SlideShare a Scribd company logo
MODULES
Architecture:
MODULES
 Cloud Storage
 Security Model
 Ciphertext-policy attribute-based encryption
 Hybrid encryption
 Email Authentication:
Cloud Storage
Cloud storage is a model of data storage where the digital data is stored in
logical pools, the physical storage spans multiple servers (and often locations),
and the physical environment is typically owned and managed by a hosting
company. These cloud storage providers are responsible for keeping the data
available and accessible, and the physical environment protected and running.
People and organizations buy or lease storage capacity from the providers to
store end user, organization, or application data.
Security Model
Since we use key encapsulation mechanism (KEM) and authenticated
encryption (AE) to build our hybrid VD-CPABE scheme, we describe the
security definition separately at first. The confidentiality property
(indistinguishability of encryptions under selective chosen plaintext attacks
(IND-CPA)) required for KEM is captured by the following games against
adversary A. Game.KEM • Init. The adversary gives a challenge access structure
f∗ , where it wishes to be challenged. • Setup. The simulator runs the Setup
algorithm and gives the public parameters PK to the adversary. • KeyGen
Queries I. The adversary makes repeated private key queries corresponding to
the sets of attributes x1, ..., xq1 . We require that ∀i ∈ q1 we have f∗ (xi) = 0.
Encrypt. The simulator encrypts K0 under the structure f∗, random chooses K1
from key space and flips a random coin b. Then the simulator sends Kb and the
ciphertext CK∗ to the adversary. • KeyGen Queries II. The adversary makes
repeated private key queries corresponding to the sets of attributes xq1 , ..., xq
where f∗(x) = 0. • Guess. The adversary outputs a guess b′ of b. We define the
advantage of an adversary A in this game is Pr[b′ = b] − 1 2 . Then a KEM
scheme is secure against selective chosen plaintext attacks if the advantage is
negligible. The confidentiality property (indistinguishability of encryptions
under selective chosen ciphertext attacks (IND-CCA)) required for AE is
captured by the following games against adversary A. Game.AE • Init. The
adversary submits two equal length messages M0 and M1. • Setup. The
simulator runs the Setup algorithm and generators the symmetric key KAE. •
Encrypt. The simulator flips a random coin b, encrypts Mb under the symmetric
key KAE, generates the ciphertext C∗ and gives it to the adversary. • Decrypt
Queries. The adversary makes repeated decryption queries. When the given
ciphertext C ̸= C∗, the simulator will return DKAE(C) and σKAE(C) to the
adversary.
Ciphertext-policy attribute-based encryption
In this section, we present the definition and security model of our hybrid VD-
CPABE. In such a system, a circuit ciphertext-policy attribute-based encryption scheme,
a symmetric encryption scheme and an encrypt-then-mac mechanism are applied to
ensure the confidentiality, the fine-grained access control and the verifiable delegation
A hybrid VD-CPABE scheme is defined by a tuple of algorithms (Setup, Hybrid-
Encrypt, Key- Gen, Transform, Verify-Decrypt). The description of each algorithm is as
follows. • Setup(λ, n, l). Executed by the authority, this algorithm takes as input a
security parameter λ, the number of attributes n and the maximum depth l of a circuit.
It outputs the public parameters PK and a master key MK which is kept secret. more
information. This article has been accepted for publication in a future issue of this
journal, but has not been fully edited. Content may change prior to final publication.
Citation information: DOI 10.1109/TPDS.2015.2392752, IEEE Transactions on Parallel
and Distributed Systems XU et al.: circuit ciphertext-policy attribute-based hybrid
encryption with verifiable delegation in cloud computing 5 • Hybrid-Encrypt(PK,M, f).
This algorithm is executed by the data owner. It could be conveniently divided into two
parts: key encapsulation mechanism (KEM) and authenticated symmetric encryption
(AE). – The KEM algorithm takes as input the public parameters PK and an access
structure f for circuit. It computes the complement circuit f and chooses a random string
R. Then it generates KM = {dkm, vkm}, KR = {dkr, vkr} and the CP-ABE ciphertext
(CKM,CKR). – The AE algorithm takes as input a message M, the random string R, the
symmetric key
Hybrid encryption
Hybrid encryption. Cramer and Shoup proposed the generic KEM/DEM
construction for hybrid encryption which can encrypt messages of arbitrary
length. Based on their ingenious work, a one-time MAC were combined with
symmetric encryption to develop the KEM/DEM model for hybrid encryption
Such improved model has the advantage of achieving higher security
requirements. ABE with Verifiable Delegation. Since the introduction of ABE,
there have been advances in multiple directions. The application of outsourcing
computation is one of an important direction. Green et aldesigned the first ABE
with outsourced decryption scheme to reduce the computation cost during
decryption. After that, Lai et al. proposed the definition of ABE with verifiable
outsourced decryption. They seek to guarantee the correctness of the original
ciphertext by using a commitment. However, since the data owner generates a
commitment without any secret value about his identity, the untrusted server
can then forge a commitment for a message he chooses. Thus the ciphertext
relating to the message is at risk of being tampered. Further more, just modify
the commitments for the ciphertext relating to the message is not enough. The
cloud server can deceive the user with proper permissions by responding the
terminator ⊥ to cheat that he/she is not allowed to access to the data.
Email Authentication:
Email authentication is a collection of techniques aimed at equipping messages of the
email transport system with verifiable information. It is a coarse-grained authentication,
usually at Administrative Management Domain (ADMD) level, and implies no sort of
authorization. That is, the purpose of email authentication is to validate the identities of
the parties who participated in transferring a message, as they can modify the message.
The results of such validation can then be used in delivery decisions, which are beyond
the scope of email authentication proper, and are quite different in nature from
If you're receiving mail
Recipients can use authentication to verify the source of an incoming message and
avoid phishing scams. For example, if you see messages claiming to be from
google.com, but are not properly authenticated as coming from google.com, these are
phishing messages. You should not enter or send any personal information. Remember,
Google will never ask you to send personal information

More Related Content

What's hot (18)

PDF
A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...
IOSR Journals
 
PDF
Message authentication between the nodes
Selva Raj
 
DOC
Criptography approach using magnets
snv09
 
PDF
AN EFFICIENT PROXY SIGNCRYPTION SCHEME BASED ON THE DISCRETE LOGARITHM PROBLEM
Zac Darcy
 
DOCX
RSA - ENCRYPTION ALGORITHM CRYPTOGRAPHY
Qualcomm
 
DOCX
Cryptography and netwrk securityunit 4
mallikarjun batchanaboina
 
PPTX
Message integrity protocol
PriyaKarnan3
 
PDF
On the Usage of Chained Codes in Cryptography
CSCJournals
 
PPTX
Elgamal & schnorr digital signature scheme copy
North Cap University (NCU) Formely ITM University
 
PDF
Secured Source Anonymous Message Authentication Using Wireless Sensor Network
iosrjce
 
PPTX
Unit 4
KRAMANJANEYULU1
 
PDF
Hk07
Caominh Vu
 
PDF
WEAKNESS ON CRYPTOGRAPHIC SCHEMES BASED ON REGULAR LDPC CODES
IJNSA Journal
 
PDF
Info mimi-hop-by-hop authentication
Selva Raj
 
PDF
Info mimi-hop-by-hop authentication-copy
Selva Raj
 
PDF
Secrecy and Authenticity Properties of the Lightning Network Protocol
Hans Hyttel
 
DOC
Solutions crypto4e
Jack Ndahiro
 
PPTX
Digital signature
Coders Hub
 
A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...
IOSR Journals
 
Message authentication between the nodes
Selva Raj
 
Criptography approach using magnets
snv09
 
AN EFFICIENT PROXY SIGNCRYPTION SCHEME BASED ON THE DISCRETE LOGARITHM PROBLEM
Zac Darcy
 
RSA - ENCRYPTION ALGORITHM CRYPTOGRAPHY
Qualcomm
 
Cryptography and netwrk securityunit 4
mallikarjun batchanaboina
 
Message integrity protocol
PriyaKarnan3
 
On the Usage of Chained Codes in Cryptography
CSCJournals
 
Elgamal & schnorr digital signature scheme copy
North Cap University (NCU) Formely ITM University
 
Secured Source Anonymous Message Authentication Using Wireless Sensor Network
iosrjce
 
WEAKNESS ON CRYPTOGRAPHIC SCHEMES BASED ON REGULAR LDPC CODES
IJNSA Journal
 
Info mimi-hop-by-hop authentication
Selva Raj
 
Info mimi-hop-by-hop authentication-copy
Selva Raj
 
Secrecy and Authenticity Properties of the Lightning Network Protocol
Hans Hyttel
 
Solutions crypto4e
Jack Ndahiro
 
Digital signature
Coders Hub
 

Viewers also liked (10)

PPTX
A hybrid cloud approach for secure authorized deduplication
prudhvikumar madithati
 
PDF
Application of CP-ABE Scheme in Data Sharing System for confidentiality
Editor IJMTER
 
PDF
CP-ABE Scheme with extended reliability factor and load balancing in distribu...
International Journal of Engineering Inventions www.ijeijournal.com
 
PDF
The_Hydra - Bagaimana Menulis dan Memaintain Elektronik Hacking Magazine
idsecconf
 
PDF
Ijcatr04051002
Editor IJCATR
 
PDF
Presentation
Saikrishna Badrinarayanan
 
PDF
AN EFFICIENT FILE HIERARCHY ATTRIBUTE-BASED ENCRYPTION SCHEME IN CLOUD COMPUT...
Nexgen Technology
 
PPTX
Studi dan Implementasi Keamanan User Privacy menggunakan CP-ABE
idsecconf
 
PDF
Authenticated key exchange protocols for parallel network file systems
Pvrtechnologies Nellore
 
PPTX
A Fully Anonymous Attribute-Based Encryption to Control Cloud Data Access and...
Pawan Arya
 
A hybrid cloud approach for secure authorized deduplication
prudhvikumar madithati
 
Application of CP-ABE Scheme in Data Sharing System for confidentiality
Editor IJMTER
 
CP-ABE Scheme with extended reliability factor and load balancing in distribu...
International Journal of Engineering Inventions www.ijeijournal.com
 
The_Hydra - Bagaimana Menulis dan Memaintain Elektronik Hacking Magazine
idsecconf
 
Ijcatr04051002
Editor IJCATR
 
AN EFFICIENT FILE HIERARCHY ATTRIBUTE-BASED ENCRYPTION SCHEME IN CLOUD COMPUT...
Nexgen Technology
 
Studi dan Implementasi Keamanan User Privacy menggunakan CP-ABE
idsecconf
 
Authenticated key exchange protocols for parallel network file systems
Pvrtechnologies Nellore
 
A Fully Anonymous Attribute-Based Encryption to Control Cloud Data Access and...
Pawan Arya
 
Ad

Similar to Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable Delegation in Cloud Computing (20)

PPTX
FINAL REVIEW.pptx
AknNanthan
 
PPT
Information and data security cryptography and network security
Mazin Alwaaly
 
PDF
75227-144257-1-PB
Aneesh Kumar
 
PPTX
Security Consideration in 5G
Farhan Pervez
 
DOCX
Circuit ciphertext policy attribute-based hybrid encryption with verifiable d...
Shakas Technologies
 
PDF
Implementation of Secure Cloud Storage Gateway using Symmetric Key Algorithm
IOSR Journals
 
RTF
Kerberos case study
Mayuri Patil
 
PPTX
kerberos
sameer farooq
 
PDF
Secured Authorized Data Using Hybrid Encryption in Cloud Computing
IJERA Editor
 
PDF
Kerberos Protocol
Netwax Lab
 
PPTX
Key aggregate cryptosystem for scalable data sharing in cloud storage
Shruthi Iyer
 
PPTX
Efficient authentication for mobile and pervasive computing
IGEEKS TECHNOLOGIES
 
PPTX
Efficient authentication for mobile and pervasive computing
IGEEKS TECHNOLOGIES
 
PDF
IRJET- Audit Free Cloud Via Deniable Attribute based Encryption
IRJET Journal
 
PDF
A Robust Cryptographic System using Neighborhood-Generated Keys
IJORCS
 
PDF
A Robust Cryptographic System using Neighborhood-Generated Keys
IJORCS
 
PDF
A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...
Editor IJCATR
 
DOCX
Elliptic curve cryptography
Abhishek Kesharwani
 
PPTX
Rakesh raj
DBNCOET
 
PDF
Secure Data Storage on Cloud System for Privacy Preserving
IRJET Journal
 
FINAL REVIEW.pptx
AknNanthan
 
Information and data security cryptography and network security
Mazin Alwaaly
 
75227-144257-1-PB
Aneesh Kumar
 
Security Consideration in 5G
Farhan Pervez
 
Circuit ciphertext policy attribute-based hybrid encryption with verifiable d...
Shakas Technologies
 
Implementation of Secure Cloud Storage Gateway using Symmetric Key Algorithm
IOSR Journals
 
Kerberos case study
Mayuri Patil
 
kerberos
sameer farooq
 
Secured Authorized Data Using Hybrid Encryption in Cloud Computing
IJERA Editor
 
Kerberos Protocol
Netwax Lab
 
Key aggregate cryptosystem for scalable data sharing in cloud storage
Shruthi Iyer
 
Efficient authentication for mobile and pervasive computing
IGEEKS TECHNOLOGIES
 
Efficient authentication for mobile and pervasive computing
IGEEKS TECHNOLOGIES
 
IRJET- Audit Free Cloud Via Deniable Attribute based Encryption
IRJET Journal
 
A Robust Cryptographic System using Neighborhood-Generated Keys
IJORCS
 
A Robust Cryptographic System using Neighborhood-Generated Keys
IJORCS
 
A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...
Editor IJCATR
 
Elliptic curve cryptography
Abhishek Kesharwani
 
Rakesh raj
DBNCOET
 
Secure Data Storage on Cloud System for Privacy Preserving
IRJET Journal
 
Ad

Recently uploaded (20)

DOC
MRRS Strength and Durability of Concrete
CivilMythili
 
PPTX
MATLAB : Introduction , Features , Display Windows, Syntax, Operators, Graph...
Amity University, Patna
 
PDF
MAD Unit - 2 Activity and Fragment Management in Android (Diploma IT)
JappanMavani
 
PPT
Carmon_Remote Sensing GIS by Mahesh kumar
DhananjayM6
 
PPTX
Heart Bleed Bug - A case study (Course: Cryptography and Network Security)
Adri Jovin
 
PDF
Viol_Alessandro_Presentazione_prelaurea.pdf
dsecqyvhbowrzxshhf
 
PDF
AI TECHNIQUES FOR IDENTIFYING ALTERATIONS IN THE HUMAN GUT MICROBIOME IN MULT...
vidyalalltv1
 
PDF
Water Industry Process Automation & Control Monthly July 2025
Water Industry Process Automation & Control
 
DOCX
8th International Conference on Electrical Engineering (ELEN 2025)
elelijjournal653
 
PPT
Electrical Safety Presentation for Basics Learning
AliJaved79382
 
PPTX
Worm gear strength and wear calculation as per standard VB Bhandari Databook.
shahveer210504
 
PPTX
Arduino Based Gas Leakage Detector Project
CircuitDigest
 
PPTX
Introduction to Basic Renewable Energy.pptx
examcoordinatormesu
 
PPTX
Solar Thermal Energy System Seminar.pptx
Gpc Purapuza
 
PPTX
Element 11. ELECTRICITY safety and hazards
merrandomohandas
 
PDF
PORTFOLIO Golam Kibria Khan — architect with a passion for thoughtful design...
MasumKhan59
 
PPTX
fatigue in aircraft structures-221113192308-0ad6dc8c.pptx
aviatecofficial
 
DOCX
CS-802 (A) BDH Lab manual IPS Academy Indore
thegodhimself05
 
PPTX
DATA BASE MANAGEMENT AND RELATIONAL DATA
gomathisankariv2
 
PDF
Electrical Engineer operation Supervisor
ssaruntatapower143
 
MRRS Strength and Durability of Concrete
CivilMythili
 
MATLAB : Introduction , Features , Display Windows, Syntax, Operators, Graph...
Amity University, Patna
 
MAD Unit - 2 Activity and Fragment Management in Android (Diploma IT)
JappanMavani
 
Carmon_Remote Sensing GIS by Mahesh kumar
DhananjayM6
 
Heart Bleed Bug - A case study (Course: Cryptography and Network Security)
Adri Jovin
 
Viol_Alessandro_Presentazione_prelaurea.pdf
dsecqyvhbowrzxshhf
 
AI TECHNIQUES FOR IDENTIFYING ALTERATIONS IN THE HUMAN GUT MICROBIOME IN MULT...
vidyalalltv1
 
Water Industry Process Automation & Control Monthly July 2025
Water Industry Process Automation & Control
 
8th International Conference on Electrical Engineering (ELEN 2025)
elelijjournal653
 
Electrical Safety Presentation for Basics Learning
AliJaved79382
 
Worm gear strength and wear calculation as per standard VB Bhandari Databook.
shahveer210504
 
Arduino Based Gas Leakage Detector Project
CircuitDigest
 
Introduction to Basic Renewable Energy.pptx
examcoordinatormesu
 
Solar Thermal Energy System Seminar.pptx
Gpc Purapuza
 
Element 11. ELECTRICITY safety and hazards
merrandomohandas
 
PORTFOLIO Golam Kibria Khan — architect with a passion for thoughtful design...
MasumKhan59
 
fatigue in aircraft structures-221113192308-0ad6dc8c.pptx
aviatecofficial
 
CS-802 (A) BDH Lab manual IPS Academy Indore
thegodhimself05
 
DATA BASE MANAGEMENT AND RELATIONAL DATA
gomathisankariv2
 
Electrical Engineer operation Supervisor
ssaruntatapower143
 

Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable Delegation in Cloud Computing

  • 1. MODULES Architecture: MODULES  Cloud Storage  Security Model  Ciphertext-policy attribute-based encryption  Hybrid encryption  Email Authentication:
  • 2. Cloud Storage Cloud storage is a model of data storage where the digital data is stored in logical pools, the physical storage spans multiple servers (and often locations), and the physical environment is typically owned and managed by a hosting company. These cloud storage providers are responsible for keeping the data available and accessible, and the physical environment protected and running. People and organizations buy or lease storage capacity from the providers to store end user, organization, or application data. Security Model Since we use key encapsulation mechanism (KEM) and authenticated encryption (AE) to build our hybrid VD-CPABE scheme, we describe the security definition separately at first. The confidentiality property (indistinguishability of encryptions under selective chosen plaintext attacks (IND-CPA)) required for KEM is captured by the following games against adversary A. Game.KEM • Init. The adversary gives a challenge access structure f∗ , where it wishes to be challenged. • Setup. The simulator runs the Setup algorithm and gives the public parameters PK to the adversary. • KeyGen Queries I. The adversary makes repeated private key queries corresponding to the sets of attributes x1, ..., xq1 . We require that ∀i ∈ q1 we have f∗ (xi) = 0. Encrypt. The simulator encrypts K0 under the structure f∗, random chooses K1 from key space and flips a random coin b. Then the simulator sends Kb and the ciphertext CK∗ to the adversary. • KeyGen Queries II. The adversary makes repeated private key queries corresponding to the sets of attributes xq1 , ..., xq where f∗(x) = 0. • Guess. The adversary outputs a guess b′ of b. We define the advantage of an adversary A in this game is Pr[b′ = b] − 1 2 . Then a KEM
  • 3. scheme is secure against selective chosen plaintext attacks if the advantage is negligible. The confidentiality property (indistinguishability of encryptions under selective chosen ciphertext attacks (IND-CCA)) required for AE is captured by the following games against adversary A. Game.AE • Init. The adversary submits two equal length messages M0 and M1. • Setup. The simulator runs the Setup algorithm and generators the symmetric key KAE. • Encrypt. The simulator flips a random coin b, encrypts Mb under the symmetric key KAE, generates the ciphertext C∗ and gives it to the adversary. • Decrypt Queries. The adversary makes repeated decryption queries. When the given ciphertext C ̸= C∗, the simulator will return DKAE(C) and σKAE(C) to the adversary. Ciphertext-policy attribute-based encryption In this section, we present the definition and security model of our hybrid VD- CPABE. In such a system, a circuit ciphertext-policy attribute-based encryption scheme, a symmetric encryption scheme and an encrypt-then-mac mechanism are applied to ensure the confidentiality, the fine-grained access control and the verifiable delegation A hybrid VD-CPABE scheme is defined by a tuple of algorithms (Setup, Hybrid- Encrypt, Key- Gen, Transform, Verify-Decrypt). The description of each algorithm is as follows. • Setup(λ, n, l). Executed by the authority, this algorithm takes as input a security parameter λ, the number of attributes n and the maximum depth l of a circuit. It outputs the public parameters PK and a master key MK which is kept secret. more information. This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TPDS.2015.2392752, IEEE Transactions on Parallel and Distributed Systems XU et al.: circuit ciphertext-policy attribute-based hybrid encryption with verifiable delegation in cloud computing 5 • Hybrid-Encrypt(PK,M, f). This algorithm is executed by the data owner. It could be conveniently divided into two
  • 4. parts: key encapsulation mechanism (KEM) and authenticated symmetric encryption (AE). – The KEM algorithm takes as input the public parameters PK and an access structure f for circuit. It computes the complement circuit f and chooses a random string R. Then it generates KM = {dkm, vkm}, KR = {dkr, vkr} and the CP-ABE ciphertext (CKM,CKR). – The AE algorithm takes as input a message M, the random string R, the symmetric key Hybrid encryption Hybrid encryption. Cramer and Shoup proposed the generic KEM/DEM construction for hybrid encryption which can encrypt messages of arbitrary length. Based on their ingenious work, a one-time MAC were combined with symmetric encryption to develop the KEM/DEM model for hybrid encryption Such improved model has the advantage of achieving higher security requirements. ABE with Verifiable Delegation. Since the introduction of ABE, there have been advances in multiple directions. The application of outsourcing computation is one of an important direction. Green et aldesigned the first ABE with outsourced decryption scheme to reduce the computation cost during decryption. After that, Lai et al. proposed the definition of ABE with verifiable outsourced decryption. They seek to guarantee the correctness of the original ciphertext by using a commitment. However, since the data owner generates a commitment without any secret value about his identity, the untrusted server can then forge a commitment for a message he chooses. Thus the ciphertext relating to the message is at risk of being tampered. Further more, just modify the commitments for the ciphertext relating to the message is not enough. The cloud server can deceive the user with proper permissions by responding the terminator ⊥ to cheat that he/she is not allowed to access to the data.
  • 5. Email Authentication: Email authentication is a collection of techniques aimed at equipping messages of the email transport system with verifiable information. It is a coarse-grained authentication, usually at Administrative Management Domain (ADMD) level, and implies no sort of authorization. That is, the purpose of email authentication is to validate the identities of the parties who participated in transferring a message, as they can modify the message. The results of such validation can then be used in delivery decisions, which are beyond the scope of email authentication proper, and are quite different in nature from If you're receiving mail Recipients can use authentication to verify the source of an incoming message and avoid phishing scams. For example, if you see messages claiming to be from google.com, but are not properly authenticated as coming from google.com, these are
  • 6. phishing messages. You should not enter or send any personal information. Remember, Google will never ask you to send personal information