Preview

3.2 CP-Asbe Algorithm Analysis

Better Essays
Open Document
Open Document
1837 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
3.2 CP-Asbe Algorithm Analysis
3.2 CP-ASBE Algorithm

In the CP-ABE scheme, all the attributes belong to one monolithic set and there is no concept of sets involved. Hence the main challenge in its implementation is to prevent user collusion, which means different users combinign their attributes to satisfy a policy. This is acheived in CP-ABE by binding together attribute keys with a random unique nunber assigned to each user. In case of CP-ASBE, one must also prevent combining attributes belonging to different sets. This is acheived by using a unique random nuber assigned to each attribute set inaddition to the unique number assigned to each user. At the same time it should also be able to allow specific combinations of attributes from different sets, as in case of translating nodes in an access-tree. The key idea in this construction is to include judiciously chosen additional values in the ciphertext (and in the key) that will allow a user to combine attributes from multiple sets all belonging to the same user. As it turns out, such a modification could introduce new subtle ways for multiple users to combine their attributes.
…show more content…
The Setup algorithm takes as input the depth of the key structure supported and generates a master key and a public key for the scheme. KeyGen takes the master-key generated by the setup, a user’s identity and an attribute set as input, and produces a secret key for the user. Encrypt algorithm takes as input the public key of the scheme, along with a message and an access tree, and generates a ciphertext as output. Finally, Decrypt takes a ciphertext and a secret-key (produced by KeyGen), and if the access-tree used to construct the ciphertext is satisfied by the attribute set for which the secret-key was generated, then it recovers the message from the ciphertext. Each of these algorithms are explained in detail

You May Also Find These Documents Helpful

  • Good Essays

    Match common encryption algorithms and methods with the scenarios representing real-world business applications and requirements.…

    • 406 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    For the second event Event2, the algorithm C does not abort during the challenge phase if one of d_0 and d_1 is 0. By the definition of H-list Pr[d_b=0]=1/(m!q_T+1) where b∈{0,1} and the two values are independent of one another, we have that both Pr[d_0=d_1=1]=1-1/q_T≥〖(1-1/(q_T+1))〗^2. Hence, the Pr[Event2] is at least 1/q_T. Since A never issues trapdoor queries for target keyword vectors, Event1 and Event2 are independent. Hence, the probability that C does not abort during the entire simulation, that is Pr[Event_1 ∧ Event_2]≥1/(eq_T).…

    • 111 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Given $U$ as the set all the devices located at the edge of the network with physical proximity of the device that wants to request computational resources $D$. Therefore, the PAR problem can be modeled as a graph $G$, where the vertexes of this graph are elements of the set U, and the edges of G are the communication link between them. In our approach, the vertexes are classified according to into the following types:…

    • 232 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    2) KeyGenSer(GP): Taking GP as an data or the input, this algorithm generates a private and public key combine (skS,pkS) for the data/information server.…

    • 259 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    A secure and efficient protocol is used, ECC elliptic curve cryptography a public key cryptography…

    • 470 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Nt1310 Unit 7 Answers

    • 1433 Words
    • 6 Pages

    Encryption is the process of transforming normal content, called plaintext, into unreadable gibberish, called ciphertext.…

    • 1433 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Cmgt/554 Week 2

    • 1453 Words
    • 6 Pages

    In order for an organization to be able to have an efficient and successful organization the proper Information Technology system (IT) must be in place, this document will demonstrate what system is in place to make sure system is running successfully.…

    • 1453 Words
    • 6 Pages
    Good Essays
  • Good Essays

    Lab #3

    • 517 Words
    • 3 Pages

    This lab demonstrated how hashing tools can be used to ensure message and file transfer integrity and how encryption can be used to maximize confidentiality. Common hashing and encryption tools, including MD5, SHA1, and GnuPG, were used. You used GnuPG to generate both a public and private key and a secret key for encryption only.…

    • 517 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    lab 2

    • 398 Words
    • 2 Pages

    7. What do you need if you want to decrypt encrypted messages and fi les from a trusted sender?…

    • 398 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    | A new patient is admitted to the observation unit of the local hospital after a 10-foot fall from a ladder. The patient struck his head on the side of the garage as he fell into a hedge that somewhat broke his fall. He has significant bruising on the left side of his body and complains of a 5/10 pain under his left arm. A series of x-rays has been ordered in addition to an MRI. The physician completed a comprehensive history and physical examination. It was decided to admit the patient to observation based on some evidence that he may have hit the left side of his head during the fall. The medical decision making is moderately complex. The patient was discharged the following day.Select appropriate code:…

    • 1339 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    CBK Program Analysis

    • 412 Words
    • 2 Pages

    My goal for this year in the CBK program is to finish as many classes as possible and hopefully pass the program by the end of the school year. In order to achieve this goal I intend on going to school as often as I can. I also plan on taking as many classes as I can to gain the credits and knowledge I need to pass everything. I plan on putting in a lot of effort so I may continue to be in a straight path to better my future.…

    • 412 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    C02520 Analysis 2.1

    • 898 Words
    • 3 Pages

    In today’s society it would appear that we are communicating more as time passes with the addition to social media into individual lives. With applications such as Twitter, YouTube, and Face book, people are able to communicate with people around the world almost instantly as well as see the things that are being experienced in other countries. However, even though this has somehow made the world seem a bit smaller, communication has not gotten better. Miscommunication is actually now more readily noticeable because of the amount of social media that is available. We begin to see the societal and cultural factors that lead to misunderstandings resulting in miscommunication.…

    • 898 Words
    • 3 Pages
    Good Essays
  • Good Essays

    One of the projects that caused unforeseen consequences was the World Bank’s funding in the Polonoroeste Program in the late 1980’s. As outlined by the World Bank Operations Evaluation Department (Uma lele et al, 2000), this program was designed to build highway BR-364 in north western Brazil and incorporate this region into Brazil’s ascending economic machine. This project was partially funded by the World Bank for $434,400,000 USD (Uma lele et al, 2000). The Polonoroeste Program had some foreseeable objectionable outcomes as well as outcomes that were completely unanticipated. Through negative publicity generated by this project, the World Bank was forced to restructure itself to account for environmental concerns.…

    • 930 Words
    • 4 Pages
    Good Essays
  • Good Essays

    5. What is the difference between MD5sum and SHA1sum hashing calculations? Which is better and why? The difference between MD5sum and SHA1sum is that MD5: 128-bit/16-byte digest. Somewhat faster than SHA and SHA: 160-bit/20-byte digest. So SHA is more secure.…

    • 392 Words
    • 2 Pages
    Good Essays