Questions tagged [abe]

Attribute-Based Encryption is a type of public-key encryption in which the key used for encryption is based on selected attributes of the readers. Decryption of the ciphertext is possible only if the set of attributes of the user includes all the attributes used to encrypt the ciphertext.

Using Attribute-Based Encryption (ABE) the sender does not need to specify the identity of the recipient when encrypting. Instead, the sender specifies attributes of the recipient that will enable any one entity possessing those attributes to decrypt the message, while preventing anyone not possessing all of those attributes from decrypting it.

An example could be a CEO encrypting a message to be read only by managers in the sales area. He does not want it read by the cashiers in sales, nor by managers in the HR or shipping departments. He would encrypt it using the attributes of {"manager", "sales"}. Only users with both of those attributes would have enough information to decrypt the message.

Extending the above example, an HR manager might have the attributes {"manager", "HR"}, while a cashier would have the attributes {"cashier", "sales"}. Those two people could try to combine their attributes to include "manager" and "sales", and then attempt to decrypt the message together. ABE schemes prevent this type of collusion.

104 questions
41
votes
1 answer

What is Attribute Based Encryption?

Can someone explain what attribute based encryption is? I was searching for a book or something that can help me in this regard but so far I have found none. Google also returns practically nothing aside from the papers.
Mark
  • 413
  • 1
  • 4
  • 4
11
votes
1 answer

Are pairings still the most efficient implementation for identity and attribute-based encryption?

I read on Wikipedia: [...] pairings have also been used to construct many cryptographic systems for which no other efficient implementation is known, such as identity based encryption or attribute based encryption schemes. Is this still the…
Shalec
  • 407
  • 2
  • 10
10
votes
1 answer

What are the current limitations (and capabilities) of Functional Encryption used for access control?

I'm trying to make my way in Functional Encryption used for access control. I read a lot of papers such as "How to Run Turing Machines on Encrypted Data", "Functional Encryption: New Perspectives and Lower Bounds", or "Attribute-based encryption for…
MaVVamaldo
  • 201
  • 1
  • 5
10
votes
3 answers

What is the motivation behind Key-policy Attribute-based Encryption?

What is Attribute Based Encryption? has a nice explanation what both forms (Ciphertext-policy Attribute-based Encryption and Key-policy Attribute-based Encryption) are. My question is: what is the motivation/analogy behind Key-policy…
Artjom B.
  • 2,085
  • 1
  • 23
  • 53
8
votes
0 answers

Security proof in (Ciphertext-Policy) Attribute-Based Encryption

I am having hard time understanding the security proof in Attribute-Based Encryption, especially in Ciphertext-Policy Attribute-Based Encryption. To do reduction in CP-ABE scheme, how do I check that the security proof is correct or works. For…
Nyamaa
  • 81
  • 1
7
votes
1 answer

What paradigm does ABE, KP-ABE and CP-ABE fall into

Do attribute-base encryption (abe), key policy attribute-based encryption (KP-ABE) and ciphertext attribute-based encryption (CP-ABE) fall into the attribute-based access control (ABAC) paradigm or are they not related?
user123
  • 71
  • 1
6
votes
2 answers

Why was there a need to create CP-ABE when KP-ABE already exist?

This is more of a good to know question, but looking online and in this forum I couldn't find an answer to this question. Was there some major reason why CP-ABE was created when KP-ABE already exist? I am new to this field so I apologise before hand…
5
votes
1 answer

Simple example for CP-ABE (Ciphertext policy attribute-based encryption)

I'm currently working on Ciphertext Policy Attribute-Based Encryption (CP-ABE). So far I'm only using it with a basic understanding how it actually works. Now I want to understand it a bit better, but I've never learned anything about bilinear…
Baertierchen
  • 51
  • 1
  • 1
  • 3
5
votes
1 answer

How is the ciphertext labeled with a set of attributes in Key-Policy Attribute-based Encryption (KP-ABE)

My question is about Key-Policy ABE (KP-ABE). What does it mean when a "Ciphertext is Labeled with set of attribute"? How is it labeled?
5
votes
1 answer

Can we run a probabilistic function on ciphertext with Functional Encryption (or Attribute Based Encryption)?

In the definition of functional encryption ($FE$): $FE.Setup(1^k)$ takes as input the security parameter $1^k$ and outputs a master public key $fmpk$ and a master secret key $fmsk$. $FE.KeyGen(fmsk, f)$ takes as input the master secret key $fmsk$…
Jan Leo
  • 925
  • 6
  • 14
4
votes
3 answers

Scheme that encrypt with $n$ pk that any sk of the pks can decrypt?

Suppose there are $n$ users each with public/private key pair $(pk_i,sk_i)$ $i=1,\cdots,n$. Is there any scheme that I can encrypt $m$ using the set of public keys $(pk_1,\cdots,pk_n)$, and can decrypt it using any $sk_i$? That is…
Felix LL
  • 321
  • 1
  • 7
4
votes
1 answer

Calculating CP-ABE random secret $s$ initialized by the data owner

I am analyzing the Bethencourt CP-ABE model to understand the math behind it. If a data user is able to satisfy the access policy attached to the ciphertext, that user is able to decrypt the encrypted message. This is made possible because the data…
user40428
4
votes
1 answer

Why in the Palisade CP-ABE library the 192 bit security level uses a base of 128 while the others use a base of 2?

I am performing some tests using the Palisade CP-ABE library, that is based on RLWE. The theoretical details are presented here. The library offers predefined security levels for the encryption, that correspond to a pair. In…
3
votes
1 answer

I don't understand the definition of monotonic access structures

I am very confused with definition 1 in section 2.1 of this article. Definition 1 (Access Structure [2]) Let $\left\{ P_1, P_2, ..., P_n \right\}$ be a set of parties. A collection $\mathbb{A} \subseteq 2^{\left\{ P_1, P_2, ..., P_n \right\}}$ is…
Kluddizz
  • 133
  • 4
3
votes
1 answer

Can anyone elaborate why KP-ABE is better than CP-ABE for television program broadcasting?

I know the difference between KP-ABE and CP-ABE. I am not able to understand why KP-ABE is better for broadcasting than CP-ABE ?
Richa
  • 83
  • 5
1
2 3 4 5 6 7