Collusion Attacks on Decentralized Attributed-Based Encryption: Analyses and a Solution

02/18/2020
by   Ehsan Meamari, et al.
0

Attribute-based Encryption (ABE) is an information centric security solution that moves beyond traditional restrictions of point-to-point encryption by allowing for flexible, fine-grain policy-based and content-based access control that is cryptographically enforced. As the original ABE systems are managed by a single authority, several efforts have decentralized different ABE schemes to address the key escrow problem, where the authority can issue secret keys to itself to decrypt all the ciphertext. However, decentralized ABE (DABE) schemes raise the issue of collusion attacks. In this paper, we review two existing types of collusion attacks on DABE systems, and introduce a new type of collusion among authorities and data users. We show that six existing DABE systems are vulnerable to the newly introduced collusion and propose a model to secure one of the DABE schemes.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
02/08/2020

Data User-Based Attribute-Based Encryption

Attribute-Based Encryption (ABE) has emerged as an information-centric p...
research
02/22/2023

Public Key Encryption with Secure Key Leasing

We introduce the notion of public key encryption with secure key leasing...
research
07/13/2020

Puncturable Encryption: A Generic Construction from Delegatable Fully Key-Homomorphic Encryption

Puncturable encryption (PE), proposed by Green and Miers at IEEE S P 2...
research
06/11/2021

A survey on Functional Encryption

Functional Encryption (FE) expands traditional public-key encryption in ...
research
07/11/2022

Privacy-preserving Decentralized Deep Learning with Multiparty Homomorphic Encryption

Decentralized deep learning plays a key role in collaborative model trai...
research
01/17/2023

Verifiable Fully Homomorphic Encryption

Fully Homomorphic Encryption (FHE) is seeing increasing real-world deplo...
research
08/18/2020

Dragon Crypto – An Innovative Cryptosystem

In recent years cyber-attacks are continuously developing. This means th...

Please sign up or login with your details

Forgot password? Click here to reset