Aktivitäten pro Jahr
Abstract
We present a novel Ciphertext-Policy Attribute-Based Encryption (CP-ABE) scheme, which bridges the gap between highly dynamic (industrial) environments and resource-constrained devices. Our construction combines outsourced-decryption, hidden policies and revocation to cope with the requirements posed by such environments. In contrast to existing schemes, which typically rely on composite order bilinear groups, we present a scheme in prime order groups. The resulting scheme is more efficient as it relies on smaller group orders. We prove our scheme is secure under the Symmetric External Diffie-Hellman (SXDH) assumption. Lastly, we compare our scheme against existing schemes and provide timing results of our software implementation. Our evaluation shows that the proposed scheme is flexible enough for the targeted environment while improving performance by an order of magnitude.
Originalsprache | englisch |
---|---|
Titel | Proceedings - 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2020 |
Redakteure/-innen | Guojun Wang, Ryan Ko, Md Zakirul Alam Bhuiyan, Yi Pan |
Seiten | 1638-1645 |
Seitenumfang | 8 |
ISBN (elektronisch) | 9780738143804 |
DOIs | |
Publikationsstatus | Veröffentlicht - Dez. 2020 |
Veranstaltung | 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications: TrustCom 2020 - Guangdong Hotel, Hybrider Event, Guangzhou, China Dauer: 29 Dez. 2020 → 1 Jan. 2021 http://ieee-trustcom.org/TrustCom2020/ |
Publikationsreihe
Name | Proceedings - 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2020 |
---|
Konferenz
Konferenz | 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications |
---|---|
Kurztitel | IEEE TrustCom 2020 |
Land/Gebiet | China |
Ort | Hybrider Event, Guangzhou |
Zeitraum | 29/12/20 → 1/01/21 |
Internetadresse |
ASJC Scopus subject areas
- Software
- Informationssysteme und -management
- Sicherheit, Risiko, Zuverlässigkeit und Qualität
- Computernetzwerke und -kommunikation
Fingerprint
Untersuchen Sie die Forschungsthemen von „Efficient Revocable Attribute-Based Encryption with Hidden Policies“. Zusammen bilden sie einen einzigartigen Fingerprint.Aktivitäten
- 1 Vortrag bei Konferenz oder Fachtagung
-
Efficient Revocable Attribute-Based Encryption with Hidden Policies
Dominik Ziegler (Redner/in) & Alexander Marsalek (Beitragende/r)
29 Dez. 2020Aktivität: Vortrag oder Präsentation › Vortrag bei Konferenz oder Fachtagung › Science to science