2022
DOI: 10.1007/s10623-022-01093-5
|View full text |Cite
|
Sign up to set email alerts
|

Systematizing core properties of pairing-based attribute-based encryption to uncover remaining challenges in enforcing access control in practice

Abstract: Attribute-based encryption (ABE) cryptographically implements fine-grained access control on data. As such, data can be stored by an entity that is not necessarily trusted to enforce access control, or an entity that is not even trusted to have access to the plaintext data at all. Instead, access control can be externally enforced by a trusted entity. Additionally, some multi-authority variants of ABE—which do not have a central authority—can effectively and securely implement access control in multiple-domain… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 12 publications
(6 citation statements)
references
References 138 publications
0
4
0
Order By: Relevance
“…Moreover, ABE functions enables a high level of user independence, as authorized users can independently obtain access by decrypting ciphertexts once they possess the appropriate secret key. In this way, users can avoid interacting further with any policy-enforcing entities that may be unavailable at the time of an access request [63].…”
Section: A Ciphertext-policy Attribute-based Encryptionmentioning
confidence: 99%
See 2 more Smart Citations
“…Moreover, ABE functions enables a high level of user independence, as authorized users can independently obtain access by decrypting ciphertexts once they possess the appropriate secret key. In this way, users can avoid interacting further with any policy-enforcing entities that may be unavailable at the time of an access request [63].…”
Section: A Ciphertext-policy Attribute-based Encryptionmentioning
confidence: 99%
“…This enables the inclusion of logical expressions involving conjunctions, disjunctions, and negations. This expanded capability is outlined in the taxonomy of ABE schemes presented in [63].…”
Section: ) Expanding Policy Expressiveness With Abementioning
confidence: 99%
See 1 more Smart Citation
“…As a result, our techniques exhibit conceptual parallels with traditional access control approaches like Role-Based Access Control (RBAC). [19] Furthermore, we offer a practical execution of our system and present performance measurements to exhibit its efficiency in real-world scenarios. Mediated cryptography was initially proposed to enable instant revocation of public keys.…”
Section: Introductionmentioning
confidence: 99%
“…CP-ABE has proven to be a valuable primitive in the enforcement of fine-grained access control on a cryptographic level [16,35,47]. It allows the encrypting device to determine who gets access to the plaintext, without requiring an online trusted third party to act as an intermediary [52]. Instead, it requires a trusted entity to issue secret keys to eligible users, which can be used to access the data for which those are authorized.…”
Section: Introductionmentioning
confidence: 99%