ISSN 2394-5125
 

Research Article 


ENCRYPTION OF TEXT USING IDENTITY BASED ENCRYPTION AND BLOOM FILTER

Dr. B. Indira Reddy, Chituprolu Rajesh Kumar.

Abstract
Identity-Based Encryption that means simplication of general public key and certificates control at Public
Key Infrastructure is a good-sized substitute in comparison to public-key encryption. Be that because it may, one of the
number one productiveness drawbacks of IBE is the transparency calculation at Private Key Generator in the course of
client revocation. Effective rejection has been complete focused in commonplace PKI settings, but the cumbersome
management of testaments is unequivocally the load that IBE endeavors to ease. At the existing time, at looking after the
critical difficulty of person refusal, we deliver redistributing figuring into IBE is the reason that and advocate a IBE plot
withinside the server setting. Our association offloads a large little bit of the important thing age-associated errands in the
course of key-giving and key-replace systems Key modernize cloud support provider, leave-taking simplest a predictable
wide variety of essential assignments for PKG and clients to carry out locally. This aim is practiced via way of means of
utilizing a unique information secure system: we use a crossbreed non-public key for each customer, entryway is
incorporated to interface and sure the person component and the time portion. As of the extension idea we're the usage of
the bloom clear out to encrypt the data. By the usage of this bloom clear out we're lowering the encryption time as
compared to different techniques.

Key words: Identity-based encryption, revocation, outsourcing, cloud computing, Bloom Filter Encryption.


 
ARTICLE TOOLS
Abstract
PDF Fulltext
How to cite this articleHow to cite this article
Citation Tools
Related Records
 Articles by Dr. B. Indira Reddy
Articles by Chituprolu Rajesh Kumar
on Google
on Google Scholar


How to Cite this Article
Pubmed Style

Dr. B. Indira Reddy, Chituprolu Rajesh Kumar. ENCRYPTION OF TEXT USING IDENTITY BASED ENCRYPTION AND BLOOM FILTER. JCR. 2020; 7(9): 2307-2309. doi:10.31838/jcr.07.09.375


Web Style

Dr. B. Indira Reddy, Chituprolu Rajesh Kumar. ENCRYPTION OF TEXT USING IDENTITY BASED ENCRYPTION AND BLOOM FILTER. http://www.jcreview.com/?mno=107322 [Access: May 30, 2021]. doi:10.31838/jcr.07.09.375


AMA (American Medical Association) Style

Dr. B. Indira Reddy, Chituprolu Rajesh Kumar. ENCRYPTION OF TEXT USING IDENTITY BASED ENCRYPTION AND BLOOM FILTER. JCR. 2020; 7(9): 2307-2309. doi:10.31838/jcr.07.09.375



Vancouver/ICMJE Style

Dr. B. Indira Reddy, Chituprolu Rajesh Kumar. ENCRYPTION OF TEXT USING IDENTITY BASED ENCRYPTION AND BLOOM FILTER. JCR. (2020), [cited May 30, 2021]; 7(9): 2307-2309. doi:10.31838/jcr.07.09.375



Harvard Style

Dr. B. Indira Reddy, Chituprolu Rajesh Kumar (2020) ENCRYPTION OF TEXT USING IDENTITY BASED ENCRYPTION AND BLOOM FILTER. JCR, 7 (9), 2307-2309. doi:10.31838/jcr.07.09.375



Turabian Style

Dr. B. Indira Reddy, Chituprolu Rajesh Kumar. 2020. ENCRYPTION OF TEXT USING IDENTITY BASED ENCRYPTION AND BLOOM FILTER. Journal of Critical Reviews, 7 (9), 2307-2309. doi:10.31838/jcr.07.09.375



Chicago Style

Dr. B. Indira Reddy, Chituprolu Rajesh Kumar. "ENCRYPTION OF TEXT USING IDENTITY BASED ENCRYPTION AND BLOOM FILTER." Journal of Critical Reviews 7 (2020), 2307-2309. doi:10.31838/jcr.07.09.375



MLA (The Modern Language Association) Style

Dr. B. Indira Reddy, Chituprolu Rajesh Kumar. "ENCRYPTION OF TEXT USING IDENTITY BASED ENCRYPTION AND BLOOM FILTER." Journal of Critical Reviews 7.9 (2020), 2307-2309. Print. doi:10.31838/jcr.07.09.375



APA (American Psychological Association) Style

Dr. B. Indira Reddy, Chituprolu Rajesh Kumar (2020) ENCRYPTION OF TEXT USING IDENTITY BASED ENCRYPTION AND BLOOM FILTER. Journal of Critical Reviews, 7 (9), 2307-2309. doi:10.31838/jcr.07.09.375