Journal of Chemical and Pharmaceutical Research (ISSN : 0975-7384)

header
Reach Us reach to JOCPR whatsapp-JOCPR +44 1625708989
All submissions of the EM system will be redirected to Online Manuscript Submission System. Authors are requested to submit articles directly to Online Manuscript Submission System of respective journal.

Original Articles: 2014 Vol: 6 Issue: 7

Verifiable multi-authority attribute based encryption scheme with different permissions

Abstract

In this paper, we study the traffic information granular computing theory and build traffic information fusion model, framework and implementation program based on granular computing. We raise uncertainty reduction algorithms for traffic flow prediction and congestion recognition algorithms based on granular computing theory, which will provide new ideas and methods in the complex decision making under uncertainty problems of the transportation systems. In an attribute based encryption scheme, each user is identified by a set of attributes, which are used to determined ecryption ability for each ciphertext. On the base of attribute based encryption and symmetric encryption algorithm, it proposes a verifiable multi-authority attribute based encryption scheme. In our scheme, access control permission is divided into two kinds: Read and Write for the first time. An encryptor can easily deal with this problem by using two different secret keys. When a user wants to get Read permission, he just needs to go to some authorities, yet not all. We also provide a verification scheme that ensures the integrity of data and realness of data sources. The encryptor generates a signature while encryption, the user carries out verification with given signature and the decrypted message. The scheme not only enhances the confidentiality of data, but also supports more flexible and more fine-grained access control strategy.

http://sacs17.amberton.edu/

rtp slot demo