Towards a Cryptography Benchmark: A View on Attribute Based Encryption Schemes

Thomas Prantl, Timo Zeck, Lukas Iffländer, Lukas Beierlieb, A. Dmitrenko, Christian Krupitzer, Samuel Kounev
{"title":"Towards a Cryptography Benchmark: A View on Attribute Based Encryption Schemes","authors":"Thomas Prantl, Timo Zeck, Lukas Iffländer, Lukas Beierlieb, A. Dmitrenko, Christian Krupitzer, Samuel Kounev","doi":"10.1109/ciot53061.2022.9766494","DOIUrl":null,"url":null,"abstract":"In many Internet-of-Things (IoT) scenarios - such as smart home, or intelligent traffic systems - groups of devices interact with each other. Such scenarios no longer require encryption for individual recipients but for groups of recipients, i.e., this is a shift towards 1-to-n and n-to-n encryption schemes. Developers must select the scheme that (1) offers the required functional encryption features, (2) has the non-functional requirements best fitting the specific use case, and (3) is the most performant in the specific group setting. In other research domains, benchmarks help to support researchers, but also practitioners, in the choice of the best technology for a specific use case. However, there is no benchmark for encryption schemes available that covers all different types of encryption schemes, like 1-to-n and n-to-n encryption. In this paper, we provide such a benchmark for the category of attribute-based encryption schemes (ABE), especially focusing on the workloads, measurement setup, metrics, requirements, and features for an attribute based 1-to-n encryption scheme benchmark. Additionally, we describe how to include n-to-n encryption schemes. Lastly, we apply the benchmark to compare attribute-based encryption schemes among and with n-to-n group encryption schemes. Our result indicate that (1) our benchmark is suitable for evaluating ABE schemes as 1-to-n and n-to-n ciphers, (2) there is no single scheme that performs best in all scenarios and (3) with ABE schemes extended to n-to-n encryption schemes, a combination of constant computation times and an efficient use of broadcast is possible, which is not the case with traditional n-to-n encryption schemes.","PeriodicalId":180813,"journal":{"name":"2022 5th Conference on Cloud and Internet of Things (CIoT)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 5th Conference on Cloud and Internet of Things (CIoT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ciot53061.2022.9766494","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

In many Internet-of-Things (IoT) scenarios - such as smart home, or intelligent traffic systems - groups of devices interact with each other. Such scenarios no longer require encryption for individual recipients but for groups of recipients, i.e., this is a shift towards 1-to-n and n-to-n encryption schemes. Developers must select the scheme that (1) offers the required functional encryption features, (2) has the non-functional requirements best fitting the specific use case, and (3) is the most performant in the specific group setting. In other research domains, benchmarks help to support researchers, but also practitioners, in the choice of the best technology for a specific use case. However, there is no benchmark for encryption schemes available that covers all different types of encryption schemes, like 1-to-n and n-to-n encryption. In this paper, we provide such a benchmark for the category of attribute-based encryption schemes (ABE), especially focusing on the workloads, measurement setup, metrics, requirements, and features for an attribute based 1-to-n encryption scheme benchmark. Additionally, we describe how to include n-to-n encryption schemes. Lastly, we apply the benchmark to compare attribute-based encryption schemes among and with n-to-n group encryption schemes. Our result indicate that (1) our benchmark is suitable for evaluating ABE schemes as 1-to-n and n-to-n ciphers, (2) there is no single scheme that performs best in all scenarios and (3) with ABE schemes extended to n-to-n encryption schemes, a combination of constant computation times and an efficient use of broadcast is possible, which is not the case with traditional n-to-n encryption schemes.
迈向密码学基准:基于属性的加密方案的观点
在许多物联网(IoT)场景中,例如智能家居或智能交通系统,设备组相互交互。这样的场景不再需要对单个接收者进行加密,而是对一组接收者进行加密,也就是说,这是向1对n和n对n加密方案的转变。开发人员必须选择以下方案:(1)提供所需的功能加密特性,(2)具有最适合特定用例的非功能需求,以及(3)在特定组设置中性能最好。在其他研究领域,基准测试帮助支持研究人员,同时也支持实践者,为特定用例选择最佳技术。但是,目前还没有适用于所有不同类型加密方案的加密方案基准,比如1对n和n对n加密。在本文中,我们为基于属性的加密方案(ABE)类别提供了这样一个基准,特别关注基于属性的1对n加密方案基准的工作负载、测量设置、度量、需求和功能。此外,我们还描述了如何包含n-to-n加密方案。最后,我们应用基准比较了基于属性的加密方案与n-to-n组加密方案之间的差异。我们的结果表明:(1)我们的基准适用于将ABE方案评估为1-to-n和n-to-n密码;(2)没有单一方案在所有场景中都表现最好;(3)将ABE方案扩展到n-to-n加密方案,可以将恒定的计算时间和有效的广播利用结合起来,这与传统的n-to-n加密方案不同。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信