Next Article in Journal
Geometric Graph Learning Network for Node Classification
Next Article in Special Issue
Lightweight Heterogeneous Graph-Inspired Neural Networks for Real-Time Botnet Detection
Previous Article in Journal
TrafSched: Integrating Bayesian Adaptation with LLMs for Traffic Scheduling Optimization
Previous Article in Special Issue
Privacy-Preserving Protocols in Smart Cities and Industrial IoT: Challenges, Trends, and Future Directions
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Comparative Analysis of Attribute-Based Encryption Schemes for Special Internet of Things Applications

Faculty of Cybernetics, Military University of Technology, 00-908 Warsaw, Poland
*
Author to whom correspondence should be addressed.
Electronics 2026, 15(3), 697; https://doi.org/10.3390/electronics15030697
Submission received: 26 November 2025 / Revised: 18 January 2026 / Accepted: 4 February 2026 / Published: 5 February 2026
(This article belongs to the Special Issue Computer Networking Security and Privacy)

Abstract

Attribute-based encryption (ABE) is an advanced public key encryption mechanism that enables the precise control of access to encrypted data based on attributes assigned to users and data. Attribute-based access control (ABAC), which is built on ABE, is crucial in providing dynamic, fine-grained, and context-aware security management in modern Internet of Things (IoT) applications. ABAC controls access based on attributes associated with users, devices, resources, and environmental conditions rather than fixed roles, making it highly adaptable to the complex and heterogeneous nature of IoT ecosystems. ABE can significantly improve the security and manageability of modern military IoT systems. Nevertheless, its practical implementation requires obtaining a range of performance data and assessing the additional overhead, particularly regarding data transmission efficiency. This paper provides a comparative analysis of the performance of two cryptographic schemes for attribute-based encryption in the context of special Internet of Things (IoT) applications. This applies to special environments, both military and civilian, where infrastructure is unreliable and dynamic and decisions must be made locally and in near-real time. From a security perspective, there is a need for strong authentication, precise access control, and a zero-trust approach at the network edge as well. The CIRCL scheme, based on traditional pairing-based ABE (CP-ABE), is compared with the newer Covercrypt scheme, a hybrid key encapsulation mechanism with access control (KEMAC) that provides quantum resistance. The main goal is to determine which scheme scales better and meets the performance requirements for two different scenarios: large corporate networks (where scalability is key) and tactical edge networks (where minimal bandwidth and post-quantum security are paramount). The benchmark results are used to compare the operating costs in detail, such as the key generation time, message encryption and decryption times, public key size, and cipher overhead, showing that Covercrypt provides a reduction in ciphertext overhead in tactical scenarios, while CIRCL offers faster decryption throughput in large-scale enterprise environments. It is concluded that the optimal choice depends on the specific constraints of the operating environment.

1. Introduction and Related Works

Currently, we can observe many so-called special applications of the Internet of Things (IoT) in both the civilian and military domains, where IoT is used in environments characterized by unreliable communication infrastructure, high event dynamics, and the need to make decisions in near-real time. In practice, this means that data must be processed locally, close to IoT end devices and users, with minimal dependence on a central data center. Examples of special applications in civilian areas include rescue and crisis management, public safety, and smart cities [1]. Rescue teams often have to build ad hoc mobile processing nodes in vehicles (tactical clouds) to analyze data from drones, cameras, and sensors without permanent Internet access. The use of IoT in military operations improves effectiveness by enabling the integration, analysis, and exchange of data between sensors, command and control systems, combat platforms, and specialized field devices. The integration of IoT into military environments improves situational awareness [2], enables faster commander decision making, improves resource management efficiency, and provides real-time decision support, all of which are crucial in the context of today’s asymmetric and multi-dimensional threats [3].
However, the widespread implementation of IoT systems for special applications poses significant security challenges, including vulnerability to cyberattacks, issues with the integrity and confidentiality of transmitted data, and difficulties in managing access in decentralized operating environments [4,5]. In response to these problems, research is being conducted on advanced protection mechanisms, among which attribute-based encryption (ABE) and attribute-based access control (ABAC) play an important role [6,7,8,9,10,11].
ABE is an advanced cryptographic scheme that enables fine-grained access control to encrypted data based on attributes assigned to users, resources, or the environment [12]. In the ABE model, both users’ private keys and ciphertexts (encrypted messages) are associated with attributes that describe entities, roles, or access contexts. Decryption is possible only if the user’s attributes satisfy the access policy defined when the message was encrypted. There are two basic types of ABE [12]:
  • In key-policy attribute-based encryption (KP-ABE), the access policy is embedded in the user’s private key, and the encrypted data are marked with a set of attributes. The user will only decrypt the data if the ciphertext’s attribute set matches the user’s key policy.
  • In ciphertext-policy attribute-based encryption (CP-ABE), the opposite is true—the access policy is associated with the ciphertext, and the user’s private key contains a set of attributes. Decryption occurs if the user has the required set of attributes consistent with the policy specified during encryption.
ABE provides a solid technical foundation for implementing ABAC models in distributed, dynamic environments, such as military IoT, where flexible, scalable access control is essential [13,14]. Thus, ABE can be seen as a cryptographic implementation of the ABAC concept.
ABAC is recommended for military IoT systems due to its ability to enforce security policies in a highly granular, adaptive, and robust manner, being well suited to the dynamic and sensitive nature of military operations and the hostile environments in which they are conducted [15]. This is expected to bring several benefits, including improved security in the IoT through capabilities such as precise, contextual access control, the mitigation of insider threats, and zero-trust requirements. ABAC enables precise access control by evaluating multiple attributes (e.g., user role, device, location, time, mission context), rather than static roles or simple user lists. This flexibility allows military systems to enforce context-dependent restrictions, tailoring access in real time to operational needs and threat levels. By evaluating actual attributes rather than predefined roles, ABAC reduces the risks of insider threats and privilege escalation by ensuring that only authorized attribute-based actions are allowed—even after credential compromises.
Special applications of the IoT often involve federated systems [16] across diverse partners (coalitions, allied units, civilian interfaces) [17], with varying clearance levels and data sensitivity. ABAC’s attribute-centric model supports secure, fine-grained information sharing and coalition operations while respecting policy requirements and minimizing data leakage between partners. The IoT environment in military contexts is highly dynamic, with devices and users frequently joining, leaving, or changing roles and locations.
ABAC can be tightly integrated with cryptographic schemes, especially ABE, to enforce object-level protection and enable a data-centric security [18] approach in battlefield IoT and military environments [19]. With ABE, data (objects) can be encrypted using an access policy based on attributes (such as user roles, clearance levels, device types), directly mapping to ABAC policies. Only users or devices with matching attributes (encoded in their cryptographic keys) can decrypt and access the data, regardless of the location of the network or intermediate storage. This ensures secure end-to-end protection at the object level, not just the perimeter. Data are encrypted as soon as they are generated or ingested by IoT devices, with ABAC rules embedded in the encryption policy (ciphertext-policy ABE, or CP-ABE). Decryption is possible only if the requesting user’s or system’s attributes satisfy the policy embedded in the encrypted object, eliminating the reliance on a single enforcement point and supporting multi-domain coalition environments.
Although the potential applications of ABAC in special IoT systems are emerging, the practical deployment of this method requires further research and experimentation to address emerging questions:
  • Which of the known schemes will be most suitable for use in special IoT systems and in which specific use cases?
  • How does performance depend on a range of typical parameters for special IoT?
  • Which scheme is better to use for protection in the edge IoT area and which in larger-scale networks?
  • Can ABAC policies be scaled to large distributed networks, effectively managing complex relationships between numerous entities without the unmanageable overhead found in traditional models such as role-based access control (RBAC)?
  • How well is ABE and ABAC integration suited for the special IoT due to support for dynamic, large-scale, and context-driven environments with fine-grained control and reduced management overhead?
To answer the above research questions, a comparative performance analysis between the CIRCL scheme based on CP-ABE pairing and the hybrid post-quantum KEMAC [20] Covercrypt has been conducted. This research aimed to obtain key information on the implementation of data-centric security (DCS) across the various operating environments of the civilian and military Internet of Things.
The CIRCL library implements an efficient CP-ABE scheme, referred to as tkn20, based on the work by Tomida et al. [21]. This scheme guarantees IND-CCA2 security and supports expressive policies. In [7], it has been proven that, under certain assumptions, it is also applicable for resource-constrained IoT devices, which is particularly relevant in demanding military use cases.
In contrast, Covercrypt provides a hybrid post-quantum secure encryption scheme that combines key encapsulation with attribute-based policies. This architecture enables fast encryption and robust access control, which are essential for special IoT systems requiring quantum-resilient security [22]. Benchmarking studies, such as those conducted by de la Piedra et al. [23], suggest that pairing-based CP-ABE schemes like tkn20 often incur higher computational costs than hybrid schemes like Covercrypt, which demonstrate advantages in edge computing scenarios.
The integration of ABAC and ABE allows for the scalable, flexible, and secure management of dynamic multi-domain IoT networks. This capability helps to mitigate insider threats and is fundamental to implementing zero-trust environments [24]. Furthermore, this integration aligns with the data-centric security approach, ensuring data protection from their origin throughout their lifecycle and enabling granular access control [25]. The adoption of DCS is currently under consideration by multiple entities, including the military sector [26]. This research also aligns with the recent NIST standardization of device onboarding in IoT networks [27]. However, further research is required to benchmark these schemes under special IoT application-specific constraints and to optimize their deployment strategies.
This paper contributes to the field by providing a comparative performance analysis between the CIRCL CP-ABE scheme and Covercrypt. This analysis advances our understanding of suitable data-centric security approaches specifically tailored to specialized IoT environments. This study represents the first direct comparison of these two schemes and their potential applications, highlighting their respective strengths and weaknesses. Although benchmarks for various ABE libraries, such as those in [28], have been provided previously, these two specific libraries have not yet been evaluated together. Furthermore, this study defines operational scenarios based on real-world applications in the civilian and military domains, providing the first direct evaluation of these cryptographic schemes with regard to specific IoT system requirements.
The remainder of the paper is organized as follows. Section 2 briefly characterizes the foundations of modern data access control, particularly attribute-based access control (ABAC) and the data-centric security paradigm, as well as ETSI’s fundamentals for the standardization of post-quantum attribute-based encryption, and briefly explains the foundations and basic phases involved in applying ciphertext-policy attribute-based encryption (CP-ABE) and Covercrypt as an attribute-based key encapsulation mechanism (KEM). Section 3 presents the methodology and results of the comparison tests. Section 3.9 provides an analysis of the complexity and scalability of the compared schemes in civilian and military IoT, focusing on key parameters. Both ciphertext-policy attribute-based encryption (CP-ABE, as implemented by CIRCL) and the key encapsulation mechanism with access control (KEMAC, as implemented by Covercrypt) are evaluated based on their operational costs as a function of the system parameters. In Section 3.10, the trade-offs between the highly scalable pairing-based CP-ABE (CIRCL) and the bandwidth-efficient, quantum-safe KEMAC (Covercrypt) are presented in the two distinct IoT operational scenarios. In Section 4, the results are summarized and directions for further work are identified.

2. Background

2.1. The Foundations of Modern Data Access Control

2.1.1. Attribute-Based Access Control

Attribute-based access control (ABAC) is defined by the National Institute of Standards and Technology (NIST) as an access control model where authorizations to perform operations on resources are granted to subjects based on the evaluation of policies against the attributes of subjects, resources, and the environment [29].
The core of an ABAC model is a set of policies that combine and evaluate these attributes using logical rules. The fundamental components are as follows:
  • Subject attributes:Characteristics of the user (e.g., identity, clearance, department).
  • Resource attributes: Characteristics of the object being accessed (e.g., creation date, data classification, owner).
  • Action attributes: Characteristics of the operation being attempted (e.g., ‘read’, ‘write’, ‘delete’).
  • Environmental attributes: Contextual factors such as time of day, location of access, or device security posture [29].
This structure allows for the creation of highly expressive access control policies (e.g., “Allow doctors to view medical records they created within their own hospital during work hours”), which are essential for securing complex, distributed systems [29]. In the context of this report, the focus is on cryptographically enforced ABAC. Here, the policy decision point (PDP) and policy enforcement point (PEP) are effectively merged into the cryptographic algorithms themselves. Two approaches can be distinguished:
KP-ABE 
Key-Policy ABE: Attributes are associated with the ciphertext, and policies are embedded in the user’s key. This is useful for database queries or content-centric routing.
CP-ABE 
Ciphertext-Policy: Attributes are associated with the user’s key, and policies are embedded in the ciphertext. This is the most natural fit for DCS, as it allows the data owner (the encryptor) to decide who can access the data at the moment of creation.
Both CIRCL (implementing tkn20) and Covercrypt utilize the CP-ABE model (or its functional equivalent in KEMAC), placing control in the hands of the data originator.

2.1.2. The Need for Data-Centric Security in Coalition Warfare

Modern warfare has evolved into network-centric warfare (NCW), where information superiority is as decisive as firepower. The integration of IoT devices—ranging from unattended ground sensors (UGS) to soldier-worn biometric monitors—generates a torrent of sensitive data that must be shared across disparate branches and coalition partners. Traditional “castle-and-moat” security architectures, which rely on securing the network perimeter (e.g., via VPNs or firewalls), are fundamentally incompatible with the dynamic, ad hoc nature of coalition operations. In these environments, the network infrastructure itself may be untrusted or shared with partners possessing varying clearance levels.
Data-centric security (DCS) addresses this by decoupling data protection from the transport layer. In a DCS model, the data are encrypted at the source (the sensor or soldier) and remain encrypted until they reach an authorized recipient, regardless of the intermediary nodes that they traverse. The access control policy is not enforced by a central server (which represents a single point of failure and a latency bottleneck) but is mathematically embedded within the encrypted data themselves.
Attribute-based encryption (ABE) is the cryptographic cornerstone of DCS. Unlike traditional Public Key Infrastructure (PKI), which encrypts data for a specific identity (e.g., “encrypt for Serial Number 12345”), ABE encrypts data for a policy defined over a set of attributes (e.g., “encrypt for (Role: Medic AND Clearance: Secret) OR (Role: Commander)”). This allows for “one-to-many” encryption and enables the system to grant access to users who may not even exist at the time of encryption, provided that they eventually possess the requisite credentials. This capability is essential for the dynamic join-and-leave behavior of tactical units in the field. The data-centric security (DCS) paradigm marks a strategic shift from protecting network perimeters to protecting the data themselves. In this model, security is not an external shell but an intrinsic property of the data object. The objective is to ensure that the data remain protected regardless of their location, whether they are at rest in a database, in transit over a network, or in use within an application.
DCS is realized by binding security policies, primarily through cryptography, directly to the data. Key mechanisms enabling this paradigm include strong encryption, embedded access control logic, and data classification. By making data self-defending, DCS addresses the shortcomings of perimeter-based models, which become ineffective once a breach occurs or when data are shared with external partners. Attribute-based encryption (ABE) is considered a key cryptographic enabler for achieving a true data-centric architecture, as it allows access policies to be inseparable from the encrypted data [12].

2.2. ETSI’s Standardization of Post-Quantum, Attribute-Based Encryption

2.2.1. The Quantum Threat and the Need for a New Standard

The emergence of practical quantum computing poses a catastrophic threat to widely used public key cryptographic algorithms, such as RSA and ECC [30]. A sufficiently powerful quantum computer, leveraging Shor’s algorithm, could break the mathematical foundations of this cryptography, rendering vast amounts of secured data and communications vulnerable. This threat is particularly acute for data with long-term confidentiality requirements due to “harvest now, decrypt later” attacks, where an adversary archives encrypted data today with the intent of decrypting them in the future [31].
Recognizing this, standardization bodies like ETSI initiated efforts to define cryptographic systems that are secure against both classical and quantum computers. The goal was to establish a clear standard for “crypto-agility”—the ability to transition to quantum-resistant algorithms—while simultaneously enhancing the functionality of cryptographic primitives to better serve modern access control needs [32]. The strategic utility of ABE is currently threatened by the rapid advancement of quantum computing. Standard ABE schemes rely on the hardness of the Decisional Bilinear Diffie–Hellman (DBDH) problem over elliptic curves. Shor’s algorithm proves that a sufficiently powerful quantum computer could solve the discrete logarithm problem in polynomial time, effectively breaking all pairing-based cryptography. While cryptographically relevant quantum computers (CRQCs) may not be available for another decade, the threat is immediate due to “harvest-now, decrypt-later” strategies. Adversaries are actively intercepting and archiving encrypted military communications today, with the intent of decrypting them once quantum capabilities mature. Consequently, military systems designed with a lifecycle of 10–20 years must integrate post-quantum cryptography (PQC) immediately to protect long-term intelligence. This necessity has driven the European Telecommunications Standards Institute (ETSI) to standardize Covercrypt, a hybrid scheme that combines classical elliptic curve cryptography with quantum-resistant Lattice-based primitives (specifically, variants of the NIST finalist Kyber) [33]. By layering these protections, Covercrypt ensures that data remain secure as long as at least one of the underlying mathematical problems remains hard.

2.2.2. Covercrypt: A Hybrid KEMAC Solution

In response to these challenges, ETSI published the technical specification ETSI TS 104 015, which standardizes a hybrid, quantum-safe cryptographic scheme known as Covercrypt [32]. The scheme is formally defined as a key encapsulation mechanism with access control (KEMAC).
Its hybrid nature is a critical feature for a secure transition. It combines a classical, well-established algorithm with a post-quantum algorithm from the finalists/alternates of the NIST PQC standardization process. Security is maintained as long as at least one of the component algorithms remains unbroken, thus providing resilience against unforeseen breaks in either primitive [20,34]. Most importantly, Covercrypt natively implements ciphertext-policy attribute-based encryption, as detailed in Section 2.4. This allows a data originator to encrypt a session key under a specific access policy (e.g., (role = ‘auditor’ AND region = ‘EMEA’) OR clearance = ‘L3’). Only users whose cryptographic keys are associated with attributes that satisfy this policy can decapsulate the session key and decrypt the corresponding data [32].

2.2.3. Connecting Covercrypt with ABAC and DCS

The ETSI standardization of Covercrypt provides a formal, robust cryptographic foundation for implementing ABAC and realizing the DCS paradigm.
  • Link to ABAC: Covercrypt is a direct cryptographic enforcement mechanism for ABAC. It translates abstract ABAC policies into immutable cryptographic rules embedded within the ciphertext itself. The authorization check is not performed by a fallible external policy decision point but is an intrinsic part of the decryption process. This eliminates entire classes of vulnerabilities related to policy enforcement and ensures that access control is absolute.
  • Link to DCS: Covercrypt is a quintessential enabling technology for data-centric security. By binding an attribute-based access policy to the data through encryption, the data become a self-contained, self-protecting entity. Their security is inherent and persists across different environments—cloud storage, third-party applications, or local devices. This directly addresses the core objective of DCS: to protect data throughout their lifecycle, ensuring that only authorized individuals can access them, regardless of where they reside.
Thus, ETSI TS 104 015 not only provides a forward-looking solution to the quantum threat but also standardizes a powerful primitive for building the next generation of secure, fine-grained, and data-centric information systems.

2.3. Ciphertext-Policy Attribute-Based Encryption

Ciphertext-policy attribute-based encryption (CP-ABE) is an advanced cryptographic primitive that enables fine-grained access control over encrypted data. In a CP-ABE system, a user’s private key is associated with a set of descriptive attributes, and a ciphertext is encrypted with an access policy defined over these attributes. A user can only decrypt a ciphertext if the attributes associated with their private key satisfy the policy embedded within the ciphertext.
The tkn20 scheme [35], available in Cloudflare’s CIRCL library [36], is a modern and efficient implementation based on the foundational work of Waters. A trusted key authority (KA) is responsible for generating public parameters in the system and a master secret key (MSK). The KA then uses the MSK to issue personalized private keys to users based on their attributes.

2.3.1. Setup

Before any keys can be issued or data encrypted, a trusted entity known as the key authority (KA) must initialize the system. This is accomplished through a ‘Setup’ algorithm that creates the essential public and private parameters for the entire environment.
The ‘Setup’ algorithm generates the following:
  • Public Parameters (PP): These parameters are made publicly available and are used by anyone who wishes to encrypt data. The PP typically consists of
    P P = ( g , g β , H )
    where g is a generator of a cyclic group G of order p, β Z p is a randomly chosen secret exponent, and H is a public hash function that maps attribute strings to elements in G .
  • Master Secret Key (MSK): This key is the root of trust for the entire system and must be kept secret by the key authority at all times. The MSK consists of
    M S K = ( β , g α )
    where α Z p is another randomly chosen secret exponent. The MSK empowers the KA to issue private keys to users.

2.3.2. User Key Generation

The generation of a user’s private key (SK) is a critical process managed exclusively by the key authority. It involves combining the system’s master secret key with the user’s specific attribute set. The core of the process, particularly its security against collusion, lies in the introduction of a unique, random secret for each user.
Let the system’s public parameters be ( g , g β , H ) , where g is a generator of a cyclic group G 0 , β is a secret exponent, and H is a hash function that maps attributes to elements of G 0 . The master secret key (MSK) is ( β , g α ) , where α is another secret exponent.
The key generation algorithm, often denoted as ‘KeyGen(MSK, A)’, where A is the user’s attribute set, proceeds as follows:
1.
Generate a User-Specific Random Secret: The KA first selects a random secret t Z p uniformly at random. This value is unique for each key generation instance and serves as the cornerstone of collusion resistance.
2.
Compute the Base Key Component: A base component of the private key, K 0 , is computed. This component binds the user’s secret t with the master secrets α and β .
K 0 = g α · g β t
This component is essential for the decryption process and ensures that any valid key has been properly derived from the MSK.
3.
Compute Attribute-Specific Components: For each attribute j in the user’s attribute set A, a corresponding key component K j is computed. Crucially, each of these components is also blinded by the same user-specific secret t.
K j = H ( j ) t
Here, H ( j ) is the result of hashing the attribute string (e.g., “role: doctor”) to a group element.
The final user private key S K is the collection of the base component and all attribute-specific components:
S K = K 0 , { K j } j A
This structure ensures that all parts of a user’s key are mathematically linked through the single secret value t.

2.3.3. Encryption

An entity wishing to encrypt a message M does so by using the public parameters and defining an access policy A . The access policy is a logical formula (e.g., ("role:doctor" AND "department:cardiology") OR "role:admin") that specifies which attributes are required for decryption. This policy is typically represented internally as a linear secret sharing scheme (LSSS).
The Encrypt(PP, M, A ) algorithm proceeds as follows:
1.
Select an Encryption Secret: The encryptor chooses a random, single-use secret s Z p . This secret will be used to encrypt the message and will be embedded in the ciphertext.
2.
Encrypt the Message: The main part of the ciphertext, C , is created by binding the message M with the master secret component α and the encryption secret s. This is achieved using a pairing function e:
C = M · e ( g , g ) α s
The term e ( g , g ) α s acts as a one-time symmetric key (a blinding factor) that masks the message.
3.
Embed the Secret: A second component, C 0 , is created to carry the encryption secret s, blinded by the master secret β :
C 0 = g β s
4.
Encode the Policy: For each attribute i that is part of the access policy A , a corresponding ciphertext component C i is generated. These components securely embed the shares of the secret s according to the LSSS representation of the policy. For each attribute i, this resembles
C i = H ( i ) s
(This is a simplification; in an LSSS, each C i corresponds to a row in the policy matrix and involves more complex calculations, but the core idea is binding the attribute to the secret s).
The final ciphertext C T consists of the access policy A and all generated components:
C T = ( A , C , C 0 , { C i } )

2.3.4. Decryption

A user with private key S K can attempt to decrypt a ciphertext C T . The process is successful only if the user’s attributes A satisfy the ciphertext’s access policy A .
The ‘Decrypt(SK, CT)’ algorithm involves the following steps:
1.
Policy Check: First, the algorithm determines if the attributes A in the user’s key S K satisfy the policy A in the ciphertext C T . If not, decryption fails immediately.
2.
Reconstruct the Blinding Factor: If the policy is satisfied, the user can use a specific subset of their attribute key components { K j } that corresponds to the attributes needed to fulfil the policy. Through a series of pairing operations involving their key components ( K 0 , { K j } ) and the ciphertext components ( C 0 , { C i } ), the user reconstructs the original blinding factor e ( g , g ) α s .
The core mathematical step involves combining the components in such a way that cancels out the user’s secret t and the policy’s secret shares, leaving only the required term. A simplified view of the final pairing result is
e ( K 0 , C 0 ) Pairings ( { K j } , { C i } ) = e ( g α · g β t , g β s ) = e ( g , g ) α s
The denominator, representing the pairings of attribute components, is calculated using constants derived from the LSSS matrix to correctly combine the shares of s and cancel out the e ( g , g ) β t s term.
3.
Recover the Message: Once the blinding factor B = e ( g , g ) α s has been successfully reconstructed, recovering the original message involves simple division:
M = C B = M · e ( g , g ) α s e ( g , g ) α s
If a user’s attributes do not satisfy the policy, they will not have the necessary set of K j components to correctly run the reconstruction algorithm. The mathematical operations will not produce the correct blinding factor, and the result will be garbage data instead of the original message M.

2.3.5. The Collusion Resistance Mechanism

A collusion attack occurs when multiple users pool their private keys to decrypt a ciphertext that none of them could decrypt individually. For example, User 1 with attribute {"doctor"} and User 2 with attribute {"cardiology"} might try to combine their keys to satisfy an access policy of "doctor" AND "cardiology". The key structure of the tkn20 scheme makes this computationally infeasible.
The security comes from the fact that each user’s key is randomized with a differentsecret. Let us analyze the keys of two distinct users.
  • User 1 (attributes A 1 = { " doctor " } ) is assigned a random secret t 1 . Their private key S K 1 is
    S K 1 = K 0 , 1 = g α · g β t 1 , K doctor , 1 = H ( " doctor " ) t 1
  • User 2 (attributes A 2 = { " cardiology " } ) is assigned a random secret t 2 . Their private key S K 2 is
    S K 2 = K 0 , 2 = g α · g β t 2 , K cardiology , 2 = H ( " cardiology " ) t 2
Since the KA chooses secrets randomly, it is overwhelmingly likely that t 1 t 2 .
During decryption, pairing-based cryptography is used to check if the attributes satisfy the policy. This process involves pairing operations that must cancel out certain secret terms in the exponent to reconstruct a blinding factor. For this to succeed, all attribute key components used in the decryption equation must be derived from the same exponent.
If the colluding users attempt to mix their key components, they would be using H ( " doctor " ) t 1 from User 1 and H ( " cardiology " ) t 2 from User 2. The decryption algorithm, which expects all attribute components to be raised to the power of a single t, will fail. The mathematical checks will not reach validation because the underlying exponents ( t 1 and t 2 ) are different. There is no known algebraic operation that allows attackers to transform H ( j 1 ) t 1 and H ( j 2 ) t 2 into a valid set { H ( j 1 ) t , H ( j 2 ) t } for some consistent t without knowing t 1 and t 2 , which are secret.

2.4. Covercrypt Overview

Covercrypt is an attribute-based key encapsulation mechanism (KEM) designed to enable fine-grained access control, privacy of access policies, hybrid (classical + post-quantum) security, and traceability [20]. It supports Boolean combinations—“AND” and “OR”—over multi-dimensional attributes (e.g., “Department::Sales AND Country::FR”). Ciphertexts are tagged with a set of target attributes, and users hold decryption keys tied to certain attribute sets.
Covercrypt operates through four intertwined phases, namely master setup, user key generation, encryption, and decryption, elegantly combining classical and post-quantum KEMs under an attribute-based paradigm. In the setup phase, the system defines a complete universe of “rights”; each right corresponds to a specific combination of attributes drawn from predefined dimensions, such as department, country, or rank. For each possible right, the authority generates an independent key pair using a KEM (e.g., X25519 or Kyber). These sub-key pairs collectively form a master public key, while the secret halves form the master secret key.
The encryption phase begins with the encryptor defining an access policy and similarly converting it into an explicit right set. Then, for each right in this set, the corresponding public key is used to perform KEM encapsulation, yielding a ciphertext component E a and a shared secret K a . A single random seed S is drawn and masked against each K a to generate F a = S K a . All pairs ( E a , F a ) , together with a consistency tag, form the encryption header. Finally, a symmetric key is derived from S, which is used to encrypt the actual message payload following the KEM-DEM paradigm.
In decryption, the user iterates through their secret sub-keys, testing each one against the corresponding ciphertext component. For each right candidate a, they attempt to restore K a via decapsulation, recover S using F a , and verify the consistency tag. Once a matching right is found, the correct symmetric key is derived and used to decrypt the payload. This “early abort” process preserves policy privacy and efficiency.
To support post-quantum security, Covercrypt constructs each right’s KEM in a hybrid fashion: combining a classical scheme with a PQ scheme ensures security as long as at least one underlying primitive remains secure. Since the scheme is modular, any new KEM can be plugged in without altering the overall structure. Additionally, Covercrypt embeds a traceable ElGamal KEM (TKEM) into its hybrid AB-KEMAC. Each user receives a unique secret share enabling decrypt, and any session key successfully recovered can be cryptographically tied back to the specific user key used—without revealing any identity during standard operation.
During user key generation, the key-generating entity takes a user policy, expressed as a Boolean formula over attributes, and converts it into a disjunctive set of rights that satisfy the policy. Every right in this expansion corresponds to one of the subkeys in the master secret key, which are then securely packaged and issued to the user.
The algorithm is explained in detail in the following subsections, in accordance with [34].

2.4.1. Setup

Let Ω be the set of rights and t a threshold for traceability. The security parameter is denoted by κ . The setup is as follows:
1.
Sample s k k $ Z p for k { 1 , , t } , and set P k s k k · P .
2.
Sample α 1 , , α t $ Z p and define
s = k = 1 t α k · s k k and H = k = 1 t α k P k
with the constraint that s 0 .
3.
Initialize the set of user identities:
ID
4.
Define the tracing secret key:
tsk = s , ( s k k ) k = 1 t , ID
5.
Define the tracing public key:
tpk = H , ( P k ) k = 1 t
6.
Initialize the set of users’ secret keys that show their permissions:
UP
7.
For each right S i with index i in Ω ,
7.1.
Sample ( p k i , s k i ) KEM . KeyGen ( 1 κ ) , and x i $ Z p
7.2.
Compute
X i x i · P , H i s · X i
7.3.
Set
p k i = ( H i , p k i ) , s k i = ( x i , s k i )
The global public key is
MPK = tpk , { p k i } i
and the master secret key is
MSK = tsk , { s k i } i , UP

2.4.2. User Key Generation

Given a username U, a set Y of rights assigned to U, and the master secret key MSK , the key generation procedure KeyGen ( MSK , U , Y ) proceeds as follows:
1.
Parse the master secret key:
MSK = ( tsk , { s k i } i , UP )
2.
Sample a random tuple ( β k ) k such that
s = k β k · s k k
and set the user’s secret identifier:
uid ( β k ) k
3.
Define the user’s secret key:
usk ( uid , { s k j } j Y )
4.
Update the tracing secret key tsk by appending ( U , uid ) to the identity set ID .
5.
Update the master secret key MSK by appending usk to the permission set UP .

2.4.3. Encryption

Given a set X of rights and the public key MPK , the encryption algorithm Enc ( MPK , X ) proceeds as follows:
1.
Parse the public key:
MPK = ( tpk , { p k i } i )
2.
Let K denote the key space of KEM , and sample
S $ K
3.
Set
r G ( S ) , c k r · P k for each k , c ( c k ) k ,
where G is a hash function mapping into Z p * .
4.
For each index i X , compute
K i r · H i , ( E i , K i ) KEM . Enc ( p k i )
5.
Compute
E ( E ) X , T H ( c , E ) ,
where H is a hash function mapping into 2 K -bit strings.
6.
For each index i X , compute
F i S H ( K i , K i , T )
7.
Set
F ( F ) X , L H ( T , F )
8.
Compute the final encapsulated output:
( K , V ) J ( S , L ) ,
where J is a hash function mapping into 3 K -bit strings.
The resulting ciphertext is
C ( c , E , F , V )
and it encapsulates the key K.

2.4.4. Decryption

Given a user’s secret key usk and a ciphertext C = ( c = ( c k ) k , E = ( E ) , F = ( F ) , V ) , the decryption algorithm Dec ( usk , C ) proceeds as follows:
1.
Parse the user secret key:
usk = ( uid , { s k j } j ) , where uid = ( β k ) k
2.
Compute
T H ( c , E ) , L H ( T , F )
3.
For each index i such that ( E i , F i ) is in C , and for each j such that s k j = ( x j , s k j ) usk , do the following:
3.1.
Run
K i , j KEM . Dec ( s k j , E i )
3.2.
Compute
K j x j · k β k · c k , S i , j F i H ( K j , K i , j , T )
3.3.
Compute
r G ( S i , j ) , ( U i , j , V i , j ) J ( S i , j , L )
3.4.
Check whether
c = ( r · P k ) k and V i , j = V
3.5.
If both checks pass, return
K U i , j
and terminate the algorithm.
4.
If no valid pair ( i , j ) leads to successful decryption, return NULL.

2.5. Covercrypt and CP-ABE Use Case Example

To illustrate Covercrypt’s operation, consider a simplified three-axis attribute model as demonstrated in the Covercrypt reference implementation [22]:
  • Security: {None, Medium, High}
  • Country: {France, Germany, UK}
  • Project: {X, Y}
This configuration yields a total of ( 3 + 1 ) × ( 3 + 1 ) × ( 2 + 1 ) = 48 possible attribute combinations, referred to as rights. Moreover, + 1 indicates the possibility of omitting one axis.
To complement the Covercrypt illustration, the operation of ciphertext-policy attribute-based encryption (CP-ABE) using the CIRCL scheme is also detailed, employing the same simplified three-axis attribute model: Security, Country, and Project.
In Covercrypt, the authority enumerates all 48 rights and invokes generate_master_keys(), generating a hybrid KEM key pair (classical + Kyber) for each coordinate. These subkeys collectively form the master public key (MPK) and the master secret key (MSK).
In CP-ABE, the authority generates a single set of system keys: public parameters and a master secret key.
Suppose that Alice requests access under the policy
Security = Medium Country = France Project = Y .
Upon request, Alice is issued the corresponding secret subkey for the coordinate (Medium, France, Y). Additionally, she is issued with subkeys corresponding to each subset within the set of attributes included in conjunction. Summing up, she receives the following keys:
  • ( Medium , France , Y ) ,
  • ( , France , Y ) ,
  • ( Medium , , Y ) ,
  • ( Medium , France , ) ,
  • ( Medium , , ) ,
  • ( , France , ) ,
  • ( , - , Y ) ,
  • ( , - , ) .
Suppose that Carol requests access under the policy
Security = High Country = UK
Upon request, Carol is issued the corresponding secret subkey for the single coordinate ( High , UK ) . However, because the Project dimension is not specified, Carol is also issued additional keys derived from the original policy:
Security = High Country = UK Security = High Country = UK ( Project = X Y ) ( Security = High Country = UK Project = X ) ( Security = High Country = UK Project = Y )
( High , UK , X ) and ( High , UK , Y ) . Similarly to Alice, she is also issued with subkeys corresponding to each subset within the set of attributes included in both conjunctions. Summing up, she receives the following keys:
  • ( High , UK , ) ,
  • ( High , UK , X ) ,
  • ( High , UK , Y ) ,
  • ( High , , ) ,
  • ( High , , X ) ,
  • ( High , , Y ) ,
  • ( , UK , ) ,
  • ( , UK , X ) ,
  • ( , UK , Y ) ,
  • ( , , ) ,
  • ( , , X ) ,
  • ( , , Y ) .
In CIRCL, the authority utilizes the MSK to compute and issue one single, compact secret key: S K A l i c e to Alice or S K C a r o l to Carol. These are cryptographically bound to their full sets of attributes. Crucially, the size of this key is dependent on the number of attributes that they possess and not the total number of rights in the system.
Bob wishes to encrypt a message under the policy
Security = High Country = UK Country = Germany
Since the Project dimension is unspecified in both conjunctions contained in the alternative, and Security is not used in the latter, Bob omits them and uses the following two rights to encrypt the symmetric key: ( High , UK , ) and ( , Germany , Y ) . For each, he performs hybrid KEM encapsulation:
1.
public key ( High , UK , ) ( E 1 , K 1 )
2.
public key ( , Germany , ) ( E 2 , K 2 )
Bob draws a single random seed S, masks it as F i = S K i , and constructs the encrypted header { ( E i , F i ) } with a consistency tag. The payload is symmetrically encrypted under S using AES-GCM under the KEM-DEM framework.
In CP-ABE, Bob defines the access policy, which is then embedded within the ciphertext. Using the public parameters, Bob encrypts the symmetric key for the message under this policy, producing the ciphertext. The size of this ciphertext is primarily determined by the complexity of the access policy (the number of attributes and logical gates), independently of the total number of users or possible rights.
Alice, possessing only keys derived from the ( Medium , France , Y ) subkey, finds no matching right, and her decryption attempt fails.
In contrast, Carol holds both ( High , UK , -) subkeys. She attempts decryption sequentially:
1.
She applies decapsulation with ( E 1 , F 1 ) , recovers S, verifies the tag, and decrypts the payload.
2.
The process halts immediately upon success, exemplifying the early abortmechanism.
For comparison, in CP-ABE, Alice similarly attempts to decrypt the C T using her secret key S K A l i c e . Since Alice’s Security : Medium attribute does not satisfy the policy requirement Security : High , she does not possess the private key corresponding to attribute Security : High and is unable to succeed during the initial pairing check.
Carol, on the other hand, possesses a key derived from the following attributes:
{ Security : High , Country : UK , Project : Y } ,
so Carol’s attribute set satisfies the policy. Consequently, a single, non-iterative decryption operation succeeds, allowing Carol to recover the symmetric key and decrypt the message payload.

2.6. Formal Comparison of Security Models and Assumptions

The security of the CIRCL implementation (based on the tkn20 scheme) relies on the hardness of the Decisional Bilinear Diffie–Hellman (DBDH) problem over the BLS12-381 elliptic curve. This is a classical pairing-based assumption, which is mathematically robust but fundamentally vulnerable to Shor’s algorithm on a sufficiently powerful quantum computer.
In contrast, Covercrypt is capable of employing a hybrid security model. It layers classical elliptic curve cryptography (ECC) with Lattice-based primitives, specifically variants of the NIST-standardized ML-KEM (Kyber). The formal security of Covercrypt is maintained as long as at least one of the underlying mathematical problems (discrete logarithm or Learning With Errors—LWE) remains computationally hard.
Both schemes provide formal proofs for IND-CCA (Indistinguishability under Adaptive Chosen Ciphertext Attack) security [34,35]. Both Covercrypt and CIRCL achieve collusion resistance through the user-specific randomization of private keys. Additionally, Covercrypt integrates a traceable KEM, allowing for the forensic attribution of leaked keys—a feature not natively present in the evaluated CIRCL implementation.
CIRCL includes the access policy in the ciphertext metadata in plaintext. This allows an adversary to perform traffic analysis by inferring data sensitivity from the visible policy structure. In contrast, Covercrypt natively supports hidden access policies. The access policy is embedded within the encapsulation header, preventing unauthorized actors from learning who the intended recipients are or which attributes are required for decryption. The comparison is presented in Table 1.

3. Comparison Tests with ABE Scheme

3.1. Methodology

Two libraries are compared: Covercrypt and the Cloudflare Interoperable Reusable Cryptographic Library (CIRCL), which implements ciphertext-policy attribute-based encryption (CP-ABE) on the BLS12-381 elliptic curve [23,36]. To conduct a comprehensive evaluation of the performance and practical viability of the compared libraries, a set of metrics was selected to measure both the computational overhead and the storage costs. These metrics are standard in evaluating attribute-based encryption schemes, as they directly impact scalability and efficiency in real-world applications like the Internet of Things, where resources (CPU time, memory, bandwidth) are often constrained.
To comprehensively evaluate the performance and practical utility of the compared CP-ABE libraries (Covercrypt and CIRCL), a set of metrics was selected that reflected both the computational overhead (execution time)and the storage costs (cryptographic data size). These metrics are standard in the evaluation of attribute-based encryption (ABE) schemes, as they directly impact scalability and efficiency in real-world, resource-constrained environments, particularly the Internet of Things [37,38,39].

3.1.1. Execution Time Metrics

In CP-ABE, computational efficiency is paramount, especially for devices with limited CPU and battery capacity [37]. The system must minimize the latency for the four fundamental cryptographic operations.
  • Master Key Generation Time: Measures the system initialization time. Although performed only once, it is correlated with the overall setup complexity.
  • User Secret Key Generation Time: Reflects the load on the key authority during user onboarding. This time directly impacts the scalability of user management [37].
  • Encryption Latency: A critical metric for the data owner. It measures the computational cost of enforcing the access policy and directly influences data sharing delays. In classical CP-ABE [35], this cost is proportional to the complexity of the access policy [21].
  • Decryption Latency: The most crucial metric for the user and constrained devices. It measures the time required to recover data, representing the heaviest computational operation in pairing-based ABE schemes. Decryption time is a major factor in energy consumption, and, in classical CP-ABE, it is highly dependent on the policy’s Boolean formula size [21,38].

3.1.2. Size Metrics (Storage and Communication Overhead)

The storage and communication overhead are vital considerations in distributed systems and IoT, where bandwidth and storage are limited resources [37]. These metrics quantify the size increase of cryptographic data compared to plaintext.
  • Public Key Size: Impacts the size of the public parameters ( M P K , P P ) that must be stored and accessed by all encryptors.
  • User Secret Key Size: Affects the memory requirements of user devices and the key transmission time. The dependence of this size on the number of attributes is a key indicator of attribute scalability [39].
  • Ciphertext Size Overhead: A crucial metric for storage providers and networks. In CP-ABE, the ciphertext embeds cryptographic elements corresponding to the access policy, meaning that its size in classical CP-ABE typically grows with the policy complexity [21,37].

3.1.3. Justification for Benchmark Parameterization

The benchmarks are parameterized as a function of the “structure size” (n), defined as the number of axes and the number of attributes in each axis. This setup is specifically chosen to induce the highest possible cost for a fixed attribute universe size in the Covercrypt system.
  • Covercrypt is inherently sensitive to the number of attribute combinations (rights) necessary to represent a policy, a type of complexity that is maximized by the chosen axis–attribute structure.
  • Classical ABE (CIRCL) performance is primarily influenced by the Boolean access formula size, which is also related to the growth of n.
The objective of this dual parameterization is to create a worst-case testing scenario that maximally stresses both schemes as a function of n, enabling the characterization of the thresholds at which the cost of Covercrypt’s construction exceeds that of classical ABE.
For traditional pairing-based ABE (e.g., BLS12-381), performance is primarily a function of the policy’s Boolean formula size. CIRCL provides optimized routines and supports pairing operations such as multi-scalar multiplications and Miller loops [23,36]. In contrast, Covercrypt’s performance is sensitive to both the overall attribute universe and the specific policy shape—since it must expand to multiple attribute combinations (rights).
Consequently, our benchmark studies examined the execution time and storage overhead as functions of two orthogonal parameters: the size of the defined attribute universe and the complexity of the access policy. Our objective was to characterize the thresholds at which Covercrypt’s cost exceeds that of classical ABE. Given the possible complexity of the attribute distribution between axes, benchmarks were executed in relation to n, where n is both the number of axes and number of attributes in each axes, resulting in an amount of generated rights for a fixed attribute number that was sufficient for effective analysis. n is later related to the “structure size”. Further analysis for different structures, where the number of axes and attributes differs, is possible, but it was not conducted in this work.
Moreover, Covercrypt was tested in two modes:
1.
Classical, using only classical KEM primitives;
2.
Post-quantum, using a hybrid KEM setup involving Kyber.
These modes are compared directly in the subsequent discussion of the results.
All experiments were conducted on a desktop system with the specifications presented in Table 2.

3.2. Master Key Generation Time

The master key generation algorithm in Covercrypt produces a distinct key pair for each admissible right. The cardinality of the set of rights R within the space Ω is equal to the product of all axes’ sizes plus 1:
| R | = ( i = 0 m | A i | + 1 ) ,
where A i denotes the set of attributes defined on axis i, and m is the total number of axes. The term +1 accounts for the possibility of omitting a particular axis. Under the parameterization adopted in this benchmark, this simplifies to
| R | = ( i = 0 n n + 1 ) = ( n + 1 ) n .
Table 3 reports the measured master key generation times, and the corresponding visualization is provided in Figure 1. The empirical results align with the theoretical expression above, exhibiting an exponential growth pattern with respect to the structure size. For comparison, in CIRCL, the master key generation time is independent of the structure size, remaining approximately constant at ∼6000 μs in our benchmark.

3.3. Master Key Size

During master key generation, only one master secret key is generated. However, the public key consists of many keys that are bound to each right. Similarly to the master key generation time, the public key size depends on the number of possible rights defined in space Ω . In this benchmark, it is equal to
| R | = ( i = 0 n n + 1 ) = ( n + 1 ) n .
Table 4 shows the public key sizes generated in the process, which are also visualized with plots in Figure 2. The results are in line with the number given above, indicating a quadratic relation with the structure size. For comparison, the public key size in CIRCL is always exactly 3282 bytes.

3.4. User Key Generation Time

As secret keys connected to rights are generated during the setup phase, these are prescribed for the user from the master secret key. The key-assigning entity must, however, determine which rights the user’s policy expands into. After this, the steps described in Section 2.4.2 occur, including the preparation of the user’s secret identity and updating both the tracing and master secret keys. The user secret key is also signed, which takes most of the time in this step and is proportional to the generated user key size. Table 5 presents the generation time for user keys with respect to the size of the structure and the length of the user policy (number of defined attributes) for the classical and post-quantum approaches for a policy consisting of one conjunction, and Table 6 presents the results for an extremely contrasting policy consisting of one alternative. The difference between the policies’ construction results in different numbers of rights expanded and therefore different key generation times. This is explained in Section 3.5. The results for each of the variants are visualized in plots in Figure 3, Figure 4, Figure 5 and Figure 6. Notice that the time for the post-quantum approach is increased greatly, mostly due to the larger subkeys.
In CIRCL, user Key generation is performed by generating a private key corresponding to each attribute in the policy. Additionally, the key-generating entity creates a randomized secret bound to the user for collusion resistance purposes and applies it to each private key. The time of key generation for different policy lengths, corresponding to Covercrypt, in CIRCL is presented in Table 7. Unlike in Covercrypt, the user key generation time does not depend on the policy form—it is very similar for both a single conjunction and a single alternative. A comparison of both libraries for classical and post-quantum Covercrypt and CIRCL is presented in Figure 7 and Figure 8.

3.5. User Key Size

As described in Section 3.4, the secret keys associated with rights are derived during the setup phase from the master secret key, once the key-issuing authority determines the set of rights implied by a given user policy. In this benchmark, the cardinality of the rights set is given by
| R | = ( n + 1 ) n .
The number of rights assigned to a user is determined by the number of attributes specified in the policy. Consider policies consisting of a single clause in disjunctive normal form (DNF), where all attributes appear in conjunction.
The policy expansion is defined as follows. Let the policy be expressed as a conjunction of l attributes, denoted by
P = { a 1 a 2 a l } .
A family of subsets is constructed
S = { S P | S | l } ,
which enumerates all subsets of P of size 0 up to l. The expanded rights set is then obtained as the Cartesian product,
R ( P ) = S × a A A P D a ,
where A denotes the set of axes, A P denotes the set of axes that contain attributes from P, and D A is the set of attributes in axis A. The total number of rights assigned to the user with policy P in relation to n and l is equal to
| R ( P ) | = | S | · a A A P | D a | = 2 l · i = 1 n l n = 2 l · ( n + 1 ) n l .
The situation differs when considering a contrasting approach with policies consisting of alternatives only. Then, policy expansion is defined as follows. Let the policy be expressed as a conjunction of l attributes, denoted by
P = { a 1 a 2 a l } .
In l different sets Z i (axes), one can choose a fixed a i attribute. The expanded rights set is then obtained as the Cartesian product for each of the fixed attributes:
R ( a i ) = a i × D A A a i ( D ) ,
where A denotes the set of axes, A a i denotes the axis that contains the attribute a i , and D is an axis not containing a i . Note that D is summed with ⌀ as attributes from different dimensions cannot be set. All rights generated for the policy can then be described as
R ( P ) = i = 1 l R ( a i ) .
To determine the cardinality of R ( P ) in this case, the size of a union of sets must be calculated. Since the sets R ( a i ) are not disjoint (e.g., the tuple with a 1 and a 2 is in both R ( a 1 ) and R ( a 2 ) ), one cannot simply sum their individual sizes.
The most straightforward method is to calculate the size of the complement R ( P ) C and subtract it from the total universe U.
Let U be the universe of all possible rights, defined as the Cartesian product of all n axes, where each axis D i is extended with the ⌀ element.
U = i = 1 n ( D i { } )
Assume that there are n total axes, and each axis D i has cardinality of n. Therefore, the cardinality of each extended axis is | D i { } | = n + 1 . The total size of the universe is
| U | = ( n + 1 ) n
The set R ( P ) contains all tuples where at least onespecified attribute a i (for i = 1 , , l ) is present at its corresponding axis.
The complement, R ( P ) C , therefore contains all tuples where none of the specified attributes a i are present. A tuple ( x 1 , , x n ) is in R ( P ) C if and only if x i a i for all i { 1 , , l } .
The cardinality of R ( P ) C can be found by counting the available choices for each position in the tuple.
  • For the l axes ( i = 1 , , l ) involved in the policy P: The element x i can be any attribute from D i  except the specified a i . This leaves n 1 choices for each of these l axes. The element { } is not considered as the policy is always expanded from a i to { } within the dimension.
  • For the remaining n l axes ( j = l + 1 , , n ) not involved in the policy: The element x j can be any attribute from D j { } . This gives n + 1 choices for each of these n l axes.
The total size of the complement is the product of these choices:
| R ( P ) C | = ( ( n 1 ) · ( n 1 ) ( n 1 ) ) l times · ( ( n + 1 ) · ( n + 1 ) ( n + 1 ) ) n l times = ( n 1 ) l · ( n + 1 ) n l
Finally, the total number of rights | R ( P ) | is the size of the universe minus the size of the complement:
| R ( P ) | = | U | | R ( P ) C | = ( n + 1 ) n ( n 1 ) l ( n + 1 ) n l
This can also be expressed in factored form:
| R ( P ) | = ( n + 1 ) n l ( n + 1 ) l ( n 1 ) l
User key sizes are presented in Table 8 and Table 9 for the conjunction and alternative scenarios, respectively. For comparison, in CIRCL, the user receives only one private key related to the policy that he is given; however, it consists of subkeys connected with each of the attributes. Thus, it depends entirely on the number of attributes that the policy consists of. The sizes of the user keys for the corresponding numbers of attributes are presented in Table 10. Unlike in Covercrypt, the user key size does not depend on the policy form—it is the same for both a single conjunction and a single alternative.

3.6. Encryption Time

In Covercrypt, only one key is used for encryption for policies in the form of a single conjunction. As described in Section 2.4.3, essentially, a symmetric key is generated for the ciphertext and it is then encrypted with a pair of keys corresponding to the policy. If the policy contains more conjunctions in DNF form, then the symmetric key is encrypted for each, as shown in Table 11 for the two extreme opposite cases of a conjunction only and alternative only.
In CIRCL, the situation is more complex, as encryption is based upon an LSSS mechanism, as described in Section 2.3.3. The encryption time depends on the number of attributes contained in the ciphertext policy, as presented in Table 11.

3.7. Encryption Overhead

For both libraries, the encryption overhead is not connected with the size of the ciphertext, as the scheme’s purpose is key encapsulation. In Covercrypt, each overhead for a fixed symmetric key size is constant, and, in our case (AES-128), it is exactly 32 bytes for classical and 800 bytes for post-quantum mode. Similarly to the encryption time, when the policy contains more conjunctions in DNF form, then the symmetric key is encrypted for each, as shown in Table 12 for the two extreme opposite cases of a conjunction only and alternative only. In CIRCL, the size grows with the policy length due to components C i , as explained in Section 2.3.3. Table 12 summarizes the results.

3.8. Decryption Time

In Covercrypt, the policies embedded within ciphertexts are hidden. Although only a single key is ultimately required to decrypt the message, the recipient does not know a priori which key to use. Consequently, the receiver attempts to decrypt the message sequentially with each of their possessed keys, as detailed in Section 2.4.4.
The Covercrypt library implementation [22] iterates through all available decryption keys and then, in an inner loop, through all available key encapsulations. Since the order of both keys and encapsulations is randomized before the loops commence, the resulting expected computation time is also randomized.
Each key decapsulation involves two sequential steps: the check phase and the final decapsulation phase, as outlined in Section 2.3.4. The approximate time values for these phases, based on this benchmark, are approximately 6450 μs for the check phase and 12,726 μs for the final decapsulation phase for classical. For post-quantum, the values are 8192 μs and 12,859 μs, respectively. The approach for ciphertext decapsulation requires the user to check each of their issued rights’ keys against every encapsulated key. The Expected Value of Checks ( E V checks ) required before finding the first fitting key is given by the following expression, derived from the randomized selection process:
E V checks = | R ( P ) | · E V checked_wrong_encapsulations + E V checked_rights_with_correct_key = | R ( P ) | · n enc + 1 L + 1 1 + | R ( P ) | + 1 2 = | R ( P ) | · n enc L L + 1 + | R ( P ) | + 1 2 ,
where
  • | R ( P ) | is the number of rights (keys) that the user possesses that are not the correct key for decapsulation;
  • n enc is the total number of key encapsulations attached in the ciphertext;
  • L is the number of keys that the user possesses that can be used to decapsulate any of the available encapsulations.
The total decryption time can thus be estimated by multiplying the E V checks value by the average time taken for the check phase. Example time values obtained from the benchmark, presented as an average of 100 runs for each policy length under the condition n enc = L , are detailed in Table 13.
In contrast to the iterative approach of Covercrypt, the CIRCL scheme requires the recipient to first verify whether their attributes satisfy the ciphertext policy. Upon successful verification, the decryption attempt proceeds, typically resulting in only one successful decryption operation.
Since the duration of the CIRCL decryption process is dependent on the cryptographic operations related to the policy complexity (i.e., the number of attributes or gates involved), its duration is primarily determined by the policy length. The decryption results for CIRCL are also presented in Table 13.

3.9. Analysis of ABE Scheme Scalability in IoT

To determine the optimal cryptographic scheme for a specific Internet of Things (IoT) environment, a theoretical analysis of the complexity and scalability concerning key parameters is crucial. Both ciphertext-policy attribute-based encryption (CP-ABE, as implemented by CIRCL) and the key encapsulation mechanism with access control (KEMAC, as implemented by Covercrypt) must be evaluated based on their operational costs as a function of the system parameters.

3.9.1. Complexity Comparison: CIRCL vs. Covercrypt

The performance of attribute-based encryption schemes is typically measured by their computational and communication complexity, which depend on
  • The total number of attributes in the system, often represented as the size of the attribute universe N or the number of attribute axes m;
  • The number of attributes in a user’s secret key, | A U | ;
  • The complexity of the access policy | A | (e.g., number of logic gates in the linear secret sharing scheme (LSSS) matrix for CIRCL or the resulting number of rights for Covercrypt).
Brief analysis is presented in Table 14.

3.9.2. Inferred Scalability Thresholds

The analysis, combined with the raw benchmark results from the previous sections, establishes clear operational thresholds.
1.
Setup and MPK Size Threshold: Covercrypt’s exponential cost in the Setup phase and the resulting size of the MPK make it unsuitable for systems where the attribute universe ( Ω ) is large or dynamic (e.g., | Ω | > 100 ). This is the primary constraint.
2.
Communication Threshold: Covercrypt’s constant and small ciphertext overhead (especially 883 bytes for post-quantum mode for one conjunction policy) gives it a definitive advantage in environments defined by extreme bandwidth constraints.
3.
Decryption Speed Threshold: CIRCL’s faster decryption time (around 6633 μs vs. 20,034 μs for Covercrypt PQ) makes it preferable where low-latency data access is critical for the user experience, provided that the policy is not overly complex.
Based on these thresholds, the schemes are best suited for distinct military IoT operational environments. The decryption latency is the primary driver of energy consumption in battery-powered IoT nodes. The 300% faster decryption throughput demonstrated by CIRCL reduces the active CPU time per transaction, which is vital for the longevity of unattended ground sensors and soldier-worn devices. Conversely, the higher computational cost of Covercrypt PQ must be viewed as an unavoidable “security tax” to achieve quantum resilience in high-threat edge scenarios.

3.10. Special IoT Application Use Cases and Comparative Scenario Analysis

Two distinct special IoT operational scenarios to illustrate the trade-offs between the highly scalable pairing-based CP-ABE (CIRCL) and the bandwidth-efficient, quantum-safe KEMAC (Covercrypt) are defined.

3.10.1. Scenario I: Enterprise/Federated Network Access (CORP-NET)

This scenario represents the high-scale corporate and command-and-control backbone, characterized by large user bases, distributed trust domains, and standard high-throughput communication links.
  • Environment: Headquarters, military bases, high-capacity regional networks, and federated networks with allied nations.
  • Scale: ∼50,000 users/devices (servers, workstations, smart devices).
  • Attribute Space ( Ω ): Large. Example: 5 attribute axes, each with 5 values (Role, SecurityClearance, Department, Nationality, MissionStatus). Total Rights: | Ω | = ( 5 + 1 ) 5 = 7776 .
  • Critical Requirements: Scalability and Setup Efficiency. The key authority must be able to manage a large, frequently changing attribute universe without prohibitive time/storage costs. A minimal user key size ( | SK U | ) is required for mobile devices.
Suitability of the libraries for this scenario is presented in Table 15.
Conclusions for CORP-NET (Scenario I): CIRCL is the superior choice. Its fast, constant-time Setup and compact key sizes ensure the necessary scalability and manageability required for a large, enterprise-grade system, outweighing the benefits of Covercrypt’s post-quantum readiness in this specific context.

3.10.2. Scenario II: Tactical Edge Network (TEN)

This scenario represents the low-bandwidth, mission-critical networks at the extreme tactical edge, such as infantry platoons or vehicle formations. It is defined by severe communication constraints and the need for long-term security.
  • Environment: Dismounted soldiers, armored vehicles, tactical drones, and field command posts. Communication via constrained radio or satellite links.
  • Scale: ∼500 devices/users (small, isolated groups).
  • Attribute Space ( Ω ): Small and Narrow. Example: 3 attribute axes, each with 3 values (Unit Type, Command Level, Classification). Total Rights: | Ω | = ( 3 + 1 ) 3 = 64 .
  • Critical Requirements: Minimal Communication Overhead and Post-Quantum Security.
Suitability of the libraries for this scenario is presented in Table 16.
Conclusions for TEN (Scenario II): Covercrypt is the preferred choice. While its setup is slower than CIRCL’s, the absolute time is acceptable for a small attribute universe (<1 s). The constant, minimal ciphertext overhead and the inherent post-quantum security are paramount for constrained, high-threat tactical environments, making it the more effective cryptographic enabler for data-centric security at the edge. The measured ciphertext overhead of 883 bytes for Covercrypt PQ, compared to over 4000 bytes for CIRCL with six attributes, represents a critical operational advantage. In tactical environments utilizing narrowband IoT or legacy VHF/UHF radio links, where data rates are extremely limited, this four-times reduction directly improves the packet delivery ratios and reduces the probability of interception by shortening the transmission window.

4. Conclusions

This comparative performance analysis between the pairing-based CP-ABE scheme CIRCL and the hybrid post-quantum KEMAC Covercrypt provides critical insights for implementing data-centric security (DCS) across the diverse operational spectrum of military Internet of Things (IoT) environments. Our findings affirm that no single scheme offers a universal solution; rather, the optimal cryptographic choice is dictated by scenario-specific constraints related to scale, bandwidth, and security horizons. The quantitative findings reveal a critical dichotomy in the architectural suitability of these schemes. The pairing-based CIRCL implementation demonstrates superior scalability in dynamic environments, characterized by a constant-time master key setup phase ( O ( 1 ) ) and linear scalability with respect to user attributes. Conversely, the Covercrypt scheme, while offering robust post-quantum security and a constant ciphertext size—a decisive advantage for low-bandwidth tactical links—suffers from exponential setup complexity ( O ( | Ω | ) ) relative to the attribute universe size. This exponential cost renders Covercrypt operationally prohibitive for high-dimensional attribute spaces typical of large-scale coalition networks but ideal for the static, defined ontologies of tactical edge deployments. Node mobility and the “dynamic join-and-leave” behavior of tactical units require high agility from the key authority. CIRCL’s constant-time setup ( O ( 1 ) ) and efficient key issuance allow for the immediate onboarding of new coalition partners or retasked units. Covercrypt’s structural rigidity, caused by the exponential cost of modifying the attribute universe ( O ( | Ω | ) ), may limit its use in highly fluid scenarios where new mission-specific attributes must be introduced frequently. This report concludes that no single cryptographic primitive suffices for the entire spectrum of special IoT applications. Instead, a split-horizon deployment strategy is recommended: utilizing pairing-based CP-ABE for the scalable, dynamic operational core and deploying hybrid KEMAC solutions at the tactical edge, where bandwidth efficiency and quantum resilience are paramount. This synthesis provides a roadmap for network planners to balance the competing demands of computational latency, communication overhead, and long-term cryptographic assurance.
The fundamental performance disparity arises from the architectural differences in managing the attribute universe ( Ω ):
  • CIRCLexhibits superior scalability and agility for the key authority. Its constant O ( 1 ) complexity for the Setup phase and compact public parameters ( PP ) are essential in supporting a high-dimensional or rapidly evolving attribute space. Crucially, CIRCL’s architecture is inherently flexible, accommodating the frequent addition of new attributes in enterprise scenarios without requiring the costly and time-consuming recalculation of the central MPK .
  • Covercrypt’s exponential O ( | Ω | ) complexity for Setup is a severe bottleneck for large deployments, resulting in an unwieldy MPK (e.g., ∼98 MB for structure size n = 6 ). Furthermore, any change to the attribute universe—even adding a single new attribute or axis—necessitates the complete regeneration and distribution of the MPK , rendering it structurally rigid for broad enterprise adoption.
The data imply a rigid operational doctrine for Covercrypt. The exponential cost of setup means that attributes cannot be treated as tags. In a CIRCL system, a user might tag a document with “Date: 2025-11-22” and “Coordinates: 34.55,12.33”. In Covercrypt, creating attributes for every date or coordinate is impossible as it would explode the universe size. Covercrypt enforces coarser granularity in access control. Access must be defined by broad categories (Role, Region) rather than fine-grained metadata. The tsk (tracing secret key) mechanism in Covercrypt offers an operational advantage. In standard CP-ABE, keys are often shared anonymously. In Covercrypt, the mathematical embedding of the user identity within the key encapsulation allows for forensic attribution. This feature is critical for zero-trust architectures. It moves the trust boundary from “possession of the device” to “accountability of the actor”. Covercrypt natively supports hidden access policies. The ciphertext does not reveal who is allowed to read it (unless they can decrypt it). In contrast, standard CP-ABE (CIRCL) often includes the policy structure in plaintext (metadata) to allow the decryption algorithm to function. Hiding the policy prevents traffic analysis. An adversary capturing encrypted packets cannot distinguish between a “general broadcast” and a “top secret strike order”, preventing them from inferring imminent operations based on the target audience of the messages. It should be noted that a hidden access policy feature can be achieved in CP-ABE scenarios by using homomorphic encryption. In terms of runtime metrics, CIRCL demonstrated decryption throughput that was roughly 300% faster than in Covercrypt’s post-quantum mode, making it the clear choice for latency-sensitive applications. Conversely, Covercrypt’s design provides a significant advantage in terms of communication overhead, achieving a constant, minimal ciphertext size (∼883 bytes for PQ mode) compared to the growing, higher overhead of CIRCL (∼4083 bytes for 6 attributes).
The analysis leads to distinct recommendations for the two scenarios.
  • CIRCL for Scalability and Real-Time Control (CORP-NET): The classical pairing-based approach is optimal for high-scale, corporate, or federated networks (Scenario I). Its fast key generation and high decryption throughput are paramount in managing a large user base and ensuring a responsive experience. While lacking native post-quantum security (PQS), this vulnerability can be successfully mitigated by adopting PQS protocols for data transit within the high-bandwidth network backbone, effectively layering security without sacrificing performance.
  • Covercrypt for Communication Efficiency and PQS at the Edge (TEN): The KEMAC-based approach is ideally suited for tactical edge networks (Scenario II). The constant, minimal ciphertext overhead is a critical enabler for severely constrained radio links, offering a typical 4 × reduction in data transfer compared to CIRCL. Furthermore, its native hybrid Post-Quantum capabilities and policy privacy are non-negotiable in this high-threat environment. Relying on DCS encryption as the sole cryptographic barrier is crucial here, as introducing any additional protocols would overwhelm the already constrained bandwidth.
This comparative performance analysis confirms that no single cryptographic scheme provides a universal solution for the entire spectrum of IoT environments. Instead, the choice must be dictated by specific operational constraints related to the network scale, available bandwidth, and required security horizon.
It is important to acknowledge the inherent flexibility of the CP-ABE attribute definition, exemplified by the CIRCL implementation, which provides additional operational merits even for tactical networks. The creation of flexible attribute values allows for integration with real-time operational parameters.
  • User Revocation and Future Encryption: By concatenating attributes with precise timestamps, the system can effectively implement time-bound policies, enabling immediate user revocation (by withholding future keys) and allowing data senders to encrypt messages that can only be decrypted after a specific point in time.
  • Dynamic Policy Tagging: Attributes can be dynamically generated based on a device’s current state, such as its location (e.g., map grid coordinates) or operational status. This enables highly reactive access control, critical for emergency situations where data access must immediately align with dynamic, rapidly changing geographical contexts.
While the need for post-quantum security strongly encourages the adoption of schemes like Covercrypt, the current, prohibitive cost of its Setup phase severely restricts its practical utility in narrow, low-scale attribute universes typical of tactical deployments. For large-scale enterprise environments, CP-ABE schemes based on bilinear pairings (CIRCL) remain the more viable and agile choice until a comparably efficient post-quantum CP-ABE solution with constant-time Setup becomes widely available.
Based on the experimental results, the following guidance for system architects is proposed. For large-scale, dynamic enterprise networks, pairing-based CP-ABE is the recommended choice. Its constant-time setup and faster decryption throughput are essential in managing thousands of devices with minimal latency, outweighing the lack of native post-quantum resistance in high-bandwidth backbone environments. Conversely, for tactical edge networks characterized by severely constrained radio links and high threat levels, the hybrid KEMAC approach is the superior enabler for data-centric security. Despite its exponential setup complexity, Covercrypt’s constant and smaller ciphertext overhead is paramount for bandwidth conservation, while its native post-quantum security and hidden access policies are non-negotiable in protecting long-term military intelligence against emerging quantum threats.
Ultimately, a split-horizon deployment strategy is recommended: utilizing the scalability of CIRCL for the operational core and the communication efficiency and quantum resilience of Covercrypt for the tactical edge. A binary choice between CIRCL and Covercrypt is not the end of the road. Several emerging frameworks offer middle-ground solutions. The current study assumes a single key authority (KA), which is a single point of failure and a bottleneck. Future research should benchmark Lewko-Waters MA-ABE [40]. This allows different authorities (e.g., US-DoD, UK-MoD, NATO-HQ) to issue attributes independently. A user can decrypt data if they possess “US-TopSecret” AND “NATO-Mission-X”, without the US and NATO sharing their master keys. This is the “holy grail” for coalition interoperability. Pure Lattice ABE schemes (e.g., BGG+) should also be investigated. These offer full quantum resistance for both the key and the policy logic but historically suffer from massive key sizes (megabytes). Benchmarking these on modern hardware would determine their viability for the considered scenarios.

Author Contributions

Conceptualization, K.K. and Z.Z.; data curation, Ł.P.; methodology, Ł.P.; resources, Ł.P.; software, Ł.P.; supervision, K.K. and Z.Z.; visualization, Ł.P. and Z.Z.; writing—original draft, Ł.P.; writing—review and editing, Ł.P., K.K. and Z.Z. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Data Availability Statement

Data are contained within the article.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Suri, N.; Zielinski, Z.; Tortonesi, M.; Fuchs, C.; Pradhan, M.; Wrona, K.; Furtak, J.; Vasilache, D.B.; Street, M.; Pellegrini, V.; et al. Exploiting smart city IoT for disaster recovery operations. In Proceedings of the 2018 IEEE 4th World Forum on Internet of Things (WF-IoT), Singapore, 5–8 February 2018; pp. 458–463. [Google Scholar] [CrossRef]
  2. Munir, A.; Aved, A.; Blasch, E. Situational Awareness: Techniques, Challenges, and Prospects. AI 2022, 3, 55–77. [Google Scholar] [CrossRef]
  3. Chmielewski, M.; Kukiełka, M.; Frąszczak, D.; Bugajewski, D. Military and Crisis Management Decision Support Tools for Situation Awareness Development Using Sensor Data Fusion. In Information Systems Architecture and Technology: Proceedings of 38th International Conference on Information Systems Architecture and Technology—ISAT 2017; Świątek, J., Borzemski, L., Wilimowska, Z., Eds.; Springer: Cham, Switzerland, 2018; pp. 189–199. [Google Scholar]
  4. Pasdar, A.; Koroniotis, N.; Keshk, M.; Moustafa, N.; Tari, Z. Cybersecurity Solutions and Techniques for Internet of Things Integration in Combat Systems. IEEE Trans. Sustain. Comput. 2025, 10, 345–365. [Google Scholar] [CrossRef]
  5. Bout, E.; Loscri, V.; Gallais, A. How Machine Learning Changes the Nature of Cyberattacks on IoT Networks: A Survey. IEEE Commun. Surv. Tutor. 2022, 24, 248–279. [Google Scholar] [CrossRef]
  6. Ambrosin, M.; Anzanpour, A.; Conti, M.; Dargahi, T.; Moosavi, S.R.; Rahmani, A.M.; Liljeberg, P. On the feasibility of attribute-based encryption on internet of things devices. IEEE Micro 2016, 36, 25–35. [Google Scholar] [CrossRef]
  7. Pióro, L.; Sychowiec, J.; Kanciak, K.; Zieliński, Z. Application of Attribute-Based Encryption in Military Internet of Things Environment. Sensors 2024, 24, 5863. [Google Scholar] [CrossRef] [PubMed]
  8. Szczegielniak-Rekiel, A.; Kanciak, K.; Kelner, J.M. Zero-Knowledge Proof in 5G and Beyond Technologies: State of the Arts, Practical Aspects, Applications, Security Issues, Open Challenges, and Future Trends. IEEE Access 2025, 13, 138352–138380. [Google Scholar] [CrossRef]
  9. Zaidi, S.Y.A.; Shah, M.A.; Khattak, H.A.; Maple, C.; Rauf, H.T.; El-Sherbeeny, A.M.; El-Meligy, M.A. An Attribute-Based Access Control for IoT Using Blockchain and Smart Contracts. Sustainability 2021, 13, 10556. [Google Scholar] [CrossRef]
  10. Rouhani, S.; Belchior, R.; Cruz, R.S.; Deters, R. Distributed attribute-based access control system using permissioned blockchain. World Wide Web 2021, 24, 1617–1644. [Google Scholar] [CrossRef]
  11. Bhatt, S.; Pham, T.K.; Gupta, M.; Benson, J.; Park, J.; Sandhu, R. Attribute-based access control for AWS internet of things and secure industries of the future. IEEE Access 2021, 9, 107200–107223. [Google Scholar] [CrossRef]
  12. Bethencourt, J.; Sahai, A.; Waters, B. Ciphertext-policy attribute-based encryption. In Proceedings of the 2007 IEEE Symposium on Security and Privacy (SP’07), Berkeley, CA, USA, 20–23 May 2007; IEEE: Piscataway, NJ, USA, 2007; pp. 321–334. [Google Scholar]
  13. Johnsen, F.T.; Zieliński, Z.; Wrona, K.; Suri, N.; Fuchs, C.; Pradhan, M.; Furtak, J.; Vasilache, B.; Pellegrini, V.; Dyk, M.; et al. Application of IoT in military operations in a smart city. In Proceedings of the 2018 International Conference on Military Communications and Information Systems (ICMCIS), Warsaw, Poland, 22–23 May 2018; IEEE: Piscataway, NJ, USA, 2018; pp. 1–8. [Google Scholar]
  14. Cha, S.; Baek, S.; Kang, S.; Kim, S. Security evaluation framework for military IoT devices. Secur. Commun. Netw. 2018, 2018, 6135845. [Google Scholar] [CrossRef]
  15. Hu, V.C.; Ferraiolo, D.F.; Chandramouli, R.; Kuhn, D.R. Attribute-Based Access Control; Artech House: Norwood, MA, USA, 2017. [Google Scholar]
  16. Celesti, A.; Fazio, M.; Giacobbe, M.; Puliafito, A.; Villari, M. Characterizing cloud federation in IoT. In Proceedings of the 2016 30th International Conference on Advanced Information Networking and Applications Workshops (WAINA), Crans-Montana, Switzerland, 23–25 March 2016; IEEE: Piscataway, NJ, USA, 2016; pp. 93–98. [Google Scholar]
  17. Pradhan, M.; Noll, J. Security, privacy, and dependability evaluation in verification and validation life cycles for military IoT systems. IEEE Commun. Mag. 2020, 58, 14–20. [Google Scholar] [CrossRef]
  18. Arora, A.S.; Raja, L.; Bahl, B. Data centric security approach: A way to achieve security & privacy in cloud computing. In Proceedings of the 3rd International Conference on Internet of Things and Connected Technologies (ICIoTCT), Jaipur, India, 26–27 March 2018; pp. 26–27. [Google Scholar]
  19. Wrona, K. Securing the Internet of Things: A Military Perspective. In Proceedings of the 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT), Milan, Italy, 14–16 December 2015; pp. 502–507. [Google Scholar] [CrossRef]
  20. Brézot, T.; de Perthuis, P.; Pointcheval, D. Covercrypt: An Efficient Early-Abort KEM for Hidden Access Policies with Traceability from the DDH and LWE. In European Symposium on Research in Computer Security; Springer: Cham, Switzerland, 2023. [Google Scholar]
  21. Khandla, D.; Shahy, H.; Bz, M.K.; Pais, A.R.; Raj, N. Expressive CP-ABE Scheme Satisfying Constant-Size Keys and Ciphertexts. Cryptol. Eprint Arch. 2019, 1257. [Google Scholar]
  22. Cosmian. Cosmian/Cover_CRYPT: Implementation of the Covercrypt Attribute-Based KEMAC. 2025. Available online: https://github.com/Cosmian/cover_crypt (accessed on 16 July 2025).
  23. de la Piedra, A.; Venema, M.; Alpár, G. ABE Squared: Accurately Benchmarking Efficiency of Attribute-Based Encryption. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022, 2022, 192–239. [Google Scholar] [CrossRef]
  24. Venema, M. Attaining Basically Everything in Attribute-Based Encryption. Ph.D. Thesis, University of Groningen, Groningen, The Netherlands, 2023. [Google Scholar]
  25. Bayuk, J. Data-centric security. Comput. Fraud. Secur. 2009, 2009, 7–11. [Google Scholar] [CrossRef]
  26. Wrona, K. Towards Data-Centric Security for NATO Operations. In Proceedings of the Digital Transformation, Cyber Security and Resilience; Tagarev, T., Stoianov, N., Eds.; Springer: Cham, Switzerland, 2024; pp. 75–92. [Google Scholar]
  27. Fagan, M.; Marron, J.; Souppaya, M.; Watrobski, P.; Kent, K.; Mulugeta, B.; Symington, S. Towards Automating IoT Security: Implementing Trusted Network-Layer Onboarding; NIST Cybersecurity White Papers (CSWP); National Institute of Standards and Technology: Gaithersburg, MD, USA, 2025.
  28. Mosteiro-Sanchez, A.; Barcelo, M.; Astorga, J.; Urbieta, A. Too Many Options: A Survey of ABE Libraries for Developers. arXiv 2022, arXiv:2209.12742. [Google Scholar] [CrossRef]
  29. National Institute of Standards and Technology (NIST). Guide to Attribute Based Access Control (ABAC) Definition and Considerations; NIST SP Special Publication 800-162; NIST: Gaithersburg, MD, USA, 2014.
  30. Bernstein, D.J.; Lange, T. Post-quantum cryptography. Nature 2017, 549, 188–194. [Google Scholar] [CrossRef] [PubMed]
  31. Alagic, G.; Apon, D.; Cooper, D.; Dang, Q.; Dang, T.; Kelsey, J.; Lichtinger, J.; Liu, Y.K.; Miller, C.; Moody, D.; et al. Status Report on the Third Round of the NIST Post-Quantum Cryptography Standardization Process; NIST Internal Report NISTIR 8413; NIST: Gaithersburg, MD, USA, 2022.
  32. European Telecommunications Standards Institute (ETSI). Efficient Quantum-Safe Hybrid Key Exchanges with Hidden Access Policies; ETSI: Sophia Antipolis, France, 2025. [Google Scholar]
  33. National Institute of Standards and Technology. FIPS 203: Module-Lattice-Based Key-Encapsulation Mechanism Standard; Technical Report; NIST: Gaithersburg, MD, USA, 2024. [CrossRef]
  34. Brézot, T.; Hébant, C.; de Perthuis, P.; Pointcheval, D. Security Analysis of Covercrypt: A Quantum-Safe Hybrid Key Encapsulation Mechanism for Hidden Access Policies. In European Symposium on Research in Computer Security; Springer: Cham, Switzerland, 2025. [Google Scholar]
  35. Tomida, J.; Kawahara, Y.; Nishimaki, R. Fast, Compact, and Expressive Attribute-Based Encryption. Cryptol. ePrint Arch. 2019, 966. [Google Scholar]
  36. CIRCL: Cloudflare Interoperable, Reusable Cryptographic Library. Implements CP-ABE on BLS12-381; Optimized Pairing Routines. 2019. Available online: https://github.com/cloudflare/circl (accessed on 4 November 2025).
  37. Wang, X.; Zhang, J.; Schooler, E.M.; Ion, M. Performance evaluation of Attribute-Based Encryption: Toward data privacy in the IoT. In Proceedings of the 2014 IEEE International Conference on Communications (ICC), Sydney, NSW, Australia, 10–14 June 2014; pp. 725–730. [Google Scholar] [CrossRef]
  38. Perazzo, P.; Righetti, F.; La Manna, M.; Vallati, C. Performance evaluation of Attribute-Based Encryption on constrained IoT devices. Comput. Commun. 2021, 170, 151–163. [Google Scholar] [CrossRef]
  39. Shruti; Rani, S.; Sah, D.K.; Gianini, G. Attribute-Based Encryption Schemes for Next Generation Wireless IoT Networks: A Comprehensive Survey. Sensors 2023, 23, 5921. [Google Scholar] [CrossRef] [PubMed]
  40. Lewko, A.; Waters, B. Decentralizing Attribute-Based Encryption. In Proceedings of the Advances in Cryptology–EUROCRYPT 2011, Tallinn, Estonia, 15–19 May 2011; Paterson, K.G., Ed.; Springer: Berlin/Heidelberg, Germany, 2011; pp. 568–588. [Google Scholar]
Figure 1. Master key generation time in relation to Ω size for Covercrypt with classical and post-quantum approaches.
Figure 1. Master key generation time in relation to Ω size for Covercrypt with classical and post-quantum approaches.
Electronics 15 00697 g001
Figure 2. Public key size in relation to Ω size for Covercrypt with classical and post-quantum approaches.
Figure 2. Public key size in relation to Ω size for Covercrypt with classical and post-quantum approaches.
Electronics 15 00697 g002
Figure 3. User key generation time in relation to user policy length and structure size for Covercrypt with classical approach for conjunction.
Figure 3. User key generation time in relation to user policy length and structure size for Covercrypt with classical approach for conjunction.
Electronics 15 00697 g003
Figure 4. User key generation time in relation to user policy length and structure size for Covercrypt with post-quantum approach for conjunction.
Figure 4. User key generation time in relation to user policy length and structure size for Covercrypt with post-quantum approach for conjunction.
Electronics 15 00697 g004
Figure 5. User key generation time in relation to user policy length and structure size for Covercrypt with classical approach for alternative.
Figure 5. User key generation time in relation to user policy length and structure size for Covercrypt with classical approach for alternative.
Electronics 15 00697 g005
Figure 6. User key generation time in relation to user policy length and structure size for Covercrypt with post-quantum approach for alternative.
Figure 6. User key generation time in relation to user policy length and structure size for Covercrypt with post-quantum approach for alternative.
Electronics 15 00697 g006
Figure 7. User key generation time in relation to user policy length and structure size—comparison for best and worst cases of classical Covercrypt and CIRCL.
Figure 7. User key generation time in relation to user policy length and structure size—comparison for best and worst cases of classical Covercrypt and CIRCL.
Electronics 15 00697 g007
Figure 8. User key generation time in relation to user policy length and structure size—comparison for best and worst cases of post-quantum Covercrypt and CIRCL.
Figure 8. User key generation time in relation to user policy length and structure size—comparison for best and worst cases of post-quantum Covercrypt and CIRCL.
Electronics 15 00697 g008
Table 1. Security comparison of CIRCL and Covercrypt.
Table 1. Security comparison of CIRCL and Covercrypt.
Security MetricCIRCL (tkn20)Covercrypt (KEMAC)
Primary AssumptionDecisional Bilinear Diffie–Hellman (DBDH) over pairings [35]Hybrid: elliptic curve (ECC) + Lattice-based (LWE) [20,32]
Quantum ResistanceNo (vulnerable to Shor’s algorithm) [30]Yes (hybrid PQC via ML-KEM/Kyber) [32,33]
Provable SecurityIND-CCA2 [35]IND-CCA (hybrid model analysis) [34]
Policy PrivacyPublic metadata (LSSS Matrix) [36]Hidden access policies (KEMAC header) [20,32]
Identity TraceabilityNone (anonymity by design) [36]Native (via TKEM mechanism) [20,34]
Table 2. Desktop system specifications used for conducting experiments.
Table 2. Desktop system specifications used for conducting experiments.
ComponentDescription
ProcessorIntel i5-13600KF @ 3.5 GHz
RAM32 GB
Operating systemUbuntu 24.04 WSL (Windows 11 host)
CIRCL library versionCIRCL v1.6.1
Covercrypt library versionCovercrypt v15.0.0
Table 3. Master key generation time in relation to Ω size for Covercrypt with classical and post-quantum approaches.
Table 3. Master key generation time in relation to Ω size for Covercrypt with classical and post-quantum approaches.
Structure SizeMaster Key Generation Time (Classical, μs)Master Key Generation Time (Post-Quantum, μs)
112,82725,684
257,15266,579
3398,813480,034
43,918,2264,680,156
549,437,58058,380,727
6749,772,390888,053,063
Table 4. Master key generation size in relation to Ω size for Covercrypt with classical and post-quantum approaches.
Table 4. Master key generation size in relation to Ω size for Covercrypt with classical and post-quantum approaches.
Structure SizePublic Key Size (Classical, Bytes)Public Key Size (Post-Quantum, Bytes)
1152953
24326833
3248152,882
423,472522,675
5297,0846,517,084
64,605,51398,723,913
Table 5. Time of user key generation with respect to structure and user policy sizes for classical and post-quantum approaches for conjunction.
Table 5. Time of user key generation with respect to structure and user policy sizes for classical and post-quantum approaches for conjunction.
Structure SizeUser Policy AttributesTime (Classical Conj., μs)Time (PQ Conj., μs)
11244622
212652201
22511656
3150612,406
23606336
33083097
41227999,779
2100941,746
355416,071
43506118
5123,8301,028,325
28325342,224
32706113,578
4105137,730
554012,560
61326,47413,475,799
290,5373,823,178
324,7051,108,539
47446313,978
5224788,200
6101025,399
Table 6. Time of user key generation with respect to structure and user policy sizes for classical and post-quantum approaches for alternative.
Table 6. Time of user key generation with respect to structure and user policy sizes for classical and post-quantum approaches for alternative.
Structure SizeUser Policy AttributesTime (Classical Alt., μs)Time (PQ Alt., μs)
11256704
212852367
23083231
3154813,230
268119,382
383122,679
412360104,845
24351163,890
35008202,349
45801225,374
5123,8041,051,628
241,1391,730,335
355,4452,170,905
465,0952,553,004
576,6532,748,792
61332,13813,586,972
2621,24423,135,262
3835,96130,117,274
4985,81535,578,373
51,194,36338,712,912
61,311,40341,207,026
Table 7. Private key generation time in relation to policy length in CIRCL.
Table 7. Private key generation time in relation to policy length in CIRCL.
Policy LengthUser Key Generation Time (μs)—ConjunctionUser Key Generation Time (μs)—Alternative
119,95519,988
227,17927,226
334,85534,386
440,79841,536
549,76048,036
655,60354,899
Table 8. User secret key (USK) size in bytes with respect to structure and user policy sizes for classical and post-quantum approaches for conjunction structure.
Table 8. User secret key (USK) size in bytes with respect to structure and user policy sizes for classical and post-quantum approaches for conjunction structure.
Structure SizeUser Policy AttributesUser Key Size (Classical Conj., Bytes)User Key Size (PQ Conj., Bytes)
112341866
213808540
23075203
31134751,939
275125,231
345511,879
419639416,007
23923165,491
3165565,303
475525,235
51100,8204,329,332
233,4281,441,844
311,156479,540
43795158,835
5136351,955
611,337,52256,193,938
2378,83616,050,932
3107,3764,583,952
430,5161,308,372
58756372,692
62595105,411
Table 9. User key size in bytes with respect to structure and user policy sizes for classical and post-quantum approaches for alternative.
Table 9. User key size in bytes with respect to structure and user policy sizes for classical and post-quantum approaches for alternative.
Structure SizeUser Policy AttributesUser Key Size (Classical Alt., Bytes)User Key Size (PQ Alt., Bytes)
112341866
213808540
245311,877
31134751,939
2194378,647
3224392,003
419639416,007
215,354666,522
318,801816,849
420,880907,056
51100,8204,329,332
2168,2127,216,820
3213,3329,142,004
4243,54010,425,588
5263,76411,281,396
611,337,52256,193,938
22,296,20796,336,943
32,983,432125,012,968
43,476,057145,497,593
53,829,182160,130,718
64,082,307170,583,843
Table 10. Private key sizes in relation to policy length in CIRCL.
Table 10. Private key sizes in relation to policy length in CIRCL.
Policy LengthUser Key Size (Bytes)—ConjunctionUser Key Size (Bytes)—Alternative
123472347
227782778
332093209
436403640
540714071
645024502
Table 11. Encryption time in relation to policy length in CIRCL and Covercrypt.
Table 11. Encryption time in relation to policy length in CIRCL and Covercrypt.
Policy LengthEncryption Time in CIRCL (μs)Encryption Time in Covercrypt Classic (Conj., μs)Encryption Time in Covercrypt Post-Quantum (Conj., μs)Encryption Time in Covercrypt Classic (Alt., μs)Encryption Time in Covercrypt Post-Quantum (Alt., μs)
114,88418,63920,91320,17721,910
218,03018,51020,92826,40231,836
321,46918,70120,81833,95737,297
424,93618,85120,77039,97044,413
528,73118,83520,80246,15553,799
632,31018,83720,59752,85861,747
Table 12. Encryption overhead in relation to policy length in CIRCL and Covercrypt.
Table 12. Encryption overhead in relation to policy length in CIRCL and Covercrypt.
Policy LengthEncryption Overhead in CIRCL (Bytes)Encryption Overhead in Covercrypt Classic (Conj., Bytes)Encryption Overhead in Covercrypt Post-Quantum (Conj., Bytes)Encryption Overhead in Covercrypt Classic (Alt., Bytes)Encryption Overhead in Covercrypt Post-Quantum (Alt., Bytes)
12343115883115883
226911158831471683
330391158831792483
433871158832113283
537351158832434083
640831158832754883
Table 13. Example decryption times in relation to policy length in CIRCL and Covercrypt.
Table 13. Example decryption times in relation to policy length in CIRCL and Covercrypt.
Policy LengthDecryption Time in CIRCL (μs)Decryption Time in Covercrypt Classic (μs)—ConjunctionDecryption Time in Covercrypt Post-Quantum (μs)—ConjunctionDecryption Time in Covercrypt Classic (μs)—AlternativeDecryption Time in Covercrypt Post-Quantum (μs)—Alternative
1564035,67033,75736,22033,834
2581040,61441,57552,65057,114
3654552,22256,449201,293266,168
4621381,95685,3391,630,6972,207,979
Table 14. Theoretical complexity comparison of CP-ABE (CIRCL) and KEMAC (Covercrypt).
Table 14. Theoretical complexity comparison of CP-ABE (CIRCL) and KEMAC (Covercrypt).
Operation MetricCIRCL (Pairing-Based CP-ABE)Covercrypt (Hybrid KEMAC)Implications for Scalability
Master Key Setup TimeConstant O ( 1 ) Exponential O ( | Ω | ) , where | Ω | = ( Axis Size ) CIRCL is vastly superior for large, high-dimensional attribute spaces.
Master Key Size ( MPK )Constant (small) O ( 1 ) Exponential O ( | Ω | ) Covercrypt is impractical for centralized key authorities with many axes.
User Key Gen. Time ( KeyGen )Linear O ( | A U | ) Exponential O ( | S K U | ) due to policy expansion into rightsCIRCL scales better with the number of attributes assigned to a user.
Ciphertext Size ( | C | )Linear O ( | A | ) Constant O ( 1 ) (dependent only on KEM size)Covercrypt minimizes communication overhead, crucial for low-bandwidth links.
Decryption TimeLinear O ( | A | ) (one pairing computation)Linear O ( | S K U | ) (iterative KEM decapsulation + early abort)CIRCL is typically faster as it performs a single, optimized pairing operation.
Table 15. CIRCL and Covercrypt comparison for Scenario I.
Table 15. CIRCL and Covercrypt comparison for Scenario I.
MetricCIRCLCovercrypt (PQ)Suitability for Scenario I
Setup Cost ( | Ω | = 7776 )∼6 ms ( O ( 1 ) )∼53 s (exponential O ( | Ω | ) )CIRCL is essential. Covercrypt’s 53 s setup time and resulting ∼6.5 MB public key is already challenging for a dynamic system.
User Key Size (5 attributes)∼4 KB (small)Depending on attribute number and policy construction, between 50 KB and 160 MB large CIRCL is preferred. Easier distribution and storage at thousands of endpoints.
Decryption Time∼6.6 ms (fast)∼20 ms (slower)CIRCL is preferred. Ensures low-latency access to enterprise resources for a large user base.
Table 16. CIRCL and Covercrypt comparison for Scenario II.
Table 16. CIRCL and Covercrypt comparison for Scenario II.
MetricCIRCLCovercrypt (PQ)Suitability for Scenario II
Setup Cost ( | Ω | = 64 )∼6 ms∼0.5 s (acceptable)Both acceptable.
Ciphertext Overhead (6 attributes)∼4083 B (growing)∼883 B (constant)Covercrypt is preferred. Reduced data transfer (over 4 × less overhead) is vital for low-bandwidth radio links.
Security ModelClassical ABEHybrid post-quantumCovercrypt is preferred. Essential for protecting long-term military intelligence against quantum threats.
Policy PrivacyPublic H i d d e n Covercrypt is preferred. Prevents adversaries from inferring data sensitivity by reading the policy tag.
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Pióro, Ł.; Kanciak, K.; Zieliński, Z. Comparative Analysis of Attribute-Based Encryption Schemes for Special Internet of Things Applications. Electronics 2026, 15, 697. https://doi.org/10.3390/electronics15030697

AMA Style

Pióro Ł, Kanciak K, Zieliński Z. Comparative Analysis of Attribute-Based Encryption Schemes for Special Internet of Things Applications. Electronics. 2026; 15(3):697. https://doi.org/10.3390/electronics15030697

Chicago/Turabian Style

Pióro, Łukasz, Krzysztof Kanciak, and Zbigniew Zieliński. 2026. "Comparative Analysis of Attribute-Based Encryption Schemes for Special Internet of Things Applications" Electronics 15, no. 3: 697. https://doi.org/10.3390/electronics15030697

APA Style

Pióro, Ł., Kanciak, K., & Zieliński, Z. (2026). Comparative Analysis of Attribute-Based Encryption Schemes for Special Internet of Things Applications. Electronics, 15(3), 697. https://doi.org/10.3390/electronics15030697

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop