Attribute-based encryption in securing big data from post-quantum perspective: A survey
Attribute-based encryption (ABE) cryptography is widely known for its potential to solve the scalability issue of recent public key infrastructure (PKI). It provides a fine-grained access control system with high flexibility and efficiency by labeling the secret key and ciphertext with distinctive a...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English English |
Published: |
MDPI
2022
|
Subjects: | |
Online Access: | https://eprints.ums.edu.my/id/eprint/36585/1/ABSTRACT.pdf https://eprints.ums.edu.my/id/eprint/36585/2/FULLTEXT.pdf |
_version_ | 1825715316026507264 |
---|---|
author | Zulianie Jemihin Soo, Fun Tan Gwo, Chin Chung |
author_facet | Zulianie Jemihin Soo, Fun Tan Gwo, Chin Chung |
author_sort | Zulianie Jemihin |
collection | UMS |
description | Attribute-based encryption (ABE) cryptography is widely known for its potential to solve the scalability issue of recent public key infrastructure (PKI). It provides a fine-grained access control system with high flexibility and efficiency by labeling the secret key and ciphertext with distinctive attributes. Due to its fine-grained features, the ABE scheme is a protection layer in securing users’ data and privacy in big data processing and analytics. However, quantum computing, new technology on the horizon that will transform the security and privacy environment, has begun to appear. Like the conventional ABE schemes, present cryptography is not excluded from the impacts of quantum technology as they are not made to be quantum-resistant. While most recent surveys generally touched on the generic features of attribute-based encryption schemes such as user revocation, scalability, flexibility, data confidentiality, and scope in pairing-based ABE schemes, this survey investigated quantum-resistant ABE schemes in securing big data. This survey reviews the challenges faced by the recent ABE cryptography in the post-quantum era and highlights its differences from the conventional pairing-based ABE schemes. Subsequently, we defined the criteria of an ideal quantum-resistant ABE scheme. Additionally, existing works on quantum-resistant ABE schemes are reviewed based on their algorithms design, security and functionalities. Lastly, we summarized quantum-resistant ABE schemes’ ongoing challenges and future works. |
first_indexed | 2024-03-06T03:25:01Z |
format | Article |
id | ums.eprints-36585 |
institution | Universiti Malaysia Sabah |
language | English English |
last_indexed | 2024-03-06T03:25:01Z |
publishDate | 2022 |
publisher | MDPI |
record_format | dspace |
spelling | ums.eprints-365852023-08-22T02:11:07Z https://eprints.ums.edu.my/id/eprint/36585/ Attribute-based encryption in securing big data from post-quantum perspective: A survey Zulianie Jemihin Soo, Fun Tan Gwo, Chin Chung QA299.6-433 Analysis Attribute-based encryption (ABE) cryptography is widely known for its potential to solve the scalability issue of recent public key infrastructure (PKI). It provides a fine-grained access control system with high flexibility and efficiency by labeling the secret key and ciphertext with distinctive attributes. Due to its fine-grained features, the ABE scheme is a protection layer in securing users’ data and privacy in big data processing and analytics. However, quantum computing, new technology on the horizon that will transform the security and privacy environment, has begun to appear. Like the conventional ABE schemes, present cryptography is not excluded from the impacts of quantum technology as they are not made to be quantum-resistant. While most recent surveys generally touched on the generic features of attribute-based encryption schemes such as user revocation, scalability, flexibility, data confidentiality, and scope in pairing-based ABE schemes, this survey investigated quantum-resistant ABE schemes in securing big data. This survey reviews the challenges faced by the recent ABE cryptography in the post-quantum era and highlights its differences from the conventional pairing-based ABE schemes. Subsequently, we defined the criteria of an ideal quantum-resistant ABE scheme. Additionally, existing works on quantum-resistant ABE schemes are reviewed based on their algorithms design, security and functionalities. Lastly, we summarized quantum-resistant ABE schemes’ ongoing challenges and future works. MDPI 2022-08-05 Article NonPeerReviewed text en https://eprints.ums.edu.my/id/eprint/36585/1/ABSTRACT.pdf text en https://eprints.ums.edu.my/id/eprint/36585/2/FULLTEXT.pdf Zulianie Jemihin and Soo, Fun Tan and Gwo, Chin Chung (2022) Attribute-based encryption in securing big data from post-quantum perspective: A survey. Cryptography, 6 (40). pp. 1-15. ISSN 2410-387X https:// doi.org/10.3390/cryptography6030040 |
spellingShingle | QA299.6-433 Analysis Zulianie Jemihin Soo, Fun Tan Gwo, Chin Chung Attribute-based encryption in securing big data from post-quantum perspective: A survey |
title | Attribute-based encryption in securing big data from post-quantum perspective: A survey |
title_full | Attribute-based encryption in securing big data from post-quantum perspective: A survey |
title_fullStr | Attribute-based encryption in securing big data from post-quantum perspective: A survey |
title_full_unstemmed | Attribute-based encryption in securing big data from post-quantum perspective: A survey |
title_short | Attribute-based encryption in securing big data from post-quantum perspective: A survey |
title_sort | attribute based encryption in securing big data from post quantum perspective a survey |
topic | QA299.6-433 Analysis |
url | https://eprints.ums.edu.my/id/eprint/36585/1/ABSTRACT.pdf https://eprints.ums.edu.my/id/eprint/36585/2/FULLTEXT.pdf |
work_keys_str_mv | AT zulianiejemihin attributebasedencryptioninsecuringbigdatafrompostquantumperspectiveasurvey AT soofuntan attributebasedencryptioninsecuringbigdatafrompostquantumperspectiveasurvey AT gwochinchung attributebasedencryptioninsecuringbigdatafrompostquantumperspectiveasurvey |