ACKNOWLEDGMENTS
This work has been funded by the Fraunhofer Clus-
ter of Excellence ”Cognitive Internet Technologies”
http://www.cit.fraunhofer.de
REFERENCES
Agrawal, S. and Chase, M. (2017). Fame: Fast attribute-
based message encryption. In Proceedings of the 2017
ACM SIGSAC Conference on Computer and Commu-
nications Security, pages 665–682. ACM.
Aumasson, J.-P., Neves, S., Wilcox-O‘Hearn, Z., and Win-
nerlein, C. (2013). Blake2: simpler, smaller, fast as
md5. In International Conference on Applied Crypto-
graphy and Network Security, pages 119–135. Sprin-
ger.
Ben-Sasson, E., Chiesa, A., Tromer, E., and Virza, M.
(2014). Succinct non-interactive zero knowledge for a
von neumann architecture. In USENIX Security Sym-
posium, pages 781–796.
Bethencourt, J., Sahai, A., and Waters, B. (2007).
Ciphertext-policy attribute-based encryption. In Secu-
rity and Privacy, 2007. SP’07. IEEE Symposium on,
pages 321–334. IEEE.
Boneh, D. and Franklin, M. (2001). Identity-based encryp-
tion from the weil pairing. In Annual international
cryptology conference, pages 213–229. Springer.
Chase, M. (2007). Multi-authority attribute based encryp-
tion. In Theory of Cryptography Conference, pages
515–534. Springer.
Chatterjee, S. and Menezes, A. (2011). On crypto-
graphic protocols employing asymmetric pairings-the
role of ψ revisited. Discrete Applied Mathematics,
159(13):1311–1322.
Galbraith, S. D., Paterson, K. G., and Smart, N. P. (2008).
Pairings for cryptographers. Discrete Applied Mathe-
matics, 156(16):3113–3121.
Goyal, V., Pandey, O., Sahai, A., and Waters, B. (2006).
Attribute-based encryption for fine-grained access
control of encrypted data. In Proceedings of the 13th
ACM conference on Computer and communications
security, pages 89–98. Acm.
Greenspan, G. (2015). Multichain private block-
chain, white paper. URl: http://www. multichain.
com/download/MultiChain-White-Paper. pdf.
Jahid, S., Mittal, P., and Borisov, N. (2011). Easier:
Encryption-based access control in social networks
with efficient revocation. In Proceedings of the
6th ACM Symposium on Information, Computer and
Communications Security, pages 411–415. ACM.
Jemel, M. and Serhrouchni, A. (2017). Decentralized access
control mechanism with temporal dimension based on
blockchain. In 2017 IEEE 14th International Con-
ference on e-Business Engineering (ICEBE), pages
177–182. IEEE.
Lewko, A. and Waters, B. (2011). Decentralizing attribute-
based encryption. In Annual international confe-
rence on the theory and applications of cryptographic
techniques, pages 568–588. Springer.
Lin, G., Hong, H., and Sun, Z. (2017). A collaborative key
management protocol in ciphertext policy attribute-
based encryption for cloud data sharing. IEEE Access,
5:9464–9475.
M
¨
uller, S., Katzenbeisser, S., and Eckert, C. (2008). Dis-
tributed attribute-based encryption. In International
Conference on Information Security and Cryptology,
pages 20–36. Springer.
Ouaddah, A., Abou Elkalam, A., and Ait Ouahman, A.
(2016). Fairaccess: a new blockchain-based access
control framework for the internet of things. Security
and Communication Networks, 9(18):5943–5964.
Ruj, S., Nayak, A., and Stojmenovic, I. (2011). Dacc:
Distributed access control in clouds. In Trust, Se-
curity and Privacy in Computing and Communicati-
ons (TrustCom), 2011 IEEE 10th International Con-
ference on, pages 91–98. IEEE.
Sarhan, A. Y. and Carr, S. (2017). A highly-secure self-
protection data scheme in clouds using active data
bundles and agent-based secure multi-party compu-
tation. In Cyber Security and Cloud Computing
(CSCloud), 2017 IEEE 4th International Conference
on, pages 228–236. IEEE.
Yang, K. and Jia, X. (2014). Dac-macs: Effective data
access control for multi-authority cloud storage sys-
tems. In Security for Cloud Storage Systems, pages
59–83. Springer.
APPENDIX
Decryption of an BDABE Ciphertext
In order to see that the decryption is cor-
rect, let ε( j) =
∑
A∈S
j
H(A) · r
AU
· H(a), then
E
j,I
= M · e(g
1
, g
2
)
y·r
j
·ε( j)
, E
j,IV
= g
1
r
j
·ε( j)
,
E
j,V
= g
2
r
j
·ε( j)
and thus:
BDABE - Blockchain-based Distributed Attribute based Encryption
109