On the Decentralization of Attribute-Based Encryption Schemes

被引:0
|
作者
Hinojosa-Cabello, Melissa Brigitthe [1 ]
Aldeco-Perez, Rocio Alejandra [2 ]
Morales-Sandoval, Miguel [3 ]
Garcia-Hernandez, Jose Juan [1 ]
机构
[1] CINVESTAV, Unidad Tamaulipas, Ciudad Victoria 87130, Tamaulipas, Mexico
[2] Univ Nacl Autonoma Mexico, Sch Engn, Mexico City 04510, DF, Mexico
[3] INAOE, Dept Comp Sci, Tonantzintla 72840, Puebla, Mexico
关键词
Attribute-based encryption; decentralization; multi-authority schemes; permissioned blockchain; access control;
D O I
10.1109/ENC60556.2023.10508668
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Nowadays, cloud services are used for outsourcing the high processing and storage requirements demanded under Internet of Things (IoT) application scenarios. However, since cloud storage providers are not fully trustworthy, the major security concerns within this context are confidentiality and access control of outsourced sensitive data. In this sense, AttributeBased Encryption (ABE) is a type of cryptographically enabled access control that allows secure and fine-grained data-sharing with multiple users. With ABE, simultaneous provision of access control and confidentiality features is achieved by means of (1) access control policies used for data encryption, and (2) attribute sets that further describe the users' access capabilities. Despite the advantages provided by ABE, some issues still limit its efficient deployment in practical applications. One of these constraints is the centralized approach and dependency on a single trusted authority. In this work, we cope with the strong dependency of ABE schemes on a single trusted authority. Our decentralization approach aims to eliminate single points of failure by distributing between multiple entities the ABE trusted authority's tasks, namely users' secret key generation, and management. In this approach, we focus on a permissioned blockchain solution compliant with ABE typical deployments where system users are known and belong to specific organizational domains.
引用
收藏
页数:7
相关论文
共 50 条
  • [1] Dynamic Location Information in Attribute-based Encryption Schemes
    Denisow, Iwailo
    Zickau, Sebastian
    Beierle, Felix
    Kuepper, Axel
    2015 9TH INTERNATIONAL CONFERENCE ON NEXT GENERATION MOBILE APPLICATIONS, SERVICES AND TECHNOLOGIES (NGMAST 2015), 2015, : 240 - 247
  • [2] Cryptanalysis and Discussion on Two Attribute-Based Encryption Schemes
    Tseng, Yi-Fan
    Huang, Jheng-Jia
    Yang, Hao-Yu
    Chien, Tsung-Yu
    Wu, Chieh-Han
    2022 17TH ASIA JOINT CONFERENCE ON INFORMATION SECURITY, ASIAJCIS, 2022, : 24 - 28
  • [3] Attribute-based encryption
    Sahai, Amit
    Waters, Brent
    Lu, Steve
    Cryptology and Information Security Series, 2009, 2 : 156 - 168
  • [4] A Survey on Attribute-Based Encryption Schemes Suitable for the Internet of Things
    Rasori, Marco
    La Manna, Michele
    Perazzo, Pericle
    Dini, Gianluca
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (11) : 8269 - 8290
  • [5] Attacking Pairing-Free Attribute-Based Encryption Schemes
    Herranz, Javier
    IEEE ACCESS, 2020, 8 : 222226 - 222232
  • [6] Comparison of attribute-based encryption schemes in securing healthcare systems
    Walid, Redwan
    Joshi, Karuna Pande
    Choi, Seung Geol
    SCIENTIFIC REPORTS, 2024, 14 (01)
  • [7] Attribute-based encryption schemes with constant-size ciphertexts
    Attrapadung, Nuttapong
    Herranz, Javier
    Laguillaumie, Fabien
    Libert, Benoit
    de Panafieu, Elie
    Rafols, Carla
    THEORETICAL COMPUTER SCIENCE, 2012, 422 : 15 - 38
  • [8] Efficient Attribute-Based Encryption Schemes for Secure Communications in Cyber Defense
    Mao, Yijun
    Zhang, Yue
    Chen, Min-Rong
    Li, Yongbiao
    Zhan, Yiju
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2016, 22 (03): : 397 - 403
  • [9] Attribute-Based Encryption for Circuits
    Gorbunov, Sergey
    Vaikuntanathan, Vinod
    Wee, Hoeteck
    STOC'13: PROCEEDINGS OF THE 2013 ACM SYMPOSIUM ON THEORY OF COMPUTING, 2013, : 545 - 554
  • [10] A survey on attribute-based encryption schemes of access control in cloud environments
    Hwang, M.-S. (mshwang@asia.edu.tw), 1600, Femto Technique Co., Ltd. (15):