An Attribute Involved Public Key Cryptosystem Based on P-Sylow Subgroups and Randomization

Journal Title: Journal of Applied Computer Science & Mathematics - Year 2018, Vol 12, Issue 25

Abstract

The Asymmetric Key Cryptosystem (AKC) or Public Key Encryption (PKE) is a mechanism used to encrypt the messages by using public key and decrypt the enciphered messages by using private key. Of late, the Attribute-Based Encryption (ABE) is an expansion of asymmetric key encryption scheme that allows users to encrypt and decrypt the plaintext messages using the key based on the user’s credentials, called attributes, like social security number, PAN (Permanent Account Number), email ids or Aadhar number etc. Most of the existing ABE schemes rely on the multiple attributes from which the access control policies are derived. These policies define the users’ private keys, required for the decryption process and access to the confidential information. In this paper, we proposed a new attribute based asymmetric cryptosystem that uses the features of both the schemes: PKE and ABE. Here, we used a value of an attribute, personal to the user, for the encryption and the decryption process. This scheme assures that the receiver will only be able to access the secret data if recipient is shared with the valid attribute value. The asymmetric nature is this scheme is based on the concept of p-sylow sub-group assumption. In addition, the randomization factor is used in the encipherment process to strengthen the cipher further. The development of this cryptosystem is an embodiment where the merits of randomized asymmetric encryption technique and the attribute based encryption are integrated to achieve the authentication on top of confidentiality to secure the information transmission over the public networks.

Authors and Affiliations

Sumalatha GUNNALA, Shirisha KAKARLA, Srirama Murthy DASIKA

Keywords

Related Articles

Development of Student Information Management System based on Cloud Computing Platform

The management and provision of information about the educational process is an essential part of effective management of the educational process in the institutes of higher education. In this paper the requirements of a...

Framework for Urdu News Headlines Classification

Automatic text classification has great significance in the field of text mining and plays a pivotal role in areas such as spam filtering, news classification, noise reduction etc. It is evident from the literature that...

Kalman Filters for Estimating the potential GDP

The estimation of the potential GDP has a twofold importance: on one hand its accurate estimation allows the correct dimensioning of the macroeconomic policies and on the other hand, the study of potential GDP is a resea...

APφ(R, C)-Spaces of Almost Periodic Functions

The spaces APφ(R, C), corresponding to functions φ ∈ K = Kamke class, have been defined and a few of their properties have been investigated in our recent paper [1]. The aim of this paper is to present some facts/propert...

Identification of Core Architecture Classes for Object-Oriented Software Systems

The new member of the software development team needs to understand the software prior making modifications to the unknown system. The core classes that constitute the system architecture can reveal important structural...

Download PDF file
  • EP ID EP532943
  • DOI 10.4316/JACSM.201801005
  • Views 177
  • Downloads 0

How To Cite

Sumalatha GUNNALA, Shirisha KAKARLA, Srirama Murthy DASIKA (2018). An Attribute Involved Public Key Cryptosystem Based on P-Sylow Subgroups and Randomization. Journal of Applied Computer Science & Mathematics, 12(25), 34-38. https://www.europub.co.uk/articles/-A-532943