On the Decentralization of Attribute-Based Encryption Schemes

被引:0
作者
Hinojosa-Cabello, Melissa Brigitthe [1 ]
Aldeco-Perez, Rocio Alejandra [2 ]
Morales-Sandoval, Miguel [3 ]
Garcia-Hernandez, Jose Juan [1 ]
机构
[1] CINVESTAV, Unidad Tamaulipas, Ciudad Victoria 87130, Tamaulipas, Mexico
[2] Univ Nacl Autonoma Mexico, Sch Engn, Mexico City 04510, DF, Mexico
[3] INAOE, Dept Comp Sci, Tonantzintla 72840, Puebla, Mexico
来源
2023 MEXICAN INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE, ENC | 2024年
关键词
Attribute-based encryption; decentralization; multi-authority schemes; permissioned blockchain; access control;
D O I
10.1109/ENC60556.2023.10508668
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Nowadays, cloud services are used for outsourcing the high processing and storage requirements demanded under Internet of Things (IoT) application scenarios. However, since cloud storage providers are not fully trustworthy, the major security concerns within this context are confidentiality and access control of outsourced sensitive data. In this sense, AttributeBased Encryption (ABE) is a type of cryptographically enabled access control that allows secure and fine-grained data-sharing with multiple users. With ABE, simultaneous provision of access control and confidentiality features is achieved by means of (1) access control policies used for data encryption, and (2) attribute sets that further describe the users' access capabilities. Despite the advantages provided by ABE, some issues still limit its efficient deployment in practical applications. One of these constraints is the centralized approach and dependency on a single trusted authority. In this work, we cope with the strong dependency of ABE schemes on a single trusted authority. Our decentralization approach aims to eliminate single points of failure by distributing between multiple entities the ABE trusted authority's tasks, namely users' secret key generation, and management. In this approach, we focus on a permissioned blockchain solution compliant with ABE typical deployments where system users are known and belong to specific organizational domains.
引用
收藏
页数:7
相关论文
共 50 条
[31]   Attribute-Based Encryption for Circuits on Lattices [J].
Zhao, Jian ;
Gao, Haiying ;
Zhang, Junqi .
TSINGHUA SCIENCE AND TECHNOLOGY, 2014, 19 (05) :463-469
[32]   Attribute-Based Encryption for Range Attributes [J].
Attrapadung, Nuttapong ;
Hanaoka, Goichiro ;
Ogawa, Kazuto ;
Ohtake, Go ;
Watanabe, Hajime ;
Yamada, Shota .
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2018, E101A (09) :1440-1455
[33]   Revocable and Decentralized Attribute-Based Encryption [J].
Cui, Hui ;
Deng, Robert H. .
COMPUTER JOURNAL, 2016, 59 (08) :1220-1235
[34]   Key Cooperative Attribute-Based Encryption [J].
Huang, Luqi ;
Susilo, Willy ;
Yang, Guomin ;
Guo, Fuchun .
INFORMATION SECURITY AND PRIVACY, PT I, ACISP 2024, 2024, 14895 :241-260
[35]   A Hierarchical Attribute-Based Encryption Scheme [J].
ZOU Xiubin .
Wuhan University Journal of Natural Sciences, 2013, 18 (03) :259-264
[36]   Attribute-Based Access Control Encryption [J].
Wang, Xiuhua ;
Yu, Mengyang ;
Wang, Yaohui ;
Pi, Yinjia ;
Xu, Peng ;
Wang, Shuai ;
Jin, Hai ;
Han, Min .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2025, 22 (03) :2227-2242
[37]   Attribute-Based Encryption for Circuits on Lattices [J].
Jian Zhao ;
Haiying Gao ;
Junqi Zhang .
TsinghuaScienceandTechnology, 2014, 19 (05) :463-469
[38]   Decentralized Attribute-Based Encryption and Signatures [J].
Okamoto, Tatsuaki ;
Takashima, Katsuyuki .
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2020, E103A (01) :41-73
[39]   Attribute-based encryption with enforceable obligations [J].
Hamed Arshad ;
Pablo Picazo-Sanchez ;
Christian Johansen ;
Gerardo Schneider .
Journal of Cryptographic Engineering, 2023, 13 :343-371
[40]   Attribute-based encryption with adaptive policy [J].
Han, Yiliang .
SOFT COMPUTING, 2019, 23 (12) :4009-4017