Thatmann, D. and Butyrtschik, A. and Küpper, A. (2015). A Secure DHT-based Key Distribution System for Attribute-based Encryption and Decryption. 9th International Conference on Signal Processing and Communication Systems (ICSPCS 2015), IEEE
 Thatmann, D. and Zickau, S. and Förster, A. and Küpper, A. (2015). Applying Attribute-based Encryption on Publish Subscribe Messaging Patterns for the Internet of Things. The 8th IEEE International Conference on Internet of Things (IEEE iThings 2015), IEEE
 Zickau, S. and Thatmann, D. and Butyrtschik, A. and Denisow, I. and Küpper, A. (2016) Applied Attribute-based Encryption Schemes. 19th Int. Conf. on Innovation in Clouds, Internet and Networks (ICIN 2016), IEEE
 Thatmann, D. and Raschke, P. and Küpper, A. (2016) “Please, no more GUIs!”: A user study, prototype development and evaluation on the integration of Attribute-based Encryption in a hospital environment. 40th IEEE Computer Society International Conference on Computers, Software & Applications (IEEE Compsac 2016) and its 3rd International Workshop on User Centered Design and Adaptive Systems (UCDAS2016), IEEE
 Thatmann, D. (2016). Non-monotonic practical Attribute-based Encryption. PDF
 (In progress)A tutorial and survey on Attribute-based Encryption. It will cover pairings, access structures, available schemes and more. (planned as journal article)
Whitepapers / posters:
 Thatmann, D. and Butyrtschik, A. and Raschke, P. and Küpper, A. (2015). Entrance Share & Control Your Data [Poster] PDF
Abstract component architecture:
Figure 1: Overview of implemented components.
The backend components marked in red can be deployed in a home network. They mainly consist of the Attribute-Authority which provides the cryptography primitives, such as key generation, encryption, decryption and malicious user tracing. We provide a container format where encrypted data (files) can be collected. A manifest describes the container structure.
The secret ABE keys can be distributed over a DHT to receivers. By this we provide the notion of “ciphertext expiration”. The secret ABE key is split up using a Secret Sharing Scheme (SSS), all fragments are hashed and encrypted and pushed into the DHT (creating shares) .A basic algorithm is described in the scientific publication “A Secure DHT-based Key Distribution System for Attribute-based Encryption and Decryption” and in short introduced in the Entrance poster. Another revocation notion called “attribute expiration” is depicted in Figure 2.
Figure 2: Attribute Expiration.