Identity based and attribute based cryptography overcoming the cloud security issue while outsourcing cloud data.
Keywords:
cryptography, security, cloud computing.Abstract
An extension of the cryptographic technique of identity-based encryption (IBE), our proposed ABE scheme
can serve as the basis of an access-control architecture in which entities require no interaction with a trusted authority in
order to gain access to sensitive data. Changing scenario of cryptography has led to a change in paradigm of from
certificate based public keys and key rings to user-dependent keys which are based on identities of users or their
attributes. This is termed as identity based cryptography or attribute based cryptography. Such encryption schemes are
much relevant in current scenario of cloud computing and mobile computing where participation of user in transactions is
partial, or user-based access control over an encrypted database is required. This paper presents a survey of identity based
and attribute based cryptographic primitives