Identity-Based Encryption Using Multi-Authority in Cloud Computing

  • Unique Paper ID: 144041
  • PageNo: 202-206
  • Abstract:
  • Identity-Based Encryption (IBE) which makes simple to the public key and credential management at Public Key Infrastructure (PKI) is a significant option to public key encryption. The computation capacity of resource-confined devices with that of computer systems can not be in comparison when a betteruseful resource disturbing functions is to be carried out. Withfine to computer computers, mobile devices for instance,are less powerful in computations like video streaming,teleconferencing and even decrypting data. In this paper we are proposedusually three concepts i.e. Multi authority of users,key generation, encryption and decryption of cloudstorage data. By way of enforcing multi authority ofclients in cloud method we are using identification baseddigital signature schema. An extra concept fornew release of key utilizing random code key generationsystem.In this paper data encryption anddecryption method we're utilizing multiplied tinyencryption algorithm. In this paper we're alsoenforcing mailing principles for sending secondlevel. By means of making use of second degree we can get first stage forthe intent of data encryption and decryption.

Copyright & License

Copyright © 2026 Authors retain the copyright of this article. This article is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

BibTeX

@article{144041,
        author = {YADAMAKANTI VINAY KUMAR and M.OMPRAKASH},
        title = {Identity-Based Encryption Using Multi-Authority in Cloud Computing},
        journal = {International Journal of Innovative Research in Technology},
        year = {},
        volume = {3},
        number = {5},
        pages = {202-206},
        issn = {2349-6002},
        url = {https://ijirt.org/article?manuscript=144041},
        abstract = {Identity-Based Encryption (IBE) which makes simple to the public key and credential management at Public Key Infrastructure  (PKI)  is  a  significant  option  to  public  key  encryption. The computation capacity of resource-confined devices with that of computer systems can not be in comparison when a betteruseful resource disturbing functions is to be carried out. Withfine to computer computers, mobile devices for instance,are less powerful in computations like video streaming,teleconferencing and even decrypting data. In this paper we are proposedusually three concepts i.e. Multi authority of users,key generation, encryption and decryption of cloudstorage data. By way of enforcing multi authority ofclients in cloud method we are using identification baseddigital signature schema. An extra concept fornew release of key utilizing random code key generationsystem.In this paper data encryption anddecryption method we're utilizing multiplied tinyencryption algorithm. In this paper we're alsoenforcing mailing principles for sending secondlevel. By means of making use of second degree we can get first stage forthe intent of data encryption and decryption.},
        keywords = {multi authority, key generation, security, cloud computing, signature},
        month = {},
        }

Cite This Article

KUMAR, Y. V., & M.OMPRAKASH, (). Identity-Based Encryption Using Multi-Authority in Cloud Computing. International Journal of Innovative Research in Technology (IJIRT), 3(5), 202–206.

Related Articles