Asset Details
MbrlCatalogueTitleDetail
Do you wish to reserve the book?
Several Attacks on Attribute-Based Encryption Schemes
by
Le, Phi Thuong
, Trinh, Viet Cuong
, Le, Huy Quoc
in
Access control
/ Cloud computing
/ Collusion
/ Copy protection
/ Cryptography
/ Cybersecurity
/ Encryption
2025
Hey, we have placed the reservation for you!
By the way, why not check out events that you can attend while you pick your title.
You are currently in the queue to collect this book. You will be notified once it is your turn to collect the book.
Oops! Something went wrong.
Looks like we were not able to place the reservation. Kindly try again later.
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
Do you wish to request the book?
Several Attacks on Attribute-Based Encryption Schemes
by
Le, Phi Thuong
, Trinh, Viet Cuong
, Le, Huy Quoc
in
Access control
/ Cloud computing
/ Collusion
/ Copy protection
/ Cryptography
/ Cybersecurity
/ Encryption
2025
Please be aware that the book you have requested cannot be checked out. If you would like to checkout this book, you can reserve another copy
We have requested the book for you!
Your request is successful and it will be processed during the Library working hours. Please check the status of your request in My Requests.
Oops! Something went wrong.
Looks like we were not able to place your request. Kindly try again later.
Journal Article
Several Attacks on Attribute-Based Encryption Schemes
2025
Request Book From Autostore
and Choose the Collection Method
Overview
Attribute-based encryption () is a cryptographic framework that provides flexible access control by allowing encryption based on user attributes. is widely applied in cloud storage, file sharing, e-Health, and digital rights management. schemes rely on hard cryptographic assumptions such as pairings and others (pairing-free) to ensure their security against external and internal attacks. Internal attacks are carried out by authorized users who misuse their access to compromise security with potentially malicious intent. One common internal attack is the attribute collusion attack, in which users with different attribute keys collaborate to decrypt data they could not individually access. This paper focuses on the ciphertext-policy (-), a type of where ciphertexts are produced with access policies. Our first work is to carry out the attribute collusion attack against several existing pairing-free - schemes. As a main contribution, we introduce a novel attack, termed the anonymous key-leakage attack, concerning the context in which users could anonymously publish their secret keys associated with certain attributes on public platforms without the risk of detection. This kind of internal attack has not been defined or investigated in the literature. We then show that several prominent pairing-based - schemes are vulnerable to this attack. We believe that this work will contribute to helping the community evaluate suitable - schemes for secure deployment in real-life applications.
Publisher
Tech Science Press
Subject
This website uses cookies to ensure you get the best experience on our website.