Questions tagged [abe]

Attribute-Based Encryption is a type of public-key encryption in which the key used for encryption is based on selected attributes of the readers. Decryption of the ciphertext is possible only if the set of attributes of the user includes all the attributes used to encrypt the ciphertext.

Using Attribute-Based Encryption (ABE) the sender does not need to specify the identity of the recipient when encrypting. Instead, the sender specifies attributes of the recipient that will enable any one entity possessing those attributes to decrypt the message, while preventing anyone not possessing all of those attributes from decrypting it.

An example could be a CEO encrypting a message to be read only by managers in the sales area. He does not want it read by the cashiers in sales, nor by managers in the HR or shipping departments. He would encrypt it using the attributes of {"manager", "sales"}. Only users with both of those attributes would have enough information to decrypt the message.

Extending the above example, an HR manager might have the attributes {"manager", "HR"}, while a cashier would have the attributes {"cashier", "sales"}. Those two people could try to combine their attributes to include "manager" and "sales", and then attempt to decrypt the message together. ABE schemes prevent this type of collusion.

101 questions
9
votes
3 answers

What is the motivation behind Key-policy Attribute-based Encryption?

What is Attribute Based Encryption? has a nice explanation what both forms (Ciphertext-policy Attribute-based Encryption and Key-policy Attribute-based Encryption) are. My question is: what is the motivation/analogy behind Key-policy…
Artjom B.
  • 2,045
  • 1
  • 22
  • 52
7
votes
1 answer

What paradigm does ABE, KP-ABE and CP-ABE fall into

Do attribute-base encryption (abe), key policy attribute-based encryption (KP-ABE) and ciphertext attribute-based encryption (CP-ABE) fall into the attribute-based access control (ABAC) paradigm or are they not related?
user123
  • 71
  • 1
6
votes
2 answers

Why was there a need to create CP-ABE when KP-ABE already exist?

This is more of a good to know question, but looking online and in this forum I couldn't find an answer to this question. Was there some major reason why CP-ABE was created when KP-ABE already exist? I am new to this field so I apologise before hand…
4
votes
1 answer

Calculating CP-ABE random secret $s$ initialized by the data owner

I am analyzing the Bethencourt CP-ABE model to understand the math behind it. If a data user is able to satisfy the access policy attached to the ciphertext, that user is able to decrypt the encrypted message. This is made possible because the data…
user40428
3
votes
2 answers

Are attributes of an access structure visible or guessable in a CP-ABE ciphertext?

Suppose that Alice has attributes A, B and C. I have a ciphertext with this policy: A AND C. Can an adversary guess the attributes and then decrypt the ciphertext? What is the probability of guessing attributes in a ciphertext policy attribute…
user65364
  • 33
  • 2
2
votes
0 answers

Correctness Proof in "A tree-based CP-ABE scheme with hidden policy ... "

I could not understand one step in correctness proof of paper titled "A tree-based CP-ABE scheme with hidden policy supporting secure data sharing in cloud computing" authored by Runhua Xu, Yang Wang, Bo Lang. Link to paper:…
user60588
  • 191
  • 3
2
votes
2 answers

Access tree and Key geneation in KP-ABE

I tried for about 1 month to understand ABE and know I am confusing about access tree. In paper "Attributed-based encryption for fine-grained access control of encrypted data" the author explained the generation of keys with access tree for KP-ABE…
tesoke
  • 181
  • 1
  • 10
2
votes
0 answers

CP-ABE: structure of the secret key SK

I am working on Ciphertext-Policy Attribute based Encryption (CP-ABE) and I need to understand how a secret key looks like. For example, assume that the universe of attributes is defined to be {A,B,C,D} and user 1 receives a secret key (SK) to…
Dukefleed
  • 21
  • 1
1
vote
1 answer

Combining CP-ABE and KP-ABE by wrapping one with the other?

I've looked around but can't find any discussion on using both CP-ABE and KP-ABE by simply wrapping one with the other. It seems like you'd be able to get more fine grained access control with a scheme like that. The lack of any information makes me…
1
vote
1 answer

CP-ABE (Bethencourt): How KeyGen computes $D=g^{(\alpha+r)/\beta}$?

I have one doubt from CP-ABE KeyGen algorithm (paper). In Setup, master key is $MK=(\beta, g^\alpha)$. In KeyGen(MK, S), they say generate random number $r$ and compute $D=g^{(\alpha+r)/\beta}$. How one calculates $D$ from $g^\alpha$ ? ($\alpha$ is…
user60588
  • 191
  • 3
1
vote
0 answers

What is the key size and security level of attribute-based encryption schemes?

I am studying the ABE for my masters theses however I want to calculate the key and it's strength. I have done a research about the KP-ABE and I want to know the size of the key and how to determine it's strength because I want to decrease the key…
1
vote
1 answer

Composite vs Prime Order Groups in Attribute Based Encryption

Reading about Accountability in ABE currently and the paper "White-box traceable ciphertext-policy attribute-based encryption supporting flexible attributes" when comparing its system with an existing mentioned the fact that theirs is a prime order…
chisky
  • 113
  • 8
1
vote
0 answers

How are the attributes of a user authenticated in attribute-based encryption?

It seems that the papers I am reading do not talk much about this point. That is how the attributes of a user are authenticated in ABE system. To my understanding, there is an attribute authority (AA) who authenticates the attribute of a user and…
Paradox
  • 487
  • 3
  • 9
1
vote
1 answer

Multi Authority Attribute Based Encryption Library

Anyone aware of a library that has MA-ABE implemented in any language preferably python? P/S - I hope this is the right place to ask this. Apologies if not, then a redirect will be appreciated
chisky
  • 113
  • 8
1
vote
1 answer

How do you apply bilinear mapping to attribute based encryption?

I'm new to both bilinear mapping and ABE. I have a vague idea of how bilinear mapping works now, but I don't understand how it applies to ABE. Can someone give me an example?
1
2