TY - GEN
T1 - MATRaCAE
T2 - 21st International Conference on Security and Cryptography, SECRYPT 2024
AU - Gritti, Clémentine
AU - Regnath, Emanuel
AU - Steinhorst, Sebastian
N1 - Publisher Copyright:
© 2024 by SCITEPRESS – Science and Technology Publications, Lda.
PY - 2024
Y1 - 2024
N2 - Internet of Things (IoT) promises a strong connection between digital and physical environments. Nevertheless, this framework comes with security vulnerabilities, due to the heterogeneous nature of devices and the diversity of their provenance. Furthermore, technical constraints (e.g. devices’ limited resources) require to lighten the design of the underlying security protocols. Liu et al. presented a system for data access with time-based control and direct user revocation that are beneficial features in IoT. In this paper, we propose an extension of this system, called MATRaCAE, that involves multiple authorities and considers binary time credentials. Doing so, we mitigate the key escrow problem and comes with a better trade-off between key update frequency and number of revoked users, which limited the applicability of Liu et al.’s scheme in IoT. Our solution can be proved secure under the Decisional Bilinear Diffie-Hellman Exponent assumption. Subsequently, we implement and evaluate MATRaCAE to demonstrate its suitability to IoT frameworks.
AB - Internet of Things (IoT) promises a strong connection between digital and physical environments. Nevertheless, this framework comes with security vulnerabilities, due to the heterogeneous nature of devices and the diversity of their provenance. Furthermore, technical constraints (e.g. devices’ limited resources) require to lighten the design of the underlying security protocols. Liu et al. presented a system for data access with time-based control and direct user revocation that are beneficial features in IoT. In this paper, we propose an extension of this system, called MATRaCAE, that involves multiple authorities and considers binary time credentials. Doing so, we mitigate the key escrow problem and comes with a better trade-off between key update frequency and number of revoked users, which limited the applicability of Liu et al.’s scheme in IoT. Our solution can be proved secure under the Decisional Bilinear Diffie-Hellman Exponent assumption. Subsequently, we implement and evaluate MATRaCAE to demonstrate its suitability to IoT frameworks.
KW - Attribute-Based Encryption
KW - Direct Revocation
KW - Internet of Things
KW - Time-Based Access Control
UR - http://www.scopus.com/inward/record.url?scp=85202888630&partnerID=8YFLogxK
U2 - 10.5220/0012825700003767
DO - 10.5220/0012825700003767
M3 - Conference contribution
AN - SCOPUS:85202888630
T3 - Proceedings of the International Conference on Security and Cryptography
SP - 274
EP - 285
BT - Proceedings of the 21st International Conference on Security and Cryptography, SECRYPT 2024
A2 - Di Vimercati, Sabrina De Capitani
A2 - Samarati, Pierangela
PB - Science and Technology Publications, Lda
Y2 - 8 July 2024 through 10 July 2024
ER -