jedi: many-to-many end-to-end encryption and key delegation for … · 2019-08-19 · jedi:...

43
JEDI: Many-to-Many End-to-End Encryption and Key Delegation for IoT Sam Kumar, Yuncong Hu, Michael P Andersen, Raluca Ada Popa, David E. Culler University of California, Berkeley

Upload: others

Post on 10-Mar-2020

8 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: JEDI: Many-to-Many End-to-End Encryption and Key Delegation for … · 2019-08-19 · JEDI: Many-to-Many End-to-End Encryption and Key Delegation for IoT Sam Kumar, Yuncong Hu, Michael

JEDI: Many-to-Many End-to-End Encryption and Key Delegation for IoT

Sam Kumar, Yuncong Hu, Michael P Andersen, Raluca Ada Popa, David E. Culler

University of California, Berkeley

Page 2: JEDI: Many-to-Many End-to-End Encryption and Key Delegation for … · 2019-08-19 · JEDI: Many-to-Many End-to-End Encryption and Key Delegation for IoT Sam Kumar, Yuncong Hu, Michael

IoT Devices Collect Privacy-Sensitive Data

Occupancy Sensor

Video Doorbell Smart Speaker/Virtual Assistant

Lighting

Border Router Message Broker Device Gateway

Intermediaries

2

Page 3: JEDI: Many-to-Many End-to-End Encryption and Key Delegation for … · 2019-08-19 · JEDI: Many-to-Many End-to-End Encryption and Key Delegation for IoT Sam Kumar, Yuncong Hu, Michael

IoT Devices Collect Privacy-Sensitive Data

Occupancy Sensor

Video Doorbell Smart Speaker/Virtual Assistant

Lighting

Border Router Message Broker Device Gateway

Intermediaries

Want End-to-End Encryption (E2EE)

3

Page 4: JEDI: Many-to-Many End-to-End Encryption and Key Delegation for … · 2019-08-19 · JEDI: Many-to-Many End-to-End Encryption and Key Delegation for IoT Sam Kumar, Yuncong Hu, Michael

Existing E2EE is a Poor Fit for Large-Scale IoT

• Large-scale IoT systems use the publish/subscribe paradigm

4

Page 5: JEDI: Many-to-Many End-to-End Encryption and Key Delegation for … · 2019-08-19 · JEDI: Many-to-Many End-to-End Encryption and Key Delegation for IoT Sam Kumar, Yuncong Hu, Michael

IoT Systems use Publish/Subscribe

Pub/Sub Broker

Temperature Sensor

Cloud Services

Sub sodaHall/atrium/*

Bob

5

Page 6: JEDI: Many-to-Many End-to-End Encryption and Key Delegation for … · 2019-08-19 · JEDI: Many-to-Many End-to-End Encryption and Key Delegation for IoT Sam Kumar, Yuncong Hu, Michael

IoT Systems use Publish/Subscribe

Pub/Sub Broker

Lighting

Occupancy Sensor

Temperature Sensor

Heating, Ventilation, and Cooling Cloud Services

Pub sodaHall/room465F/occupancySub sodaHall/atrium/*

Sub sodaHall/atrium/hvac

Alice

Bob

6

Page 7: JEDI: Many-to-Many End-to-End Encryption and Key Delegation for … · 2019-08-19 · JEDI: Many-to-Many End-to-End Encryption and Key Delegation for IoT Sam Kumar, Yuncong Hu, Michael

IoT Systems use Publish/Subscribe

Pub/Sub Broker

Occupancy Sensor

Temperature Sensor

Pub sodaHall/room465F/occupancy

Alice

Lighting

Heating, Ventilation, and Cooling Cloud Services

Sub sodaHall/atrium/*

Sub sodaHall/atrium/hvac

Bob

Who is allowed to read which resources?

7

Page 8: JEDI: Many-to-Many End-to-End Encryption and Key Delegation for … · 2019-08-19 · JEDI: Many-to-Many End-to-End Encryption and Key Delegation for IoT Sam Kumar, Yuncong Hu, Michael

IoT Systems use Decentralized Delegation

• Decentralized delegation is an old idea (SPKI/SDSI [CECF01])

• It’s the state-of-the-art for access control in large-scale IoT systems (e.g., Vanadium [TS16], BOSSWAVE [AKCCK17])

Delegate Delegate

Access tosodaHall/*

Access tosodaHall/room410/*

until May 2021

Access tosodaHall/room410/lamp0/*

until January 2020

8

Page 9: JEDI: Many-to-Many End-to-End Encryption and Key Delegation for … · 2019-08-19 · JEDI: Many-to-Many End-to-End Encryption and Key Delegation for IoT Sam Kumar, Yuncong Hu, Michael

IoT Devices are Resource-Constrained

More Powerful Less Powerful

Server/Workstation/Laptop Smartphone Smart Home Appliance Wearable Ultra Low-Power Deeply Embedded Sensor

100,000 DMIPS10 GiB RAM

50 DMIPS32 KiB RAM

Power Constraints

9

Page 10: JEDI: Many-to-Many End-to-End Encryption and Key Delegation for … · 2019-08-19 · JEDI: Many-to-Many End-to-End Encryption and Key Delegation for IoT Sam Kumar, Yuncong Hu, Michael

JEDI: Joining Encryption and Delegation for IoT

10

Page 11: JEDI: Many-to-Many End-to-End Encryption and Key Delegation for … · 2019-08-19 · JEDI: Many-to-Many End-to-End Encryption and Key Delegation for IoT Sam Kumar, Yuncong Hu, Michael

Joining Encryption and Delegation for IoT

JEDI is an end-to-end encryption (E2EE) protocol that:

• Allows senders and receivers to be decoupled as in publish/subscribe

• Supports decentralized delegation

• Can run on resource-constrained IoT devices

11

Page 12: JEDI: Many-to-Many End-to-End Encryption and Key Delegation for … · 2019-08-19 · JEDI: Many-to-Many End-to-End Encryption and Key Delegation for IoT Sam Kumar, Yuncong Hu, Michael

Roadmap

1. Requirements of large-scale IoT systems

2. JEDI’s approacha) Encryption in the new model (pub/sub, delegation)

b) Finding a suitable, lightweight encryption scheme

c) Anonymous signatures

d) Revocation

3. Empirical study

12

Page 13: JEDI: Many-to-Many End-to-End Encryption and Key Delegation for … · 2019-08-19 · JEDI: Many-to-Many End-to-End Encryption and Key Delegation for IoT Sam Kumar, Yuncong Hu, Michael

Focus of this talk

Roadmap

1. Requirements of large-scale IoT systems

2. JEDI’s approacha) Encryption in the new model (pub/sub, delegation)

b) Finding a suitable, lightweight encryption scheme

c) Anonymous signatures

d) Revocation

3. Empirical study

13

Page 14: JEDI: Many-to-Many End-to-End Encryption and Key Delegation for … · 2019-08-19 · JEDI: Many-to-Many End-to-End Encryption and Key Delegation for IoT Sam Kumar, Yuncong Hu, Michael

Lighting

Occupancy Sensor

Heating, Ventilation, and Cooling

Pub sodaHall/room465F/occupancy

Sub sodaHall/atrium/hvac

Alice

Publish/Subscribe in JEDI

Pub/Sub Broker

Temperature Sensor

Cloud Services

Sub sodaHall/atrium/*

Bob

Data

sodaHall/atrium/temp

Problem: How to encrypt?

Central Idea: Encrypt each message according to the resource it is published to

14

Page 15: JEDI: Many-to-Many End-to-End Encryption and Key Delegation for … · 2019-08-19 · JEDI: Many-to-Many End-to-End Encryption and Key Delegation for IoT Sam Kumar, Yuncong Hu, Michael

Lighting

Occupancy Sensor

Heating, Ventilation, and Cooling

Pub sodaHall/room465F/occupancy

Sub sodaHall/atrium/hvac

Alice

Publish/Subscribe in JEDI

Pub/Sub Broker

Temperature Sensor

Cloud Services

Bob

Sub sodaHall/atrium/*Data

sodaHall/atrium/temp

15

Problem: How to encrypt?

Central Idea: Encrypt each message according to the resource it is published to

Page 16: JEDI: Many-to-Many End-to-End Encryption and Key Delegation for … · 2019-08-19 · JEDI: Many-to-Many End-to-End Encryption and Key Delegation for IoT Sam Kumar, Yuncong Hu, Michael

Lighting

Occupancy Sensor

Heating, Ventilation, and Cooling

Pub sodaHall/room465F/occupancy

Sub sodaHall/atrium/hvac

Alice

Publish/Subscribe in JEDI

Pub/Sub Broker

Temperature Sensor

Cloud Services

Bob

Sub sodaHall/atrium/*

Data

sodaHall/atrium/temp

Data

sodaHall/atrium/temp

16

Problem: How to encrypt?

Central Idea: Encrypt each message according to the resource it is published to

Page 17: JEDI: Many-to-Many End-to-End Encryption and Key Delegation for … · 2019-08-19 · JEDI: Many-to-Many End-to-End Encryption and Key Delegation for IoT Sam Kumar, Yuncong Hu, Michael

Lighting

Occupancy Sensor

Heating, Ventilation, and Cooling

Pub sodaHall/room465F/occupancy

Sub sodaHall/atrium/hvac

Alice

Publish/Subscribe in JEDI

Pub/Sub Broker

Temperature Sensor

Cloud Services

Sub sodaHall/atrium/*

Bob

Data

sodaHall/atrium/temp

Data

sodaHall/atrium/temp

17

Problem: How to encrypt?

Central Idea: Encrypt each message according to the resource it is published to

Page 18: JEDI: Many-to-Many End-to-End Encryption and Key Delegation for … · 2019-08-19 · JEDI: Many-to-Many End-to-End Encryption and Key Delegation for IoT Sam Kumar, Yuncong Hu, Michael

Publish/Subscribe in JEDI

Pub/Sub Broker

Lighting

Occupancy Sensor

Temperature Sensor

Heating, Ventilation, and Cooling Cloud Services

Pub sodaHall/room465F/occupancySub sodaHall/atrium/*

Sub sodaHall/atrium/hvac

Alice

Bob

18

Page 19: JEDI: Many-to-Many End-to-End Encryption and Key Delegation for … · 2019-08-19 · JEDI: Many-to-Many End-to-End Encryption and Key Delegation for IoT Sam Kumar, Yuncong Hu, Michael

Publish/Subscribe in JEDI

Pub/Sub Broker

Lighting

Occupancy Sensor

Temperature Sensor

Heating, Ventilation, and Cooling Cloud Services

Pub sodaHall/room465F/occupancySub sodaHall/atrium/*

Sub sodaHall/atrium/hvac

Person A

Person B

Q: How to control which principals have which decryption keys?

A: Decentralized delegation

19

Page 20: JEDI: Many-to-Many End-to-End Encryption and Key Delegation for … · 2019-08-19 · JEDI: Many-to-Many End-to-End Encryption and Key Delegation for IoT Sam Kumar, Yuncong Hu, Michael

Trust Domain

Decentralized Delegation [CECF01, AKCCK17]

(Root)

sodaHall

floor3 atriumtemperature

humidity

floor4lab_space

alice_officelighting

hvac

coryHall

floor2sensor0

room299lighting

hvac

floor4swarm_lab

room400 occupancy

Campus Facilities Manager Building Manager Lab Director

Alice

Building Manager can

read sodaHall/*

Building Manager can

read sodaHall/*

Lab Director can read sodaHall/

floor4/*

Building Manager can

read sodaHall/*

Lab Director can read sodaHall/

floor4/*

Alice can read sodaHall/floor4/

alice_office/*

20

Page 21: JEDI: Many-to-Many End-to-End Encryption and Key Delegation for … · 2019-08-19 · JEDI: Many-to-Many End-to-End Encryption and Key Delegation for IoT Sam Kumar, Yuncong Hu, Michael

Trust Domain

Decentralized Delegation in JEDI

(Root)

sodaHall

floor3 atriumtemperature

humidity

floor4lab_space

alice_officelighting

hvac

coryHall

floor2sensor0

room299lighting

hvac

floor4swarm_lab

room400 occupancy

Campus Facilities Manager Building Manager Lab Director

Alice

Key for * Key for sodaHall/* Key for sodaHall/floor4/*

Key for sodaHall/floor4/alice_office/*

21

Page 22: JEDI: Many-to-Many End-to-End Encryption and Key Delegation for … · 2019-08-19 · JEDI: Many-to-Many End-to-End Encryption and Key Delegation for IoT Sam Kumar, Yuncong Hu, Michael

Instantiating JEDI UsingAttribute-Based Encryption (ABE [GPSW06])Set aside efficiency for the moment

22

Page 23: JEDI: Many-to-Many End-to-End Encryption and Key Delegation for … · 2019-08-19 · JEDI: Many-to-Many End-to-End Encryption and Key Delegation for IoT Sam Kumar, Yuncong Hu, Michael

Pub/Sub Broker

Lighting

Occupancy Sensor

Temperature Sensor

Heating, Ventilation, and Cooling Cloud Services

Pub sodaHall/room465F/occupancy

Sub sodaHall/atrium/hvac

Person A

Person B

Preliminary JEDI Design Using ABE

Sub sodaHall/atrium/*

Encrypt message using ABE with the three attributes

“1-sodaHall, 2-atrium, 3-temp”

23

Page 24: JEDI: Many-to-Many End-to-End Encryption and Key Delegation for … · 2019-08-19 · JEDI: Many-to-Many End-to-End Encryption and Key Delegation for IoT Sam Kumar, Yuncong Hu, Michael

Trust Domain

(Root)

sodaHall

floor3 atriumtemperature

humidity

floor4lab_space

alice_officelighting

hvac

coryHall

floor2sensor0

room299lighting

hvac

floor4swarm_lab

room400 occupancy

Campus Facilities Manager Building Manager Lab Director

Alice

Key for *

Key for sodaHall/floor4/alice_office/*

Preliminary JEDI Design Using ABE

Key for sodaHall/* Key for sodaHall/floor4/*

ABE key for the policy“1-sodaHall AND 2-floor4”

ABE key for the policy “1-sodaHall”

24

Generate

Page 25: JEDI: Many-to-Many End-to-End Encryption and Key Delegation for … · 2019-08-19 · JEDI: Many-to-Many End-to-End Encryption and Key Delegation for IoT Sam Kumar, Yuncong Hu, Michael

Expiry

25

Page 26: JEDI: Many-to-Many End-to-End Encryption and Key Delegation for … · 2019-08-19 · JEDI: Many-to-Many End-to-End Encryption and Key Delegation for IoT Sam Kumar, Yuncong Hu, Michael

Pub/Sub Broker

Lighting

Occupancy Sensor

Temperature Sensor

Heating, Ventilation, and Cooling Cloud Services

Pub sodaHall/room465F/occupancy

Sub sodaHall/atrium/hvac

Person A

Person B

Encrypt Using Current Time

Sub sodaHall/atrium/*

Encrypt message using ABE with the six attributes

“1-sodaHall, 2-atrium, 3-temp, year-2019, month-Aug, day-16”

26

Page 27: JEDI: Many-to-Many End-to-End Encryption and Key Delegation for … · 2019-08-19 · JEDI: Many-to-Many End-to-End Encryption and Key Delegation for IoT Sam Kumar, Yuncong Hu, Michael

Hour Day Month Year

(Root)

2018………

2019

Jan

01…

02…

…...

………

2020

Jan

01…

02…

……

Feb

01…

02…

03…

……

………

Time is Another Hierarchy

Expires Feb 02, 2020

Consists of 4 ABE keys:

Policy: “year-2019”

Policy: “year-2020 AND month-Jan”

Policy: “year-2020 AND month-Feb AND day-01”

Policy: “year-2020 AND month-Feb AND day-02”

start

end

27

Page 28: JEDI: Many-to-Many End-to-End Encryption and Key Delegation for … · 2019-08-19 · JEDI: Many-to-Many End-to-End Encryption and Key Delegation for IoT Sam Kumar, Yuncong Hu, Michael

Support for Resource-Constrained Devices

28

Page 29: JEDI: Many-to-Many End-to-End Encryption and Key Delegation for … · 2019-08-19 · JEDI: Many-to-Many End-to-End Encryption and Key Delegation for IoT Sam Kumar, Yuncong Hu, Michael

Hamilton Platform [KACKZMC18]

• Based on the Atmel SAMR21 SoC• 32-bit ARM Cortex M0+ @ 48 MHz

• 32 KiB Data Memory (RAM)

• Goal: several years of battery life• $1.00 CR123A Lithium battery

29

Page 30: JEDI: Many-to-Many End-to-End Encryption and Key Delegation for … · 2019-08-19 · JEDI: Many-to-Many End-to-End Encryption and Key Delegation for IoT Sam Kumar, Yuncong Hu, Michael

Energy Cost of ABE

• Due to hybrid encryption, we invoke ABE rarely (e.g., once per hour)

• Regardless, ABE dominates power consumption

• ABE takes 4 minutes on Hamilton → battery won’t even last 100 days

30

Page 31: JEDI: Many-to-Many End-to-End Encryption and Key Delegation for … · 2019-08-19 · JEDI: Many-to-Many End-to-End Encryption and Key Delegation for IoT Sam Kumar, Yuncong Hu, Michael

Choosing a More Efficient Encryption Scheme

IBE [BF01]

HIBE [GS02, BBG05]

KP-ABE [GPSW06]

CP-ABE [BSW07]Fuzzy-IBE [SW04]WIBE [ACDMNS06]

WKD-IBE [AKN07]

RSA

El Gamal

IPE [KSW08]

HVE [BW07]

IB-PRE [GA07]

PRE [BBS98, AFGH05]

FHE [Gentry09]

RIBE [BGK08]

RHIBE [SE14]

Multi-Authority ABE [LW11]

DP-ABE [AI09]

BE [FN94, BGW05]

MRQED [SBCSP07]

RegevHABE [WLWG11]

IDTHD [BY04] PKE-IP [ABCP15]

HPE [LOSTW10]AHIBE [BW06]

AIBE [Gentry06]

IBBE [SF07, Delerablée07, GW09]

HIBBE [LLWQ14]

RR-IBBE [SCGYMC16]

RHIBBE [LLZWL18]

ke-PKE [CHK03]

We identify WKD-IBE:•More efficient than ABE, but much less flexible• Flexible enough to realize JEDI, if used carefully

31

Page 32: JEDI: Many-to-Many End-to-End Encryption and Key Delegation for … · 2019-08-19 · JEDI: Many-to-Many End-to-End Encryption and Key Delegation for IoT Sam Kumar, Yuncong Hu, Michael

Summary of WKD-IBE [AKN07]

• Each ciphertext or key encodes a vector of strings and wildcards

foo bar baz * qux quux * quuz corge

• A key can decrypt a ciphertext if their vectors match

• Given a key, one can generate a new key with some wildcards replaced with strings

32

Page 33: JEDI: Many-to-Many End-to-End Encryption and Key Delegation for … · 2019-08-19 · JEDI: Many-to-Many End-to-End Encryption and Key Delegation for IoT Sam Kumar, Yuncong Hu, Michael

Summary of WKD-IBE [AKN07]

• Each ciphertext or key encodes a vector of strings and wildcards

foo bar baz * qux quux * quuz corge

foo bar baz grault qux quux * quuz corge

• A key can decrypt a ciphertext if their vectors match

• Given a key, one can generate a new key with some wildcards replaced with strings

Ge

ne

rate

Rep

lace

d

33

Page 34: JEDI: Many-to-Many End-to-End Encryption and Key Delegation for … · 2019-08-19 · JEDI: Many-to-Many End-to-End Encryption and Key Delegation for IoT Sam Kumar, Yuncong Hu, Michael

How JEDI Uses WKD-IBE

• JEDI encodes multiple concurrent hierarchies into WKD-IBE’s vector

• Private key for sodaHall/room410/*, valid for August 2019:

sodaHall room410 * * * 2019 Aug * *

First ℓ1 components for Resource Hierarchy Last ℓ2 components for Time Hierarchy

• For decentralized delegation, we can generate a private key for sodaHall/room410/light0/*, valid for August 16, 2019

34

Page 35: JEDI: Many-to-Many End-to-End Encryption and Key Delegation for … · 2019-08-19 · JEDI: Many-to-Many End-to-End Encryption and Key Delegation for IoT Sam Kumar, Yuncong Hu, Michael

How JEDI Uses WKD-IBE

• JEDI encodes multiple concurrent hierarchies into WKD-IBE’s vector

• Private key for sodaHall/room410/*, valid for August 2019:

sodaHall room410 * * * 2019 Aug * *

sodaHall room410 light0 * * 2019 Aug 16 *

Ge

ne

rate

• For decentralized delegation, we can generate a private key for sodaHall/room410/light0/*, valid for August 16, 2019

35

Page 36: JEDI: Many-to-Many End-to-End Encryption and Key Delegation for … · 2019-08-19 · JEDI: Many-to-Many End-to-End Encryption and Key Delegation for IoT Sam Kumar, Yuncong Hu, Michael

WK

D-IB

E En

cryptio

n

Delta

Encryp

tion

Cryptographic Improvements to WKD-IBE

Message

Attribute Vector

Ciphertext

State

Ciphertext

Message

Previous State

Changed Attributes

Existing WKD-IBE Encryption Algorithm [AKN07]

JEDI’s New WKD-IBE Encryption Algorithm

Idea: encrypt according to the delta from the previous attributes

Observation: adjacent encryptions in JEDI differ in only a few attributes

36

Page 37: JEDI: Many-to-Many End-to-End Encryption and Key Delegation for … · 2019-08-19 · JEDI: Many-to-Many End-to-End Encryption and Key Delegation for IoT Sam Kumar, Yuncong Hu, Michael

Focus of this talk

Roadmap

1. Requirements of large-scale IoT systems

2. JEDI’s approacha) Encryption in the new model (pub/sub, delegation)

b) Finding a suitable, lightweight encryption scheme

c) Anonymous signatures

d) Revocation

3. Empirical study

See paper for details

39

Page 38: JEDI: Many-to-Many End-to-End Encryption and Key Delegation for … · 2019-08-19 · JEDI: Many-to-Many End-to-End Encryption and Key Delegation for IoT Sam Kumar, Yuncong Hu, Michael

Roadmap

1. Requirements of large-scale IoT systems

2. JEDI’s approacha) Encryption in the new model (pub/sub, delegation)

b) Finding a suitable, lightweight encryption scheme

c) Anonymous signatures

d) Revocation

3. Empirical study

40

Page 39: JEDI: Many-to-Many End-to-End Encryption and Key Delegation for … · 2019-08-19 · JEDI: Many-to-Many End-to-End Encryption and Key Delegation for IoT Sam Kumar, Yuncong Hu, Michael

Implementation

Two parts of JEDI’s implementation:

1. JEDI Cryptography Library (https://github.com/ucbrise/jedi-pairing)• Includes assembly optimizations for ARM Cortex-M0+ (also x86-64, ARMv8)

• 4-5x performance improvement over pure C/C++ on Hamilton

2. JEDI Protocol Prototype (https://github.com/ucbrise/jedi-protocol)• Implemented for bw2 [AKCFCP17], a messaging system for smart cities

41

Page 40: JEDI: Many-to-Many End-to-End Encryption and Key Delegation for … · 2019-08-19 · JEDI: Many-to-Many End-to-End Encryption and Key Delegation for IoT Sam Kumar, Yuncong Hu, Michael

JEDI Applied to bw2 (Running on a Laptop)

• Most of JEDI’s overhead comes from the symmetric-key crypto library (NaCl secretbox)

• JEDI’s overhead is ≈ 10 ms for small messages

0

10

20

30

40

50

60

70

1 KiB 32 KiB 1 MiB

Tim

e to

Pu

blis

h (

ms)

Message Size

No E2EE NaCl + Padding WKD-IBE

Running on a Laptop

42

Page 41: JEDI: Many-to-Many End-to-End Encryption and Key Delegation for … · 2019-08-19 · JEDI: Many-to-Many End-to-End Encryption and Key Delegation for IoT Sam Kumar, Yuncong Hu, Michael

Estimated Battery Life on a Hamilton Sensor

0

1

2

3

4

5

6

Bat

tery

Lif

e (Y

ears

)

Sampling Data at 0.1 Hz

AES Only JEDI ABE (estimated) • Each encryption with JEDI is 37x more efficient than naïvely applying ABE

• JEDI’s battery life, when sampling once every 10 s, is:• 14x better than using ABE

• within 2x of using AES only

• several years long

Running on a Hamilton Sensor

43

Page 42: JEDI: Many-to-Many End-to-End Encryption and Key Delegation for … · 2019-08-19 · JEDI: Many-to-Many End-to-End Encryption and Key Delegation for IoT Sam Kumar, Yuncong Hu, Michael

We are Deploying JEDI in the Real World!

44

Page 43: JEDI: Many-to-Many End-to-End Encryption and Key Delegation for … · 2019-08-19 · JEDI: Many-to-Many End-to-End Encryption and Key Delegation for IoT Sam Kumar, Yuncong Hu, Michael

Conclusion

JEDI is an end-to-end encryption protocol for large-scale IoT systems. It:

• Allows senders and receivers to be decoupled as in publish/subscribe

• Supports decentralized delegation with expiry

• Can run on devices across the spectrum of resource constraints

45

This material is based on work supported by the National Science Foundation Graduate Research Fellowship Program under Grant No. DGE-1752814. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the National Science Foundation.

https://github.com/ucbrise/jedi-pairinghttps://github.com/ucbrise/jedi-protocol-go

Extended paper: https://arxiv.org/abs/1905.13369