A machine-learning–blockchain-based authentication using smart contracts for an ioht system

R Gaur, S Prakash, S Kumar, K Abhishek, M Msahli… - Sensors, 2022 - mdpi.com
Nowadays, finding genetic components and determining the likelihood that treatment would
be helpful for patients are the key issues in the medical field. Medical data storage in a …

FABEO: Fast attribute-based encryption with optimal security

D Riepel, H Wee - Proceedings of the 2022 ACM SIGSAC Conference on …, 2022 - dl.acm.org
Attribute-based encryption (ABE) enables fine-grained access control on encrypted data and
has a large number of practical applications. This paper presents FABEO: faster pairing …

ReTRACe: Revocable and traceable blockchain rewrites using attribute-based cryptosystems

G Panwar, R Vishwanathan, S Misra - … of the 26th ACM Symposium on …, 2021 - dl.acm.org
In this paper, we study efficient and authorized rewriting of transactions already written to a
blockchain. Mutable transactions will make a fraction of all blockchain transactions, but will …

Fuzzy identity-based matchmaking encryption and its application

A Wu, W Luo, J Weng, A Yang… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Ateniese et al. introduced the primitive of matchmaking encryption (ME) at CRYPTO 2019
and left open several important questions, which include extending ME to fuzzy cases or …

ABE squared: accurately benchmarking efficiency of attribute-based encryption

A de la Piedra, M Venema, G Alpár - Cryptology ePrint Archive, 2022 - eprint.iacr.org
Measuring efficiency is difficult. In the last decades, several works have contributed in the
quest to successfully determine and compare the efficiency of pairing-based attribute-based …

Systematizing core properties of pairing-based attribute-based encryption to uncover remaining challenges in enforcing access control in practice

M Venema, G Alpár, JH Hoepman - Designs, Codes and Cryptography, 2023 - Springer
Attribute-based encryption (ABE) cryptographically implements fine-grained access control
on data. As such, data can be stored by an entity that is not necessarily trusted to enforce …

Decentralized Multi-authority ABE for from BDH

P Datta, I Komargodski, B Waters - Journal of Cryptology, 2023 - Springer
Decentralized multi-authority attribute-based encryption (MA-ABE) is a strengthening of
standard ciphertext-policy attribute-based encryption so that there is no trusted central …

Unbounded dynamic predicate compositions in ABE from standard assumptions

N Attrapadung, J Tomida - … 2020: 26th International Conference on the …, 2020 - Springer
Abstract At Eurocrypt'19, Attrapadung presented several transformations that dynamically
compose a set of attribute-based encryption (ABE) schemes for simpler predicates into a …

Portunus: Re-imagining access control in distributed systems

W Ladd, T Verma, M Venema… - 2023 USENIX Annual …, 2023 - usenix.org
TLS termination, which is essential to network and security infrastructure providers, is an
extremely latency-sensitive operation that benefits from access to sensitive key material …

Decentralized multi-authority ABE for nc^ 1 from computational-bdh

P Datta, I Komargodski, B Waters - Cryptology ePrint Archive, 2021 - eprint.iacr.org
Decentralized multi-authority attribute-based encryption (𝖬𝖠-𝖠𝖡𝖤) is a strengthening of
standard ciphertext-policy attribute-based encryption so that there is no trusted central …