Data User-Based Attribute-Based Encryption

02/08/2020
by   Ehsan Meamari, et al.
0

Attribute-Based Encryption (ABE) has emerged as an information-centric public-key cryptographic system which allows a data owner to share data, according to access policy, with multiple data users based on the attributes they possess, without knowing their identities. In the original ABE schemes, a central authority administrates the system and issues secret keys to data users based on their attributes and both the owner and users need to trust a specific CA. However, in certain real-world applications, the data users would not trust anyone but themselves. For such situations, we introduce a new decentralization model of ABE, termed Data User-based ABE (DU-ABE), which is managed jointly by the data users. DU-ABE is the first decentralized ABE scheme that replaces the authorities with the data users without employing any other extra entities.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
02/18/2020

Collusion Attacks on Decentralized Attributed-Based Encryption: Analyses and a Solution

Attribute-based Encryption (ABE) is an information centric security solu...
research
05/16/2018

reclaimID: Secure, Self-Sovereign Identities using Name Systems and Attribute-Based Encryption

In this paper we present reclaimID: An architecture that allows users to...
research
09/18/2022

Allocation Schemes in Analytic Evaluation: Applicant-Centric Holistic or Attribute-Centric Segmented?

Many applications such as hiring and university admissions involve evalu...
research
05/16/2018

Practical Decentralized Attribute-Based Delegation using Secure Name Systems

Identity and trust in the modern Internet are centralized around an olig...
research
12/06/2019

Advanced attribute-based protocol based on the modified secret sharing scheme

We construct a new protocol for attribute-based encryption with the use ...
research
02/16/2022

Data Capsule: A Self-Contained Data Model as an Access Policy Enforcement Strategy

In this paper, we introduce a data capsule model, a self-contained and s...
research
01/11/2021

Reachability Analysis for Attributes in ABAC with Group Hierarchy

Attribute-based access control (ABAC) models are widely used to provide ...

Please sign up or login with your details

Forgot password? Click here to reset