Volume 17, Number 6

Enhancing Distributed Authorization with Lagrange Interpolation and Attribute-Based Encryption

  Authors

Keshav Sinha 1, Sumitra 1, Richa Kumari 1, Akashdeep Bhardwaj 1 and Shawon Rahman 2, 1 University of Petroleum and Energy Studies (UPES), India, 2 University of Hawaii-Hilo, USA

  Abstract

In today’s security landscape, every user wants to access largeamounts of data with confidentiality and authorization. To maintain confidentiality, various researchers have proposed several techniques; however, to access secure data, researchers use access control lists to grant authentication and provide authorization. The above several steps will increase the server's computation overhead and response time. To copewith these two problems, we proposedmulti-party execution on the server. In this paper, we introduce two different approaches. The first approach is encryption, utilizing the Involution Function-Based StreamCipherto encrypt the file data. The second approach is key distribution, using the Shamir secret-sharing scheme to divide and distribute the symmetric key to every user. The decryption process required key reconstruction, which used second-order Lagrange interpolation to reconstruct the secret keys from the hidden points. The process will reduce the server's computational overhead. The results are evaluated based on the encryption and decryption time, throughput, computational overhead, and security analysis. In the future, the proposed mechanism will be used to share large-scale, secure data within the organization.

  Keywords

Involution Function, Stream Cipher, Distributed Authorization, Attribute-Based Encryption, LCG, XOR, Access Control List, Lagrange Interpolation, Shamir’s Secret Sharing