Attribute Based Encryption

  Рет қаралды 13,339

Shah Quadri

Shah Quadri

Күн бұрын

Пікірлер: 20
@sowrabigopi872
@sowrabigopi872 5 жыл бұрын
Very clearly explained. Easy to understand. Thank you very much!
@Tommy-oj4hd
@Tommy-oj4hd 5 жыл бұрын
2:05 - You got it wrong. Why does the User1 needs to use his private key to encrypt the message? In the PK cryptography, encrypting is done using the receiver's public key. Perhaps you've confused signing a message with encrypting the message?
@robfielding8566
@robfielding8566 4 жыл бұрын
he's not specifying which system he is encrypting with. in RSA, an encrypt with private key is a signature. the stuff he is doing with id/salt looks different. i am going to not judge it yet. attribute-based-encryption (cp-abe) is what led me here.
@robfielding8566
@robfielding8566 4 жыл бұрын
9:00 is very similar to where I ended up as well. There is a way to do things like ((a and c) or d) to allow for key calculation. My problem was that no matter how I attacked it, I could take my attributes (a,b,d) for myself, and collude with another certificate holder that had (e,c) to forge access to ((a and c) or d). The trick is to somehow watermark all attributes as being from the same certificate; so that users cannot combine them. This is actually hard; and probably involves Elliptic Curve Pairings to make it work. The easy part is representing it as an OR of AND circuit. The hard part is making sure that there are no intermediate steps that let a malicious pair of certificate owners to get access to an intermediate step to combine attributes from different certs. What is this useful for? It's for things like issuing badges that can decrypt any file (encrypted in the future or the past) where the boolean circuit holds. Things like encrypting files to security clearances, etc. The other hard part is to encode UNBOUNDED attributes. A small set, such as numbers from 0..1000 to encode access is easier. But there are a large number of email addresses, so you can't enumerate them.
@robfielding8566
@robfielding8566 4 жыл бұрын
Shah Quadri ... specifically what crypto primitives did you use? I can't figure out curve pairings. I can do simple demos of the concept using hashes, and RSA .... but both of them fall to attacks on the intermedicate steps. Usually due to something akin to multiplication distributing over addition.
@venkatpalivela9511
@venkatpalivela9511 4 жыл бұрын
Hi Shah ,i'm very new to this topic and requirements for the temporarily solution came here, i'm very happy to understand topic thank you for uploaded ..:)
@alekyayyenduri6961
@alekyayyenduri6961 4 жыл бұрын
Very good explanation sir Thanks for making a video
@subashj6421
@subashj6421 4 жыл бұрын
very clear explanation
@dr.j.joshuadanielraj9670
@dr.j.joshuadanielraj9670 6 жыл бұрын
hi can you explain the mathematical concepts related to the implementation of CP-ABE
@mohammedirfan7270
@mohammedirfan7270 5 жыл бұрын
Tq very good explanation
@dspatnaik1
@dspatnaik1 5 жыл бұрын
Well explained...
@NewHope18
@NewHope18 5 жыл бұрын
Good explained
@drn7481
@drn7481 5 жыл бұрын
Why would my antenna tv channel be encrypted
@prajoyvb
@prajoyvb 4 жыл бұрын
Hello sir I wanted to know the size of plaintext, key and ciphertext of KP-ABE algorithm
@deepikadhamija4548
@deepikadhamija4548 4 жыл бұрын
You haven't explained why they are collusion resistance which means if multiple users combine their attributes they can't decrypt the ciphertext
@jenebamary7899
@jenebamary7899 5 жыл бұрын
explanation to identity based encryption
@chandk7922
@chandk7922 5 жыл бұрын
Plz give the java code implementation for Cp ABE.. Its my project
@deepikadhamija4548
@deepikadhamija4548 4 жыл бұрын
Did you get java implementation of cpabe?
@rohitv1355
@rohitv1355 4 жыл бұрын
Did you get it?
@chandk7922
@chandk7922 4 жыл бұрын
No
Understanding Attribute Based Access Control (ABAC)
20:28
All Things IAM
Рет қаралды 16 М.
Walking on LEGO Be Like... #shorts #mingweirocks
00:41
mingweirocks
Рет қаралды 7 МЛН
PRANK😂 rate Mark’s kick 1-10 🤕
00:14
Diana Belitskay
Рет қаралды 12 МЛН
Кто круче, как думаешь?
00:44
МЯТНАЯ ФАНТА
Рет қаралды 4,9 МЛН
Secret Sharing Explained Visually
7:57
Art of the Problem
Рет қаралды 53 М.
Attribute-based Encryption for Circuits
53:54
Simons Institute
Рет қаралды 9 М.
Pairing-based Cryptography
27:16
Bill Buchanan OBE
Рет қаралды 7 М.
Chris Peikert: Lattice-Based Cryptography
1:19:38
QuICS
Рет қаралды 25 М.
Attribute based Encryption (ABE)
24:09
Internetwork Security
Рет қаралды 16 М.
Cracking Enigma in 2021 - Computerphile
21:20
Computerphile
Рет қаралды 2,5 МЛН
Attribute Based Encryption
9:24
ReScuE Labs
Рет қаралды 1,5 М.
Ciphertext-Policy Attribute-Based Encryption
16:16
Bill Buchanan OBE
Рет қаралды 11 М.
SHA: Secure Hashing Algorithm - Computerphile
10:21
Computerphile
Рет қаралды 1,2 МЛН
Walking on LEGO Be Like... #shorts #mingweirocks
00:41
mingweirocks
Рет қаралды 7 МЛН