloud storage
Adz91 Digital Ads Pvt Ltd
 
PDF
Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable D...
1crore projects
 
PDF
Attribute-Based Encryption for Access of Secured Data in Cloud Storage
IJSRD
 
PDF
IRJET- Attribute based Access Control for Cloud Data Storage
IRJET Journal
 
PDF
Flexible and fine grained attribute-based data storage in cloud computing
Shakas Technologies
 
PDF
Flexible and fine grained attribute-based data storage in cloud computing
Shakas Technologies
 
PDF
Attribute Based Encryption with Attribute Hiding in Cloud Storage
IJTET Journal
 
PDF
Generic and efficient constructions of attribute based encryption with verifi...
LeMeniz Infotech
 
DOCX
Circuit ciphertext policy attribute-based hybrid encryption with verifiable
cloudtechnologies42
 
PDF
Secured Authorized Data Using Hybrid Encryption in Cloud Computing
IJERA Editor
 
PDF
Ijcatr04051007
Editor IJCATR
 
PDF
Ijcatr04051002
Editor IJCATR
 
PDF
A Survey on Identity Based Encryption in Cloud Computing
IRJET Journal
 
PDF
IRJET- Audit Free Cloud Via Deniable Attribute based Encryption
IRJET Journal
 
DOCX
efficient io t management with resilience to unauthorized access to cloud sto...
Venkat Projects
 
Identifying the Performance Efficiency Of Attribute Based Encryption With Sec...
IJSRD
 
Key aggregate cryptosystem for scalable data sharing in cloud storage
Shakas Technologies
 
Outsourced kp abe with chosen ciphertext security
csandit
 
IRJET- Integrity Verification and Attribute based Encryption for Cloud Storage
IRJET Journal
 
Key aggregate cryptosystem for scalable data sharing in cloud storage
Adz91 Digital Ads Pvt Ltd
 
Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable D...
1crore projects
 
Attribute-Based Encryption for Access of Secured Data in Cloud Storage
IJSRD
 
IRJET- Attribute based Access Control for Cloud Data Storage
IRJET Journal
 
Flexible and fine grained attribute-based data storage in cloud computing
Shakas Technologies
 
Flexible and fine grained attribute-based data storage in cloud computing
Shakas Technologies
 
Attribute Based Encryption with Attribute Hiding in Cloud Storage
IJTET Journal
 
Generic and efficient constructions of attribute based encryption with verifi...
LeMeniz Infotech
 
Circuit ciphertext policy attribute-based hybrid encryption with verifiable
cloudtechnologies42
 
Secured Authorized Data Using Hybrid Encryption in Cloud Computing
IJERA Editor
 
Ijcatr04051007
Editor IJCATR
 
Ijcatr04051002
Editor IJCATR
 
A Survey on Identity Based Encryption in Cloud Computing
IRJET Journal
 
IRJET- Audit Free Cloud Via Deniable Attribute based Encryption
IRJET Journal
 
efficient io t management with resilience to unauthorized access to cloud sto...
Venkat Projects
 
Ad

More from IEEEFINALYEARPROJECTS (20)

DOCX
Scalable face image retrieval using attribute enhanced sparse codewords
IEEEFINALYEARPROJECTS
 
DOCX
Scalable face image retrieval using attribute enhanced sparse codewords
IEEEFINALYEARPROJECTS
 
DOCX
Reversible watermarking based on invariant image classification and dynamic h...
IEEEFINALYEARPROJECTS
 
DOCX
Reversible data hiding with optimal value transfer
IEEEFINALYEARPROJECTS
 
DOCX
Query adaptive image search with hash codes
IEEEFINALYEARPROJECTS
 
DOCX
Noise reduction based on partial reference, dual-tree complex wavelet transfo...
IEEEFINALYEARPROJECTS
 
DOCX
Local directional number pattern for face analysis face and expression recogn...
IEEEFINALYEARPROJECTS
 
DOCX
An access point based fec mechanism for video transmission over wireless la ns
IEEEFINALYEARPROJECTS
 
DOCX
Towards differential query services in cost efficient clouds
IEEEFINALYEARPROJECTS
 
DOCX
Spoc a secure and privacy preserving opportunistic computing framework for mo...
IEEEFINALYEARPROJECTS
 
DOCX
Secure and efficient data transmission for cluster based wireless sensor netw...
IEEEFINALYEARPROJECTS
 
DOCX
Privacy preserving back propagation neural network learning over arbitrarily ...
IEEEFINALYEARPROJECTS
 
DOCX
Non cooperative location privacy
IEEEFINALYEARPROJECTS
 
DOCX
Harnessing the cloud for securely outsourcing large
IEEEFINALYEARPROJECTS
 
DOCX
Geo community-based broadcasting for data dissemination in mobile social netw...
IEEEFINALYEARPROJECTS
 
DOCX
Enabling data dynamic and indirect mutual trust for cloud computing storage s...
IEEEFINALYEARPROJECTS
 
DOCX
Dynamic resource allocation using virtual machines for cloud computing enviro...
IEEEFINALYEARPROJECTS
 
DOCX
A secure protocol for spontaneous wireless ad hoc networks creation
IEEEFINALYEARPROJECTS
 
DOCX
Utility privacy tradeoff in databases an information-theoretic approach
IEEEFINALYEARPROJECTS
 
DOCX
Two tales of privacy in online social networks
IEEEFINALYEARPROJECTS
 
Scalable face image retrieval using attribute enhanced sparse codewords
IEEEFINALYEARPROJECTS
 
Scalable face image retrieval using attribute enhanced sparse codewords
IEEEFINALYEARPROJECTS
 
Reversible watermarking based on invariant image classification and dynamic h...
IEEEFINALYEARPROJECTS
 
Reversible data hiding with optimal value transfer
IEEEFINALYEARPROJECTS
 
Query adaptive image search with hash codes
IEEEFINALYEARPROJECTS
 
Noise reduction based on partial reference, dual-tree complex wavelet transfo...
IEEEFINALYEARPROJECTS
 
Local directional number pattern for face analysis face and expression recogn...
IEEEFINALYEARPROJECTS
 
An access point based fec mechanism for video transmission over wireless la ns
IEEEFINALYEARPROJECTS
 
Towards differential query services in cost efficient clouds
IEEEFINALYEARPROJECTS
 
Spoc a secure and privacy preserving opportunistic computing framework for mo...
IEEEFINALYEARPROJECTS
 
Secure and efficient data transmission for cluster based wireless sensor netw...
IEEEFINALYEARPROJECTS
 
Privacy preserving back propagation neural network learning over arbitrarily ...
IEEEFINALYEARPROJECTS
 
Non cooperative location privacy
IEEEFINALYEARPROJECTS
 
Harnessing the cloud for securely outsourcing large
IEEEFINALYEARPROJECTS
 
Geo community-based broadcasting for data dissemination in mobile social netw...
IEEEFINALYEARPROJECTS
 
Enabling data dynamic and indirect mutual trust for cloud computing storage s...
IEEEFINALYEARPROJECTS
 
Dynamic resource allocation using virtual machines for cloud computing enviro...
IEEEFINALYEARPROJECTS
 
A secure protocol for spontaneous wireless ad hoc networks creation
IEEEFINALYEARPROJECTS
 
Utility privacy tradeoff in databases an information-theoretic approach
IEEEFINALYEARPROJECTS
 
Two tales of privacy in online social networks
IEEEFINALYEARPROJECTS
 
Ad

Recently uploaded (20)

DOCX
Cryptography Quiz: test your knowledge of this important security concept.
Rajni Bhardwaj Grover
 
PDF
"Beyond English: Navigating the Challenges of Building a Ukrainian-language R...
Fwdays
 
PDF
Jak MŚP w Europie Środkowo-Wschodniej odnajdują się w świecie AI
dominikamizerska1
 
PPTX
WooCommerce Workshop: Bring Your Laptop
Laura Hartwig
 
PDF
"AI Transformation: Directions and Challenges", Pavlo Shaternik
Fwdays
 
PPTX
AUTOMATION AND ROBOTICS IN PHARMA INDUSTRY.pptx
sameeraaabegumm
 
PDF
CIFDAQ Market Wrap for the week of 4th July 2025
CIFDAQ
 
PDF
July Patch Tuesday
Ivanti
 
PDF
Go Concurrency Real-World Patterns, Pitfalls, and Playground Battles.pdf
Emily Achieng
 
DOCX
Python coding for beginners !! Start now!#
Rajni Bhardwaj Grover
 
PPTX
Future Tech Innovations 2025 – A TechLists Insight
TechLists
 
PDF
Exolore The Essential AI Tools in 2025.pdf
Srinivasan M
 
PPTX
From Sci-Fi to Reality: Exploring AI Evolution
Svetlana Meissner
 
PDF
CIFDAQ Token Spotlight for 9th July 2025
CIFDAQ
 
PDF
Reverse Engineering of Security Products: Developing an Advanced Microsoft De...
nwbxhhcyjv
 
PPTX
COMPARISON OF RASTER ANALYSIS TOOLS OF QGIS AND ARCGIS
Sharanya Sarkar
 
PDF
Agentic AI lifecycle for Enterprise Hyper-Automation
Debmalya Biswas
 
PDF
IoT-Powered Industrial Transformation – Smart Manufacturing to Connected Heal...
Rejig Digital
 
PDF
Newgen 2022-Forrester Newgen TEI_13 05 2022-The-Total-Economic-Impact-Newgen-...
darshakparmar
 
PDF
Newgen Beyond Frankenstein_Build vs Buy_Digital_version.pdf
darshakparmar
 
Cryptography Quiz: test your knowledge of this important security concept.
Rajni Bhardwaj Grover
 
"Beyond English: Navigating the Challenges of Building a Ukrainian-language R...
Fwdays
 
Jak MŚP w Europie Środkowo-Wschodniej odnajdują się w świecie AI
dominikamizerska1
 
WooCommerce Workshop: Bring Your Laptop
Laura Hartwig
 
"AI Transformation: Directions and Challenges", Pavlo Shaternik
Fwdays
 
AUTOMATION AND ROBOTICS IN PHARMA INDUSTRY.pptx
sameeraaabegumm
 
CIFDAQ Market Wrap for the week of 4th July 2025
CIFDAQ
 
July Patch Tuesday
Ivanti
 
Go Concurrency Real-World Patterns, Pitfalls, and Playground Battles.pdf
Emily Achieng
 
Python coding for beginners !! Start now!#
Rajni Bhardwaj Grover
 
Future Tech Innovations 2025 – A TechLists Insight
TechLists
 
Exolore The Essential AI Tools in 2025.pdf
Srinivasan M
 
From Sci-Fi to Reality: Exploring AI Evolution
Svetlana Meissner
 
CIFDAQ Token Spotlight for 9th July 2025
CIFDAQ
 
Reverse Engineering of Security Products: Developing an Advanced Microsoft De...
nwbxhhcyjv
 
COMPARISON OF RASTER ANALYSIS TOOLS OF QGIS AND ARCGIS
Sharanya Sarkar
 
Agentic AI lifecycle for Enterprise Hyper-Automation
Debmalya Biswas
 
IoT-Powered Industrial Transformation – Smart Manufacturing to Connected Heal...
Rejig Digital
 
Newgen 2022-Forrester Newgen TEI_13 05 2022-The-Total-Economic-Impact-Newgen-...
darshakparmar
 
Newgen Beyond Frankenstein_Build vs Buy_Digital_version.pdf
darshakparmar
 

Attribute based encryption with verifiable outsourced decryption

  • 1. Attribute-Based Encryption With Verifiable Outsourced Decryption ABSTRACT: Attribute-based encryption (ABE) is a public-keybased one-to-many encryption that allows users to encrypt and decrypt data based on user attributes. A promising application of ABE is flexible access control of encrypted data stored in the cloud, using access polices and ascribed attributes associated with private keys and ciphertexts.One of themain efficiency drawbacks of the existing ABE schemes is that decryption involves expensive pairing operations and the number of such operations grows with the complexity of the access policy. Recently, Green et al. proposed an ABE system with outsourced decryption that largely eliminates the decryption overhead for users. In such a system, a user provides an untrusted server, say a cloud service provider, with a transformation key that allows the cloud to translate any ABE ciphertext satisfied by that user’s attributes or access policy into a simple ciphertext, and it only incurs a small computational overhead for the user to recover the plaintext from the transformed ciphertext. Security of an ABE system with outsourced decryption ensures that an adversary (including a malicious cloud) will not be able to learn anything about the encrypted message; however, it does not guarantee the correctness of the transformation done by the cloud. In this paper, we consider a new requirement of ABE with outsourced decryption: verifiability. Informally, verifiability guarantees that a user can efficiently check if the transformation is done correctly. We give the formal model of ABE with verifiable outsourced decryption and propose GLOBALSOFT TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTS IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 Visit: www.finalyearprojects.org Mail to:[email protected]
  • 2. a concrete scheme. We prove that our new scheme is both secure and verifiable, without relying on random oracles. Finally, we show an implementation of our scheme and result of performance measurements, which indicates a significant reduction on computing resources imposed on users. EXISTING SYSTEM: Green et al. proposed an ABE system with outsourced decryption that largely eliminates the decryption overhead for users. In such a system, a user provides an untrusted server, say a cloud service provider, with a transformation key that allows the cloud to translate any ABE ciphertext satisfied by that user’s attributes or access policy into a simple ciphertext, and it only incurs a small computational overhead for the user to recover the plaintext from the transformed ciphertext. DISADVANTAGES OF EXISTING SYSTEM: One of the main efficiency drawbacks of the most existing ABE schemes is that decryption is expensive for resource-limited devices due to pairing operations, and the number of pairing operations required to decrypt a ciphertext grows with the complexity of the access policy. At the cost of security, only proven in a weak model (i.e., selective security), there exist several expressive ABE schemes where the decryption algorithm only requires a constant number of pairing computations. PROPOSED SYSTEM: In this paper, we first modify the original model of ABE with outsourced decryption in existing system to allow for verifiability of the transformations. After describing the formal definition of verifiability, we propose a new ABE model and based on this new model construct a concrete ABE scheme with verifiable outsourced decryption. Our scheme does not rely on random oracles.
  • 3. ADVANTAGES OF PROPOSED SYSTEM:  Proposed scheme does not rely on random oracles  The scheme substantially reduced the computation time required for resource-limited devices to recover plaintexts. SYSTEM ARCHITECTURE: ALGORITHMS USED:  Setup  KeyGen  Encrypt  Decrypt  GenTK  Transform  Decrypt out
  • 4. SYSTEM CONFIGURATION:- HARDWARE CONFIGURATION:-  Processor - Pentium –IV  Speed - 1.1 Ghz  RAM - 256 MB(min)  Hard Disk - 20 GB  Key Board - Standard Windows Keyboard  Mouse - Two or Three Button Mouse  Monitor - SVGA SOFTWARE CONFIGURATION:-  Operating System : Windows XP  Programming Language : JAVA/J2EE.  Java Version : JDK 1.6 & above.  Database : MYSQL REFERENCE: Junzuo Lai, Robert H. Deng, Chaowen Guan, and Jian Weng, “Attribute-Based Encryption With Verifiable Outsourced Decryption”, IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 8, NO. 8, AUGUST 2013.