DevoxxFR 2024 Reproducible Builds with Apache Maven
Implementasi Keamanan User Privacy menggunakan CP-ABE
1. Studi & Implementasi
Keamanan User Privacy
menggunakan CP-ABE
Samsul Huda, Amang Sudarsono and Tri Harsono
Politeknik Elektronika Negeri Surabaya
2. Profil
Name : Samsul Huda
Institution : Politeknik Elektronika Negeri Surabaya
Achievements :
• Potential Paper on National Cryptography
Competition in Sekolah Tinggi Sandi Negara
(2014)
• Samsul huda, amang sudarsono and mike
yuliana, “Implementasi sistem pengamanan e-
commerce,” in Indonesia Security Conference
2014 (IDSECCONF2014), 2014.
• Sritrusta sukaridhoto, yahya adi setiawan, edi
wahyu widodo, samsul huda and nurul fahmi,
“Development of MiniPhooBot for small medium
business,” in Knowledge Creation and Intelligent
Computing 2015 (KCIC2015), 2015, pp. 84-89.
4. Background and Problems
Low Cost Long
Distance
Fast
Enough
unsecure
from
interception.
Cryptography • User----------- one to one
• Strength on complexity of algorithm
and confidentiality of key
5. Ciphertext-Policy
Attribute-Based Encryption (CP-ABE)
CP-ABE was designed by Bethencourt, Waters, and Sahai as a means
of allowing expressive and controlled access to encrypted files by
defining a user’s key as a set of attributes, and authorizing decryption
if these attributes satisfy an access tree.
Private key assigned to Attributes
Chipertext assosiated with access policy
Can decrypt only when attributes satisfy policy
9. Specification of H/W
Specifiction Remarks
Software GCC-4.7, gmp-5.1.1, pbc-lib-0.5.14,
glib2.34, openssl-1.0.1c
O/S Debian Linux kernel-3.5.0-17
CPU Intel core i3-370M 2.4 GHz
RAM 4GB DDR3
WiFi Acer InviLink™ Nplify™ 802.11b/g/n
10. Results
Pre-processing phase
Processing phase
Process Time (ms)
Setup 32.34
KeyGen 26.02
Process
Time
(ms)
Sender Encryption 80.04
Medium Transmission 99.64
Receiver Decryption 100.12
Total time process 279,8
(point out that attributes of secret key are mathematically incorporated into the key itself)
(after file is encrypted, say we put it on the server)
(explain that now, the policy checking happens “inside the crypto”. that is, nobody explicitly evaluates the policies and makes an access decision. instead, if the policy is satisfied, decryption will just work, otherwise it won’t.)