Practical Attacks on Attribute-Based Encryption
This paper explores real-world vulnerabilities and attack strategies against attribute-based encryption (ABE), a cryptographic scheme that enforces fine-grained access control based on user attributes.
🔥 Related Trending Topics
LIVE TRENDSThis video may be related to current global trending topics. Click any trend to explore more videos about what's hot right now!
THIS VIDEO IS TRENDING!
This video is currently trending in Saudi Arabia under the topic 'new zealand national cricket team vs west indies cricket team match scorecard'.
About this video
Attribute-based encryption (ABE) implements fine-grained access control on data where the ability to decrypt a ciphertext is determined by the attributes owned by a user of the system. Hence, data can be stored by an entity that is not necessarily trusted to enforce access control. Moreover, multi-authority variants of ABE extend these capabilities to multiple-domain settings and remove the requirement of having a trusted third party. ABE is typically exemplified in the healthcare setting, where all nurses of the hospital A can only decrypt certain records whereas doctors of the same hospital have access to additional information about the patients. Further, ABE has been proposed to secure the Internet of Things and enforce authorization in cloud systems....
By: Antonio de la Piedra & Marloes Venema
Full Abstract & Presentation Materials: https://www.blackhat.com/eu-21/briefings/schedule/#practical-attacks-against-attribute-based-encryption-25058
Video Information
Views
1.3K
Total views since publication
Likes
22
User likes and reactions
Duration
38:07
Video length
Published
Jan 31, 2022
Release date
Quality
hd
Video definition