Attacking pairing-free attribute-based encryption schemes

View/Open
Cita com:
hdl:2117/335791
Document typeArticle
Defense date2020
PublisherInstitute of Electrical and Electronics Engineers (IEEE)
Rights accessOpen Access
All rights reserved. This work is protected by the corresponding intellectual and industrial
property rights. Without prejudice to any existing legal exemptions, reproduction, distribution, public
communication or transformation of this work are prohibited without permission of the copyright holder
Abstract
Combining several results that have been published in the last years, it is known that it is impossible to design simple and secure attribute-based encryption schemes that work in (classical) settings like the RSA or the pairing-free discrete logarithm ones. The purpose of this article is to broadcast this message through a wide (maybe non-cryptographic) audience, specially now that attribute-based encryption is considered as a useful tool to secure real systems like the Internet of Things. Today, only attribute-based encryption schemes that employ tools like bilinear pairings or lattices can provide some real (and provable) level of security. As an example of the fact that this message is still unknown for many people, we revisit a (maybe non exhaustive) list of articles proposing such insecure attribute-based encryption schemes: we recall which of these schemes have already been attacked and we describe attacks for the other ones.
CitationHerranz, J. Attacking pairing-free attribute-based encryption schemes. "IEEE access", 2020, vol. 8, p. 222226-222232.
ISSN2169-3536
Publisher versionhttps://ieeexplore.ieee.org/document/9291064
Files | Description | Size | Format | View |
---|---|---|---|---|
09291064_herranz.pdf | 445,1Kb | View/Open |