Activities per year
Abstract
We present a novel Ciphertext-Policy Attribute-Based Encryption (CP-ABE) scheme, which bridges the gap between highly dynamic (industrial) environments and resource-constrained devices. Our construction combines outsourced-decryption, hidden policies and revocation to cope with the requirements posed by such environments. In contrast to existing schemes, which typically rely on composite order bilinear groups, we present a scheme in prime order groups. The resulting scheme is more efficient as it relies on smaller group orders. We prove our scheme is secure under the Symmetric External Diffie-Hellman (SXDH) assumption. Lastly, we compare our scheme against existing schemes and provide timing results of our software implementation. Our evaluation shows that the proposed scheme is flexible enough for the targeted environment while improving performance by an order of magnitude.
Original language | English |
---|---|
Title of host publication | Proceedings - 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2020 |
Editors | Guojun Wang, Ryan Ko, Md Zakirul Alam Bhuiyan, Yi Pan |
Pages | 1638-1645 |
Number of pages | 8 |
ISBN (Electronic) | 9780738143804 |
DOIs | |
Publication status | Published - Dec 2020 |
Event | 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications: TrustCom 2020 - Guangdong Hotel, Hybrider Event, Guangzhou, China Duration: 29 Dec 2020 → 1 Jan 2021 http://ieee-trustcom.org/TrustCom2020/ |
Publication series
Name | Proceedings - 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2020 |
---|
Conference
Conference | 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications |
---|---|
Abbreviated title | IEEE TrustCom 2020 |
Country/Territory | China |
City | Hybrider Event, Guangzhou |
Period | 29/12/20 → 1/01/21 |
Internet address |
Keywords
- Access control
- Attribute-based encryption
- Hidden policies
- Revocation
ASJC Scopus subject areas
- Software
- Information Systems and Management
- Safety, Risk, Reliability and Quality
- Computer Networks and Communications
Activities
- 1 Talk at conference or symposium
-
Efficient Revocable Attribute-Based Encryption with Hidden Policies
Dominik Ziegler (Speaker) & Alexander Marsalek (Contributor)
29 Dec 2020Activity: Talk or presentation › Talk at conference or symposium › Science to science