Главная
Study mode:
on
1
Intro
2
Motivation
3
Overview
4
Introduction to ABE
5
Ciphertext-policy (CP) ABE
6
Multi-authority ABE: corruption
7
Applications of ABE in the Cloud
8
Components of ABE
9
Elliptic curves
10
Pairings
11
Secret sharing
12
Toy example
13
How ABE schemes fail in theory
14
Pairing-free elliptic-curve schemes
15
Venema-Alpár framework
16
Attack on DAC-MACS
17
Attack on YJ14
18
Open-source ABE implementations
19
Concluding remarks
Description:
Explore practical attacks against Attribute-based Encryption (ABE) in this 38-minute Black Hat conference talk. Delve into the intricacies of ABE, a cryptographic system that implements fine-grained access control on data without relying on a trusted entity to enforce it. Examine multi-authority variants of ABE and their applications in healthcare, Internet of Things, and cloud systems. Learn about the components of ABE, including elliptic curves, pairings, and secret sharing. Analyze how ABE schemes can fail theoretically and study specific attacks on pairing-free elliptic-curve schemes. Investigate open-source ABE implementations and gain insights into the Venema-Alpár framework. Presented by Antonio de la Piedra and Marloes Venema, this talk provides a comprehensive overview of ABE vulnerabilities and their practical implications.

Practical Attacks Against Attribute-based Encryption

Black Hat
Add to list