Filters








5 Hits in 3.5 sec

IBBE-SGX: Cryptographic Group Access Control Using Trusted Execution Environments

Stefan Contiu, Rafael Pires, Sebastien Vaucher, Marcelo Pasin, Pascal Felber, Laurent Reveillere
2018 2018 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)  
In this paper, we introduce IBBE-SGX, a new cryptographic access control extension that is efficient both in terms of computation and storage even when processing large and dynamic workloads of membership  ...  A major challenge for enabling such collaboration is the need to enforce cryptographic access control policies in a secure and efficient manner.  ...  Zero knowledge is guaranteed by executing the cryptographic access control membership operations in a Trusted Execution Environment (TEE). 1 Our scheme is based on IBBE which is known to be flexible  ... 
doi:10.1109/dsn.2018.00032 dblp:conf/dsn/ContiuPVPFR18 fatcat:ywsnpytiazdrpbtzwd3adwqxne

Anonymous and confidential file sharing over untrusted clouds [article]

Stefan Contiu, Sébastien Vaucher, Rafael Pires, Marcelo Pasin, Pascal Felber, Laurent Réveillère
2019 arXiv   pre-print
A-SKY leverages trusted execution environments (TEEs) to address the impracticality of anonymous broadcast encryption (ANOBE) schemes, achieving faster execution times and shorter ciphertexts.  ...  Using public cloud services for storing and sharing confidential data requires end users to cryptographically protect both the data and the access to the data.  ...  IBBE-SGX [6] demonstrates that the approach can be implemented within dynamic conditions when leveraging trusted execution environments (TEEs).  ... 
arXiv:1907.06466v1 fatcat:cr5afvm3inboxcyodlaqfnzpzy

Quick Boot of Trusted Execution Environment with Hardware Accelerators

Trong-Thuc Hoang, Ckristian Duran, Duc-Thinh Nguyen-Hoang, Duc-Hung Le, Akira Tsukamoto, Kuniyasu Suzaki, Cong-Kha Pham
2020 IEEE Access  
The Trusted Execution Environment (TEE) offers a software platform for secure applications. The TEE offers a memory isolation scheme and software authentication from a high privilege mode.  ...  Although the TEE hardware has been defined for memory isolation, the security algorithms often are executed using software implementations.  ...  IBBE-SGX construct an encryption scheme for group access control over the cloud secured by TEEs [11] .  ... 
doi:10.1109/access.2020.2987617 fatcat:suwt3w22j5dfbifiau7fs5bdfy

Distributed systems and trusted execution environments: Trade-offs and challenges

Rafael Pereira Pires, Pascal Felber, Marcelo Pasin
2020 Anais Estendidos do Simpósio Brasileiro de Redes de Computadores e Sistemas Distribuídos (SBRC Estendido 2020)   unpublished
This extended abstract summarises my PhD thesis, which explores design strategies for distributed systems that leverage trusted execution environments (TEEs).  ...  We first present IBBE-SGX, a new cryptographic access control extension for collaborative editing of shared data.  ...  Operation IBBE IBBE-SGX IBBE-SGX with partitioning System setup O(N) O(N) O(n) Extract user key O(1) O(1) O(1) Create group key O(N 2 ) O(N) O(mn) Add user to group O(1) O(1) Remove user  ... 
doi:10.5753/sbrc_estendido.2020.12412 fatcat:abalgaycwzgavp7y56dfregelm

Secure content distribution from Insecure cloud computing systems [article]

Ευάγγελος Δημουλής, University Of Ioannina
2021
In IBBE-SGX the system interacts with standard users and administrators. Users form groups and group data is encrypted through AES using a symmetric group key (gk).  ...  IBBE-SGX manages keys inside SGX enclaves and establishes trust with the TEE leveraging Intel SGX attestation services.  ...  Access Control List Revocation The ACL is initially populated with the owner's public key.  ... 
doi:10.26268/heal.uoi.11251 fatcat:ady3jv7ulje6lcf4on3itiy3yy