![Page 1: Studi dan Implementasi Keamanan User Privacy menggunakan CP-ABE](https://reader036.vdokumen.com/reader036/viewer/2022083110/58f2098f1a28abc80b8b4585/html5/thumbnails/1.jpg)
Studi & Implementasi Keamanan User Privacy menggunakan CP-ABESamsul Huda, Amang Sudarsono and Tri Harsono
Politeknik Elektronika Negeri Surabaya
![Page 2: Studi dan Implementasi Keamanan User Privacy menggunakan CP-ABE](https://reader036.vdokumen.com/reader036/viewer/2022083110/58f2098f1a28abc80b8b4585/html5/thumbnails/2.jpg)
Profil
Name : Samsul HudaInstitution : Politeknik Elektronika Negeri Surabaya
Achievements :• Potential Paper on National Cryptography
Competition in Sekolah Tinggi Sandi Negara (2014)
• Samsul huda, amang sudarsono and mike yuliana, “Implementasi sistem pengamanan e-commerce,” in Indonesia Security Conference 2014 (IDSECCONF2014), 2014.
• Sritrusta sukaridhoto, yahya adi setiawan, edi wahyu widodo, samsul huda and nurul fahmi, “Development of MiniPhooBot for small medium business,” in Knowledge Creation and Intelligent Computing 2015 (KCIC2015), 2015, pp. 84-89.
![Page 3: Studi dan Implementasi Keamanan User Privacy menggunakan CP-ABE](https://reader036.vdokumen.com/reader036/viewer/2022083110/58f2098f1a28abc80b8b4585/html5/thumbnails/3.jpg)
Road map
Background and Problems
Overview CP-ABE
System Overview
Implementation
Conclusion
![Page 4: Studi dan Implementasi Keamanan User Privacy menggunakan CP-ABE](https://reader036.vdokumen.com/reader036/viewer/2022083110/58f2098f1a28abc80b8b4585/html5/thumbnails/4.jpg)
Background and Problems
Low Cost Long Distance
Fast Enough
unsecure from
interception.Cryptography • User----------- one to one
• Strength on complexity of algorithm and confidentiality of key
![Page 5: Studi dan Implementasi Keamanan User Privacy menggunakan CP-ABE](https://reader036.vdokumen.com/reader036/viewer/2022083110/58f2098f1a28abc80b8b4585/html5/thumbnails/5.jpg)
Ciphertext-Policy Attribute-Based Encryption (CP-ABE)
CP-ABE was designed by Bethencourt, Waters, and Sahai as a means of allowing expressive and controlled access to encrypted files by defining a user’s key as a set of attributes, and authorizing decryption if these attributes satisfy an access tree.
Private key assigned to Attributes Chipertext assosiated with access policy Can decrypt only when attributes satisfy policy
![Page 6: Studi dan Implementasi Keamanan User Privacy menggunakan CP-ABE](https://reader036.vdokumen.com/reader036/viewer/2022083110/58f2098f1a28abc80b8b4585/html5/thumbnails/6.jpg)
Overview CP-ABE
Setup
Decrypt
Keygen Encrypt
Delegate
![Page 7: Studi dan Implementasi Keamanan User Privacy menggunakan CP-ABE](https://reader036.vdokumen.com/reader036/viewer/2022083110/58f2098f1a28abc80b8b4585/html5/thumbnails/7.jpg)
PKMSK
SKSamsul :“manager”“IT dept.”
SKHuda :“manager”“sales”
OR
IT dept. AND
manager marketing
Illustration
![Page 8: Studi dan Implementasi Keamanan User Privacy menggunakan CP-ABE](https://reader036.vdokumen.com/reader036/viewer/2022083110/58f2098f1a28abc80b8b4585/html5/thumbnails/8.jpg)
OR
ANDIT Dept
Manager Marketing
Message
Enc
Access Policy
Message
DecCiphertext PK
SK
PK
![Page 9: Studi dan Implementasi Keamanan User Privacy menggunakan CP-ABE](https://reader036.vdokumen.com/reader036/viewer/2022083110/58f2098f1a28abc80b8b4585/html5/thumbnails/9.jpg)
Specification of H/W
Specifiction RemarksSoftware GCC-4.7, gmp-5.1.1, pbc-lib-0.5.14,
glib2.34, openssl-1.0.1c
O/S Debian Linux kernel-3.5.0-17
CPU Intel core i3-370M 2.4 GHz
RAM 4GB DDR3
WiFi Acer InviLink™ Nplify™ 802.11b/g/n
![Page 10: Studi dan Implementasi Keamanan User Privacy menggunakan CP-ABE](https://reader036.vdokumen.com/reader036/viewer/2022083110/58f2098f1a28abc80b8b4585/html5/thumbnails/10.jpg)
Results
Pre-processing phase
Processing phase
Process Time (ms)Setup 32.34KeyGen 26.02
Process
Time(ms)
Sender Encryption 80.04Medium Transmission 99.64Receiver Decryption 100.12
Total time process 279,8