YoVDO

Practical Attacks Against Attribute-based Encryption

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Cybersecurity Courses Cryptography Courses Cloud Security Courses Elliptic Curves Courses Vulnerability Analysis Courses Attribute-Based Encryption Courses

Course Description

Overview

Explore practical attacks against Attribute-based Encryption (ABE) in this 38-minute Black Hat conference talk. Delve into the intricacies of ABE, a cryptographic system that implements fine-grained access control on data without relying on a trusted entity to enforce it. Examine multi-authority variants of ABE and their applications in healthcare, Internet of Things, and cloud systems. Learn about the components of ABE, including elliptic curves, pairings, and secret sharing. Analyze how ABE schemes can fail theoretically and study specific attacks on pairing-free elliptic-curve schemes. Investigate open-source ABE implementations and gain insights into the Venema-Alpár framework. Presented by Antonio de la Piedra and Marloes Venema, this talk provides a comprehensive overview of ABE vulnerabilities and their practical implications.

Syllabus

Intro
Motivation
Overview
Introduction to ABE
Ciphertext-policy (CP) ABE
Multi-authority ABE: corruption
Applications of ABE in the Cloud
Components of ABE
Elliptic curves
Pairings
Secret sharing
Toy example
How ABE schemes fail in theory
Pairing-free elliptic-curve schemes
Venema-Alpár framework
Attack on DAC-MACS
Attack on YJ14
Open-source ABE implementations
Concluding remarks


Taught by

Black Hat

Related Courses

Adaptively Secure ABE for DFA from k-Lin and More
TheIACR via YouTube
Advanced Public-Key Encryption
RSA Conference via YouTube
Attribute Based and Fully Homomorphic Encryption
TheIACR via YouTube
Attribute-based Encryption
TheIACR via YouTube
Compact Adaptively Secure ABE from k-Lin - Beyond NC1 and Towards NL
TheIACR via YouTube