Materials

Scientific papers:

[1] Thatmann, D. and Butyrtschik, A. and Küpper, A. (2015). A Secure DHT-based Key Distribution System for Attribute-based Encryption and Decryption. 9th International Conference on Signal Processing and Communication Systems (ICSPCS 2015), IEEE
[2] Thatmann, D. and Zickau, S. and Förster, A. and Küpper, A. (2015). Applying Attribute-based Encryption on Publish Subscribe Messaging Patterns for the Internet of Things. The 8th IEEE International Conference on Internet of Things (IEEE iThings 2015), IEEE
[3] Zickau, S. and Thatmann, D. and Butyrtschik, A. and Denisow, I. and Küpper, A. (2016) Applied Attribute-based Encryption Schemes. 19th Int. Conf. on Innovation in Clouds, Internet and Networks (ICIN 2016), IEEE
[4] Thatmann, D. and Raschke, P. and Küpper, A. (2016) “Please, no more GUIs!”: A user study, prototype development and evaluation on the integration of Attribute-based Encryption in a hospital environment. 40th IEEE Computer Society International Conference on Computers, Software & Applications (IEEE Compsac 2016) and its 3rd International Workshop on User Centered Design and Adaptive Systems (UCDAS2016), IEEE
[5] Thatmann, D. (2016). Non-monotonic practical Attribute-based Encryption. PDF
[6] (In progress)A tutorial and survey on Attribute-based Encryption. It will cover pairings, access structures, available schemes and more. (planned as journal article)

Whitepapers / posters:

[1] Thatmann, D. and Butyrtschik, A. and Raschke, P. and Küpper, A. (2015). Entrance Share & Control Your Data [Poster] PDF

Abstract component architecture:

Figure 1: Overview of implemented components.

The backend components marked in red can be deployed in a home network. They mainly consist of the Attribute-Authority which provides the cryptography primitives, such as key generation, encryption, decryption and malicious user tracing. We provide a container format where encrypted data (files) can be collected. A manifest describes the container structure.

The secret ABE keys can be distributed over a DHT to receivers. By this we provide the notion of  “ciphertext expiration”. The secret ABE key is split up using a Secret Sharing Scheme (SSS), all fragments are hashed and encrypted and pushed into the DHT (creating shares) .A basic algorithm is described in the scientific publication “A Secure DHT-based Key Distribution System for Attribute-based Encryption and Decryption” and in short introduced in the Entrance poster. Another revocation notion called “attribute expiration” is depicted in Figure 2.

Figure 2: Attribute Expiration.