Title :
Survey of attribute based encryption
Author :
Zhi Qiao ; Shuwen Liang ; Davis, Stephen ; Hai Jiang
Author_Institution :
Dept. of Comput. Sci., Arkansas State Univ., Jonesboro, AR, USA
fDate :
June 30 2014-July 2 2014
Abstract :
In Attribute Based Encryption, a set of descriptive attributes is used as an identity to generate a secret key, as well as serving as the access structure that performs access control. It successfully integrates Encryption and Access Control and is ideal for sharing secrets among groups, especially in a Cloud environment. Most developed ABE schemes support key-policy or ciphertext-policy access control in addition to other features such as decentralized authority, efficient revocation and key delegation. This paper surveys mainstream papers, analyzes main features for desired ABE systems, and classifies them into different categories. With this high-level guidance, future researchers can treat these features as individual modules and select related ones to build their ABE systems on demand.
Keywords :
authorisation; cryptography; ABE schemes; attribute based encryption; ciphertext-policy access control; descriptive attributes; key-policy access control; secret key; Access control; Complexity theory; Encryption; Lattices; Protocols;
Conference_Titel :
Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD), 2014 15th IEEE/ACIS International Conference on
Conference_Location :
Las Vegas, NV
DOI :
10.1109/SNPD.2014.6888687