Attribute-based encryption in securing big data from post-quantum perspective: A survey

Attribute-based encryption (ABE) cryptography is widely known for its potential to solve the scalability issue of recent public key infrastructure (PKI). It provides a fine-grained access control system with high flexibility and efficiency by labeling the secret key and ciphertext with distinctive a...

Full description

Bibliographic Details
Main Authors: Zulianie Jemihin, Soo, Fun Tan, Gwo, Chin Chung
Format: Article
Language:English
English
Published: MDPI 2022
Subjects:
Online Access:https://eprints.ums.edu.my/id/eprint/36585/1/ABSTRACT.pdf
https://eprints.ums.edu.my/id/eprint/36585/2/FULLTEXT.pdf
_version_ 1825715316026507264
author Zulianie Jemihin
Soo, Fun Tan
Gwo, Chin Chung
author_facet Zulianie Jemihin
Soo, Fun Tan
Gwo, Chin Chung
author_sort Zulianie Jemihin
collection UMS
description Attribute-based encryption (ABE) cryptography is widely known for its potential to solve the scalability issue of recent public key infrastructure (PKI). It provides a fine-grained access control system with high flexibility and efficiency by labeling the secret key and ciphertext with distinctive attributes. Due to its fine-grained features, the ABE scheme is a protection layer in securing users’ data and privacy in big data processing and analytics. However, quantum computing, new technology on the horizon that will transform the security and privacy environment, has begun to appear. Like the conventional ABE schemes, present cryptography is not excluded from the impacts of quantum technology as they are not made to be quantum-resistant. While most recent surveys generally touched on the generic features of attribute-based encryption schemes such as user revocation, scalability, flexibility, data confidentiality, and scope in pairing-based ABE schemes, this survey investigated quantum-resistant ABE schemes in securing big data. This survey reviews the challenges faced by the recent ABE cryptography in the post-quantum era and highlights its differences from the conventional pairing-based ABE schemes. Subsequently, we defined the criteria of an ideal quantum-resistant ABE scheme. Additionally, existing works on quantum-resistant ABE schemes are reviewed based on their algorithms design, security and functionalities. Lastly, we summarized quantum-resistant ABE schemes’ ongoing challenges and future works.
first_indexed 2024-03-06T03:25:01Z
format Article
id ums.eprints-36585
institution Universiti Malaysia Sabah
language English
English
last_indexed 2024-03-06T03:25:01Z
publishDate 2022
publisher MDPI
record_format dspace
spelling ums.eprints-365852023-08-22T02:11:07Z https://eprints.ums.edu.my/id/eprint/36585/ Attribute-based encryption in securing big data from post-quantum perspective: A survey Zulianie Jemihin Soo, Fun Tan Gwo, Chin Chung QA299.6-433 Analysis Attribute-based encryption (ABE) cryptography is widely known for its potential to solve the scalability issue of recent public key infrastructure (PKI). It provides a fine-grained access control system with high flexibility and efficiency by labeling the secret key and ciphertext with distinctive attributes. Due to its fine-grained features, the ABE scheme is a protection layer in securing users’ data and privacy in big data processing and analytics. However, quantum computing, new technology on the horizon that will transform the security and privacy environment, has begun to appear. Like the conventional ABE schemes, present cryptography is not excluded from the impacts of quantum technology as they are not made to be quantum-resistant. While most recent surveys generally touched on the generic features of attribute-based encryption schemes such as user revocation, scalability, flexibility, data confidentiality, and scope in pairing-based ABE schemes, this survey investigated quantum-resistant ABE schemes in securing big data. This survey reviews the challenges faced by the recent ABE cryptography in the post-quantum era and highlights its differences from the conventional pairing-based ABE schemes. Subsequently, we defined the criteria of an ideal quantum-resistant ABE scheme. Additionally, existing works on quantum-resistant ABE schemes are reviewed based on their algorithms design, security and functionalities. Lastly, we summarized quantum-resistant ABE schemes’ ongoing challenges and future works. MDPI 2022-08-05 Article NonPeerReviewed text en https://eprints.ums.edu.my/id/eprint/36585/1/ABSTRACT.pdf text en https://eprints.ums.edu.my/id/eprint/36585/2/FULLTEXT.pdf Zulianie Jemihin and Soo, Fun Tan and Gwo, Chin Chung (2022) Attribute-based encryption in securing big data from post-quantum perspective: A survey. Cryptography, 6 (40). pp. 1-15. ISSN 2410-387X https:// doi.org/10.3390/cryptography6030040
spellingShingle QA299.6-433 Analysis
Zulianie Jemihin
Soo, Fun Tan
Gwo, Chin Chung
Attribute-based encryption in securing big data from post-quantum perspective: A survey
title Attribute-based encryption in securing big data from post-quantum perspective: A survey
title_full Attribute-based encryption in securing big data from post-quantum perspective: A survey
title_fullStr Attribute-based encryption in securing big data from post-quantum perspective: A survey
title_full_unstemmed Attribute-based encryption in securing big data from post-quantum perspective: A survey
title_short Attribute-based encryption in securing big data from post-quantum perspective: A survey
title_sort attribute based encryption in securing big data from post quantum perspective a survey
topic QA299.6-433 Analysis
url https://eprints.ums.edu.my/id/eprint/36585/1/ABSTRACT.pdf
https://eprints.ums.edu.my/id/eprint/36585/2/FULLTEXT.pdf
work_keys_str_mv AT zulianiejemihin attributebasedencryptioninsecuringbigdatafrompostquantumperspectiveasurvey
AT soofuntan attributebasedencryptioninsecuringbigdatafrompostquantumperspectiveasurvey
AT gwochinchung attributebasedencryptioninsecuringbigdatafrompostquantumperspectiveasurvey