ACABELLA: Automated (Crypt) analysis of Attribute-Based Encryption Leveraging Linear Algebra

A de la Piedra, M Venema, G Alpár - Proceedings of the 2023 ACM …, 2023 - dl.acm.org
Attribute-based encryption (ABE) is a popular type of public-key encryption that enforces
access control cryptographically, and has spurred the proposal of many use cases. To …

ABE squared: accurately benchmarking efficiency of attribute-based encryption

A de la Piedra, M Venema, G Alpár - Cryptology ePrint Archive, 2022 - eprint.iacr.org
Measuring efficiency is difficult. In the last decades, several works have contributed in the
quest to successfully determine and compare the efficiency of pairing-based attribute-based …

Attribute-Based Management of Secure Kubernetes Cloud Bursting

M Femminella, M Palmucci, G Reali… - IEEE Open Journal of …, 2024 - ieeexplore.ieee.org
In modern cloud computing, the need for flexible and scalable orchestration of services,
combined with robust security measures, is paramount. In this paper, we propose an …

A practical compiler for attribute-based encryption: New decentralized constructions and more

M Venema - Cryptographers' Track at the RSA Conference, 2023 - Springer
The pair encodings framework is an important result in the simplified design of complex
attribute-based encryption schemes. In particular, it reduces the effort of proving security of a …

Glue: Generalizing unbounded attribute-based encryption for flexible efficiency trade-offs

M Venema, G Alpár - IACR International Conference on Public-Key …, 2023 - Springer
Ciphertext-policy attribute-based encryption is a versatile primitive that has been considered
extensively to securely manage data in practice. Especially completely unbounded schemes …

Dually computable cryptographic accumulators and their application to attribute based encryption

A Barthoulot, O Blazy, S Canard - International Conference on Cryptology …, 2023 - Springer
Abstract In 1993, Benaloh and De Mare introduced cryptographic accumulator, a primitive
that allows the representation of a set of values by a short object (the accumulator) and …

A blockchain-enabled decentralized access control scheme using multi-authority attribute-based encryption for edge-assisted Internet of Things

H Cheng, SL Lo, J Lu - Internet of Things, 2024 - Elsevier
More edge users opt to use Internet of Things (IoT) devices to collect their data (eg, health
data, social data, e-governance data, etc.), which are stored in central cloud service …

TinyABE: Unrestricted ciphertext-policy attribute-based encryption for embedded devices and low-quality networks

M Venema, G Alpár - International Conference on Cryptology in Africa, 2022 - Springer
Ciphertext-policy attribute-based encryption (CP-ABE) has attracted much interest from the
practical community to enforce access control in distributed settings such as the Internet of …

A Novel Approach to Strengthening Web-Based Cloud Services: Two-Factor Access Control

PK Kumar, C Raghavendra, R Dodda… - E3S Web of …, 2024 - e3s-conferences.org
In this paper we introduce a recent and evolved two-factor authentication (2FA) access
govern system specially designed for webbased cloud computing services. Our innovative …

Pairing Compression on Some Elliptic Curves with Subgroups of Embedding Degree 6 and Its Applications to Pairing-Based Cryptography

L Li, G Hu - … Symposium on Emerging Information Security and …, 2023 - Springer
As a subfield of elliptic curve cryptography, pairing-based cryptography has gained
significant attention due to its practical and flexible functionality. In pairing-based …