Vai al contenuto principale della pagina
Autore: | Xia Qi |
Titolo: | Attribute-Based Encryption (ABE) : Foundations and Applications Within Blockchain and Cloud Environments / / Qi Xia [and four others] |
Pubblicazione: | Hoboken, New Jersey : , : John Wiley & Sons, Inc., , [2024] |
©2024 | |
Edizione: | First edition. |
Descrizione fisica: | 1 online resource (275 pages) |
Disciplina: | 005.74 |
Soggetto topico: | Public key cryptography |
Blockchains (Databases) | |
Nota di bibliografia: | Includes bibliographical references and index. |
Nota di contenuto: | Cover -- Title Page -- Copyright -- Contents -- About the Authors -- Preface -- Acknowledgments -- Part I Attribute‐Based Encryption (ABE) -- Chapter 1 Foundation of Attribute‐Based Encryption -- 1.1 Introduction -- 1.1.1 Symmetric Encryption -- 1.1.2 Asymmetric Key Encryption -- 1.1.3 Identity‐Based Encryption -- 1.2 Functional Encryption -- 1.2.1 Applications of Attribute‐Based Encryption -- 1.2.2 Problems with Attribute‐Based Encryption -- 1.2.3 A Brief History of Security Proof of Functional Encryption -- 1.2.4 Dual System of Encryption -- 1.2.5 Summary -- References -- Chapter 2 Mathematical Background -- 2.1 Group Theory -- 2.1.1 Law of Composition -- 2.1.2 Groups -- 2.1.3 Subgroups -- 2.1.4 Homomorphisms -- 2.1.5 Cyclic Group -- 2.2 Ring Theory -- 2.2.1 Ideals and Quotient Rings -- 2.2.2 Euler's Totient Function -- 2.2.3 Polynomial Rings -- 2.2.4 Irreducible and Monic Polynomials -- 2.2.5 Field Theory -- 2.2.5.1 Quotient Field -- 2.2.6 Field Characteristic -- 2.2.7 Algebraic Extension Fields -- 2.3 Elliptic Curves -- 2.3.1 Plane Curve -- 2.3.2 Group Operations on Elliptic Curves -- 2.3.2.1 Point Addition -- 2.3.2.2 Point Doubling -- 2.4 Divisors and Bilinear Map -- 2.4.1 Divisors -- 2.4.2 The Degree and Support of D -- 2.4.3 The Divisor of a Function f on E -- 2.4.4 Equivalence of Divisors -- 2.4.5 Bilinear Map -- 2.4.6 Weil Pairing -- 2.4.7 Miller's Algorithm -- 2.4.8 The Tate Pairing -- 2.5 Summary -- References -- Chapter 3 Attribute‐Based Encryption -- 3.1 Introduction -- 3.2 Basic Components of ABE Construction -- 3.2.1 Secret‐Sharing Schemes -- 3.2.2 Polynomial Interpolation -- 3.2.2.1 Polynomials Over the Reals -- 3.2.2.2 Polynomials Modulus P -- 3.2.3 Shamir Secret Sharing -- 3.2.4 Verifiable Secret Sharing (VSS) -- 3.2.4.1 Algorithm for Converting Access Structure Into LSSS Matrix -- 3.2.4.2 Access Structure Example. |
3.2.4.3 Algorithms in Attribute‐Based Encryption -- 3.2.5 Properties of Attribute‐Based Encryption -- 3.2.6 Prime Order Group -- 3.3 Cryptographic Hard Assumptions -- 3.3.1 Composite Order Bilinear Groups -- 3.3.2 Complexity Assumptions -- 3.4 Provable Security -- 3.5 Security Notions -- 3.5.1 Summary -- References -- Chapter 4 Data Access Control -- 4.1 Introduction -- 4.1.1 Coarse‐Grained -- 4.1.2 Fine‐Grained Access Control -- 4.1.3 Importance of Fine‐Grained Access Control -- 4.2 Concerns About Cloud‐Based Access Control that Are Trustworthy -- 4.2.1 Encryption Access Control -- 4.2.2 Requirements for Encryption‐Based Access Control -- 4.3 Summary -- References -- Chapter 5 Selective Secure ABE Schemes Based on Prime Order Group -- 5.1 Introduction -- 5.1.1 Selective Security Model for KP‐ABE -- 5.1.2 Selective Security Model for CP‐ABE -- 5.1.3 ABE Schemes -- 5.2 The KP‐ABE Scheme -- 5.2.1 Concrete Scheme Construction -- 5.2.2 Security Proof -- 5.3 The CP‐ABE Scheme -- 5.3.1 Concrete Scheme Construction -- 5.3.2 Security Proof -- 5.4 Summary -- References -- Chapter 6 Fully Secure ABE Schemes Based on Composite and Prime Order Groups -- 6.1 Introduction -- 6.2 A Fully Secure CP‐ABE from Composite Order Group -- 6.2.1 CP‐ABE Construction -- 6.2.2 Adaptive Security Proof -- 6.2.2.1 Description of Hybrids -- 6.2.3 Security Proof -- 6.3 A Fully Secure KP‐ABE Scheme Based on Dual Vector Space -- 6.3.1 KP‐ABE Construction -- 6.3.2 Adaptive Security -- 6.3.3 Security Proof -- 6.4 KP‐ABE Scheme Based on Matrix -- 6.4.1 The Scheme -- 6.4.2 Adaptive Security -- 6.4.3 Security Proof -- 6.5 Summary -- References -- Part II Concepts of Blockchain Technology -- Chapter 7 Blockchain Technology -- 7.1 Introduction -- 7.1.1 History -- 7.1.2 Preliminary Concepts of Blockchain Technology -- 7.1.3 Characteristics of Blockchain. | |
7.1.4 Evolution and Types of Blockchain -- 7.1.4.1 The Blockchain 1.0 -- 7.1.4.2 Blockchain 2.0 -- 7.1.4.3 Blockchain 3.0 -- 7.1.5 Permissionless vs Permissioned Blockchains -- 7.1.6 Types of Blockchain -- 7.2 Architecture of Blockchain -- 7.2.1 Architecture of Blockchain 1.0 (Cryptocurrencies) -- 7.2.2 Block -- 7.2.3 Node -- 7.2.4 Types of Blockchain Nodes -- 7.2.5 Consensus -- 7.3 Architecture of Blockchain 2.0 (Smart Contracts) -- 7.3.1 Introduction to Smart Contracts -- 7.3.2 How Smart Contracts Work -- 7.3.3 Example of Smart Contract -- 7.3.4 Uses of Smart Contracts -- 7.3.5 Advantages of Smart Contracts -- 7.3.6 Limitations of Smart Contracts -- 7.4 Architecture of Blockchain 3.0 (Blockchain Applications) -- 7.4.1 Consensus Mechanism -- 7.5 Blockchain 4.0 -- 7.5.1 Blockchain 4.0 Applications -- 7.5.2 Metaverse -- 7.5.3 Industrial Revolution 4.0 -- 7.5.4 Blockchain 4.0 for Businesses -- References -- Chapter 8 Scaling‐Out Blockchains with Sharding -- 8.1 Introduction -- 8.1.1 Scalability Trilemma -- 8.1.2 Nakamoto‐Based - Monoxide - Chu‐ko‐nu Mining -- 8.1.3 Elastico -- 8.1.4 OmniLedger -- 8.1.5 Rapid Chain -- 8.1.6 Learnings -- 8.1.7 General Improvements -- 8.1.7.1 Reducing Transaction Latency -- 8.1.7.2 Inter‐Communication Protocol -- 8.1.7.3 Shards Ledger Pruning -- 8.1.7.4 Decentralized Bootstrapping -- 8.1.7.5 Securing the Epoch Reconfiguration -- 8.1.7.6 Sharded Smart Contract -- 8.1.7.7 Replay Attacks and Defenses Against Cross‐Shard Protocols -- 8.2 Off‐Chain Solution: Layer 2 Solutions -- 8.2.1 State Channels -- 8.2.2 Side Chains of the Plasma -- 8.2.3 Problems with Data Accessibility -- 8.3 Rollups -- 8.3.1 Rollups Based on Zero Knowledge -- 8.3.2 Proofs of Zero‐Knowledge -- 8.3.3 Protocol Schnorr -- 8.3.4 Protocol Pedersen -- 8.3.5 zk‐SNARKs -- 8.4 Summary -- References -- Part III Applying Blockchain with Real‐Time Technologies. | |
Chapter 9 Blockchain Technology for Supply Management -- 9.1 Introduction -- 9.1.1 System Design -- 9.1.2 System Architecture -- 9.1.3 Entities of the System -- 9.1.3.1 Users -- 9.1.4 Smart Contract Control -- 9.1.5 Blockchain Network -- 9.1.5.1 Processing Nodes -- 9.1.5.2 System Application Layer -- 9.1.5.3 Storage Infrastructure -- 9.1.6 System Decryption -- 9.1.7 Blocks -- 9.1.7.1 Block Design -- 9.2 System Flow -- 9.2.1 System Advantages -- 9.2.2 Conclusion -- References -- Chapter 10 Satellite Communication -- 10.1 Introduction -- 10.1.1 Low‐Orbit Constellation Communication Networks -- 10.1.2 Interstellar Link Length -- 10.1.3 Model of Satellite Motion -- 10.1.4 Edge Computing Technologies -- 10.2 Analysis of Edge Computing Requirements of Low‐Orbit Constellation Communication Networks -- 10.2.1 Design of Edge Computing Architecture for Low‐Orbit Constellation Communication Networks -- 10.2.2 Satellite -- 10.2.3 System Entities -- 10.2.4 System Process Flow -- 10.2.5 Security Properties -- 10.3 Summary -- References -- Chapter 11 Foundation of Information‐Centric Communication -- 11.1 Introduction -- 11.2 Information‐Centric Communication -- 11.3 Name‐Based Routing of Content -- 11.4 Benefits of Using ICN -- 11.5 Cost‐Efficient and Scalable Distribution of Content Design Principles -- 11.6 ICN Design Challenges -- 11.6.1 Content Naming -- 11.6.2 Caching of Content -- 11.6.3 Data Integrity -- 11.6.4 Resolution System's Scalability and Name‐Based Routing -- References -- Chapter 12 Security Overall in Information‐Centric Networks -- 12.1 Introduction -- 12.2 Content‐Centric Network (CCN) Architecture -- 12.3 Naming System Design -- 12.4 Secure Naming Scheme for Information‐Centric Networks -- 12.5 Data Transmission - Content Delivery -- 12.6 Traffic Load in Network Caching -- 12.6.1 Store Unique Naming of Content in Caches. | |
12.6.2 Storage Limitation in Caching Space Devices -- 12.7 Content's Freshness Detection -- 12.8 ICN Security -- 12.9 Attacks in ICN Architectures -- 12.10 ICN Attributes to Ensure Security Threats -- 12.11 Traffic Analysis and Prediction -- 12.12 Some Key Problem Statements -- 12.13 Blockchain‐Based ICN Scheme Improvement -- 12.13.1 Protection Against DDos -- 12.14 A Secured Information‐Centric Network Based on Blockchain -- 12.14.1 Blockchain‐Based ICN Structure -- 12.14.1.1 Data Integrity -- 12.15 Attribute‐Based Encryption Scheme for the Information‐Centric Network -- 12.15.1 Applying Ciphertext‐Policy ABE (CP‐ABE) Scheme in ICN -- 12.15.2 System Design of CP‐ABE Scheme in ICN -- References -- Chapter 13 Subscriber Data Management System Based on Blockchain -- 13.1 Introduction -- 13.1.1 Motivation -- 13.1.2 Problem Statement -- 13.1.3 Contributions -- 13.2 Literature Review -- 13.3 System Design Description -- 13.3.1 Assumptions -- 13.3.2 Ciphertext‐Policy Attribute‐Based Encryption (CP‐ABE) -- 13.3.3 CP‐ABE Construction -- 13.3.4 System Components -- 13.3.4.1 Data Subscribers (DSs) -- 13.3.4.2 Data Providers (DPs) -- 13.3.4.3 Key Generation and Distribution Center (KGDC) -- 13.3.4.4 IPFS Distributed Storage -- 13.3.4.5 Blockchain Platform -- 13.3.5 Process Description -- 13.3.5.1 Subscriber Registration -- 13.3.5.2 Subscriber Data Storage -- 13.3.5.3 Subscriber Data Request -- 13.3.6 Benefits of Proposed Design -- 13.3.7 Security Requirements -- 13.4 Summary -- References -- Chapter 14 A Secure Data‐Sharing Blockchain‐Based Crowdfunding System -- 14.1 Introduction -- 14.2 Literature Review -- 14.2.1 Present‐Day Centralized Crowdfunding -- 14.2.2 Crowdfunding Models -- 14.2.3 Problems of Traditional Crowdfunding -- 14.2.4 Blockchain‐Based Crowdfunding -- 14.2.5 Advantages of Blockchain‐Based Crowdfunding -- 14.3 Proposed System. | |
14.3.1 System Model. | |
Titolo autorizzato: | Attribute-Based Encryption (ABE) |
ISBN: | 1-119-98936-1 |
1-119-98938-8 | |
1-119-98937-X | |
Formato: | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione: | Inglese |
Record Nr.: | 9910830912003321 |
Lo trovi qui: | Univ. Federico II |
Opac: | Controlla la disponibilità qui |