Multiauthority KP-ABE access model with elliptic curve cryptography

dc.contributor.authorFerrer-Rojas, Agustin
dc.contributor.authorMaharaj, Bodhaswar Tikanath Jugpershad
dc.date.accessioned2026-01-15T12:47:46Z
dc.date.available2026-01-15T12:47:46Z
dc.date.issued2025-06
dc.description.abstractThe rapid and expansive integration of Internet of Things (IoT) environments across various industrial sectors has led to an unprecedented surge in data generation and management. This exponential growth in data underscores the critical necessity for robust data security methodologies that can effectively safeguard the confidentiality and integrity of information without imposing undue computational burdens. In response to this challenge, numerous studies have sought to leverage Attribute-Based Encryption (ABE) as a means to enable fine-grained access control. Among the ABE variants, Ciphertext Policy ABE (CP-ABE) and bilinear pairings have emerged as popular choices to construct security schemes that strike a balance between robust protection and computational efficiency. Despite the advancements achieved through CP-ABE and bilinear pairings, a prevalent concern arises in the utilization of Linear Secret Sharing Scheme (LSSS) access policies. LSSS policies, while providing a flexible and expressive way to define access controls, can significantly impact the execution time of encryption methods. This study recognizes the importance of addressing this challenge and explores the potential of employing a Key Policy Attribute-Based Encryption (KP-ABE) approach. The primary objective is to mitigate the computational overhead associated with encryption methods, thereby enhancing the efficiency of data security measures within IoT environments. Furthermore, this research delves into the incorporation of Elliptic Curve Cryptography (ECC) to generate cryptographic keys. ECC, known for its strong security properties and computational efficiency, is considered a promising approach to bolster data security while concurrently minimizing computational overhead. By integrating KP-ABE with ECC, this study aims to offer a comprehensive solution that ensures robust security measures within the intricate landscape of IoT environments. Through detailed analysis and empirical investigation, the research endeavors to contribute valuable insights to the ongoing discourse on securing IoT data in a manner that aligns with the dual imperatives of security and computational efficiency.
dc.description.departmentElectrical, Electronic and Computer Engineering
dc.description.librarianam2025
dc.description.sdgSDG-13: Climate action
dc.description.urihttps://www.saiee.org.za/
dc.identifier.citationFerrer-Rojas, A. &Maharaj, B.T.J. 2025, 'Multiauthority KP-ABE access model with elliptic curve cryptography', SAIEE Africa Research Journal, vol. 116, no. 2, pp. 59-67, doi : 10.23919/SAIEE.2025.10852573.
dc.identifier.issn1991-1696 (print)
dc.identifier.issn0038-2221 (online)
dc.identifier.other10.23919/SAIEE.2025.10852573
dc.identifier.urihttp://hdl.handle.net/2263/107350
dc.language.isoen
dc.publisherSouth African Institute of Electrical Engineers
dc.rights© 2025. South African Institute of Electrical Engineers. Licensed under a Creative Commons Attribution–No Derivatives 4.0 International License.
dc.subjectAttribute-based encryption (ABE)
dc.subjectElliptic curve cryptography (ECC)
dc.subjectInternet of Things (IoT)
dc.subjectLSSS access policiy
dc.subjectMultiauthority
dc.subjectCiphertext policy ABE (CP-ABE)
dc.subjectLinear secret sharing scheme (LSSS)
dc.titleMultiauthority KP-ABE access model with elliptic curve cryptography
dc.typeArticle

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Ferrer_Multiauthority_2025.pdf
Size:
575.78 KB
Format:
Adobe Portable Document Format
Description:
Article

License bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
1.71 KB
Format:
Item-specific license agreed upon to submission
Description: