ACABELLA: Automated (Crypt) analysis of Attribute-Based Encryption Leveraging Linear Algebra
Attribute-based encryption (ABE) is a popular type of public-key encryption that enforces
access control cryptographically, and has spurred the proposal of many use cases. To …
access control cryptographically, and has spurred the proposal of many use cases. To …
ABE squared: accurately benchmarking efficiency of attribute-based encryption
Measuring efficiency is difficult. In the last decades, several works have contributed in the
quest to successfully determine and compare the efficiency of pairing-based attribute-based …
quest to successfully determine and compare the efficiency of pairing-based attribute-based …
Attribute-Based Management of Secure Kubernetes Cloud Bursting
M Femminella, M Palmucci, G Reali… - IEEE Open Journal of …, 2024 - ieeexplore.ieee.org
In modern cloud computing, the need for flexible and scalable orchestration of services,
combined with robust security measures, is paramount. In this paper, we propose an …
combined with robust security measures, is paramount. In this paper, we propose an …
A practical compiler for attribute-based encryption: New decentralized constructions and more
M Venema - Cryptographers' Track at the RSA Conference, 2023 - Springer
The pair encodings framework is an important result in the simplified design of complex
attribute-based encryption schemes. In particular, it reduces the effort of proving security of a …
attribute-based encryption schemes. In particular, it reduces the effort of proving security of a …
Glue: Generalizing unbounded attribute-based encryption for flexible efficiency trade-offs
Ciphertext-policy attribute-based encryption is a versatile primitive that has been considered
extensively to securely manage data in practice. Especially completely unbounded schemes …
extensively to securely manage data in practice. Especially completely unbounded schemes …
Dually computable cryptographic accumulators and their application to attribute based encryption
A Barthoulot, O Blazy, S Canard - International Conference on Cryptology …, 2023 - Springer
Abstract In 1993, Benaloh and De Mare introduced cryptographic accumulator, a primitive
that allows the representation of a set of values by a short object (the accumulator) and …
that allows the representation of a set of values by a short object (the accumulator) and …
A blockchain-enabled decentralized access control scheme using multi-authority attribute-based encryption for edge-assisted Internet of Things
H Cheng, SL Lo, J Lu - Internet of Things, 2024 - Elsevier
More edge users opt to use Internet of Things (IoT) devices to collect their data (eg, health
data, social data, e-governance data, etc.), which are stored in central cloud service …
data, social data, e-governance data, etc.), which are stored in central cloud service …
TinyABE: Unrestricted ciphertext-policy attribute-based encryption for embedded devices and low-quality networks
Ciphertext-policy attribute-based encryption (CP-ABE) has attracted much interest from the
practical community to enforce access control in distributed settings such as the Internet of …
practical community to enforce access control in distributed settings such as the Internet of …
A Novel Approach to Strengthening Web-Based Cloud Services: Two-Factor Access Control
PK Kumar, C Raghavendra, R Dodda… - E3S Web of …, 2024 - e3s-conferences.org
In this paper we introduce a recent and evolved two-factor authentication (2FA) access
govern system specially designed for webbased cloud computing services. Our innovative …
govern system specially designed for webbased cloud computing services. Our innovative …
Pairing Compression on Some Elliptic Curves with Subgroups of Embedding Degree 6 and Its Applications to Pairing-Based Cryptography
L Li, G Hu - … Symposium on Emerging Information Security and …, 2023 - Springer
As a subfield of elliptic curve cryptography, pairing-based cryptography has gained
significant attention due to its practical and flexible functionality. In pairing-based …
significant attention due to its practical and flexible functionality. In pairing-based …