Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
Exploiting virtual synchrony in distributed systems
SOSP '87 Proceedings of the eleventh ACM Symposium on Operating systems principles
Identity-Based Encryption from the Weil Pairing
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
The many faces of publish/subscribe
ACM Computing Surveys (CSUR)
RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification
RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification
Attributed Based Access Control (ABAC) for Web Services
ICWS '05 Proceedings of the IEEE International Conference on Web Services
SECURECOMM '05 Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks
Distributed Event-Based Systems
Distributed Event-Based Systems
Attribute-based encryption for fine-grained access control of encrypted data
Proceedings of the 13th ACM conference on Computer and communications security
Ciphertext-Policy Attribute-Based Encryption
SP '07 Proceedings of the 2007 IEEE Symposium on Security and Privacy
Attribute-based encryption with non-monotonic access structures
Proceedings of the 14th ACM conference on Computer and communications security
RFID in the supply chain: panacea or Pandora's box?
Communications of the ACM
RFID-based supply chain partner authentication and key agreement
Proceedings of the second ACM conference on Wireless network security
On the practical importance of communication complexity for secure multi-party computation protocols
Proceedings of the 2009 ACM symposium on Applied Computing
Industrial Privacy in RFID-based Batch Recalls
EDOCW '08 Proceedings of the 2008 12th Enterprise Distributed Object Computing Conference Workshops
Privacy-preserving computation of benchmarks on item-level data using RFID
Proceedings of the third ACM conference on Wireless network security
Attribute based data sharing with attribute revocation
ASIACCS '10 Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security
Access control using pairing based cryptography
CT-RSA'03 Proceedings of the 2003 RSA conference on The cryptographers' track
An access control model for mobile physical objects
Proceedings of the 15th ACM symposium on Access control models and technologies
Providing basic security mechanisms in broker-less publish/subscribe systems
Proceedings of the Fourth ACM International Conference on Distributed Event-Based Systems
Privacy-preserving pattern matching for anomaly detection in RFID anti-counterfeiting
RFIDSec'10 Proceedings of the 6th international conference on Radio frequency identification: security and privacy issues
Fuzzy identity-based encryption
EUROCRYPT'05 Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques
Proceedings of the 2013 International Workshop on Joining AcadeMiA and Industry Contributions to testing Automation
Hi-index | 0.00 |
More and more companies are collecting data about each item of their supply chain using RFID tags in order to increase visibility across the supply chain and improve its performance. The data generated by reading an RFID tag is (also) called an event. These events are frequently distributed using event-based networks following the publish-subscribe pattern. This method of dissemination immediately raises security concerns, since supply chain operations' data is considered sensitive by companies. Attribute-based encryption has proven successful in enforcing access control in publish-subscribe networks. Nevertheless, existing schemes do not support access control for RFID events. In this paper we present an encryption scheme that enables disseminating events that can only be decrypted by a selected set of parties that have been in possession of the RFID tag. Our scheme enables broadcasting event messages of constant ciphertext size to an entire network while enforcing access control policies via encryption. We prove our scheme secure under the Modified Bilinear Decisional Diffie-Hellman Assumption.