Paper title:

An Attribute Involved Public Key Cryptosystem Based on P-Sylow Subgroups and Randomization

Published in: Issue 1, (Vol. 12) / 2018
Publishing date: 2018-04-19
Pages: 34-38
Author(s): GUNNALA Sumalatha, KAKARLA Shirisha, DASIKA Srirama Murthy
Abstract. The Asymmetric Key Cryptosystem (AKC) or Public Key Encryption (PKE) is a mechanism used to encrypt the messages by using public key and decrypt the enciphered messages by using private key. Of late, the Attribute- Based Encryption (ABE) is an expansion of asymmetric key encryption scheme that allows users to encrypt and decrypt the plaintext messages using the key based on the user’s credentials, called attributes, like social security number, PAN (Permanent Account Number), email ids or Aadhar number etc. Most of the existing ABE schemes rely on the multiple attributes from which the access control policies are derived. These policies define the users’ private keys, required for the decryption process and access to the confidential information. In this paper, we proposed a new attribute based asymmetric cryptosystem that uses the features of both the schemes: PKE and ABE. Here, we used a value of an attribute, personal to the user, for the encryption and the decryption process. This scheme assures that the receiver will only be able to access the secret data if recipient is shared with the valid attribute value. The asymmetric nature is this scheme is based on the concept of p-sylow sub-group assumption. In addition, the randomization factor is used in the encipherment process to strengthen the cipher further. The development of this cryptosystem is an embodiment where the merits of randomized asymmetric encryption technique and the attribute based encryption are integrated to achieve the authentication on top of confidentiality to secure the information transmission over the public networks
Keywords: Attribute Based Cryptography, P-Sylow Subgroups Public Key Cryptography, Randomization

1. A. Sahai and B. Waters, Fuzzy Identity-Based Encryption, in Advances in Cryptology-Eurocrypt 2005, Springer-Verlag, LNCS 3494, (2005),pp 457-473.

2. A. Shamir, dentity-based Cryptosystems and Signature Schemes, in Advances in Cryptology-Crypto’84, Springer -Verlag, LNCS 196 (1985), pp 47-53.

3. C. Cocks, An identity based encryption scheme based on quadratic residue, In IMA International Conference, pp,.360-363, 2001.

4. D. Boneh and M. Franklin, Identity Based Encryption from the Weil Pairing. In Advances in Cryptology - CRYPTO, volume 2139 of LNCS, (2001),pp 213-229.Springer.

5. D.E. Knuth, The Art of Computer Programming, Addison-Wesley, 1981.

6. G. Sumalatha, K. Shirisha, D.S.R. Murthy , A Secure Intractable and Randomized Asymmetric Cryptosystem Involving p-Sylow Subgroup , journal of information and science, in press, 2017.

7. J. Baek, W. Susilo, and J. Zhou , New constructions of fuzzy identity-based encryption, in ACM Symposium on Information, Computer and Communications Security, ACM New York, NY, USA, (2007), pp. 368-370.

8. MarshallHallJr , On the number of Sylow subgroups in a finite group ,Journal of Algebra, Volume 7, Issue 3, (1967), pp 363-371.

9. P. Paillier , Public-Key Cryptosystems Based on Discrete Logarithms Residue, in Eurocrypt ’99, LNCS 1592, (1999), pp 223–238, Springer-Verlag.

10. S. Goldwasser and S. Micali , Probabilistic Encryption , in Journal of Computer and System Sciences (1984), pp 270–299.

11. T. El Gamal , A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms, in IEEE Transactions on Information Theory, volume IT–31, no. 4,(1985), pp 469–472.

12. T. Okamoto and S. Uchiyama (1998), “A new public key cryptosystem as secure as factoring”, in Proc. Eurocrypt ’98,(1998), pp 310–318.

13. V. Goyal, O. Pandey, A. Sahai, and B. Waters, Attribute based encryption for fine-grained access control of encrypted data, in Conference on Computer and Communications Security, 89-98, New York, ACM Press, pp 221-238., 2006.

Back to the journal content
Creative Commons License
This article is licensed under a
Creative Commons Attribution-ShareAlike 4.0 International License.
Home | Editorial Board | Author info | Archive | Contact
Copyright JACSM 2007-2023