2015
DOI: 10.17148/ijarcce.2015.43142
|View full text |Cite
|
Sign up to set email alerts
|

Key Escrow Removal Using Random Oracle in CP-ABE for Security in Military Networks

Abstract: Abstract:In this paper, Confidential Data Security Methodology has been modified by using random key authority generation replacing two-party computation protocol to remove the disadvantage KEY ESCROW, with recent adoption and spreading of data sharing. One or more trusted parties supply information to decrypt ciphertext. Trusted parties are known as central authorities provide information in form of data recovery keys. Key escrow refers to the safeguarding of those data recovery keys. In this paper random key… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Publication Types

Select...

Relationship

0
0

Authors

Journals

citations
Cited by 0 publications
references
References 5 publications
0
0
0
Order By: Relevance

No citations

Set email alert for when this publication receives citations?