Practical Attacks on Attribute-Based Encryption
This paper explores real-world vulnerabilities and attack strategies against attribute-based encryption (ABE), a cryptographic scheme that enforces fine-grained access control based on user attributes.

Black Hat
1.3K views β’ Jan 31, 2022

About this video
Attribute-based encryption (ABE) implements fine-grained access control on data where the ability to decrypt a ciphertext is determined by the attributes owned by a user of the system. Hence, data can be stored by an entity that is not necessarily trusted to enforce access control. Moreover, multi-authority variants of ABE extend these capabilities to multiple-domain settings and remove the requirement of having a trusted third party. ABE is typically exemplified in the healthcare setting, where all nurses of the hospital A can only decrypt certain records whereas doctors of the same hospital have access to additional information about the patients. Further, ABE has been proposed to secure the Internet of Things and enforce authorization in cloud systems....
By: Antonio de la Piedra & Marloes Venema
Full Abstract & Presentation Materials: https://www.blackhat.com/eu-21/briefings/schedule/#practical-attacks-against-attribute-based-encryption-25058
By: Antonio de la Piedra & Marloes Venema
Full Abstract & Presentation Materials: https://www.blackhat.com/eu-21/briefings/schedule/#practical-attacks-against-attribute-based-encryption-25058
Video Information
Views
1.3K
Likes
22
Duration
38:07
Published
Jan 31, 2022
User Reviews
4.5
(1) Related Trending Topics
LIVE TRENDSRelated trending topics. Click any trend to explore more videos.
Trending Now