Decentralized Multi-authority ABE for NC1 from BDH

被引:0
作者
Datta, Pratish [1 ]
Komargodski, Ilan [1 ,2 ]
Waters, Brent [1 ,3 ]
机构
[1] NTT Res, Sunnyvale, CA 94085 USA
[2] Hebrew Univ Jerusalem, Jerusalem, Israel
[3] UT Austin, Austin, TX USA
关键词
attribute-based encryption; decentralized; multi-authority; bilinear pairings; bilinear Diffie-Hellman; ATTRIBUTE-BASED ENCRYPTION; DUAL SYSTEM ENCRYPTION; PRIME-ORDER GROUPS; FUNCTIONAL ENCRYPTION; SECURE; HIBE;
D O I
10.1007/s00145-023-09445-7
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Decentralized multi-authority attribute-based encryption (MA-ABE) is a strengthening of standard ciphertext-policy attribute-based encryption so that there is no trusted central authority: Any party can become an authority and there is no requirement for any global coordination other than the creation of an initial set of common reference parameters. Essentially, any party can act as an authority for some attribute by creating a public key of its own and issuing private keys to different users that reflect their attributes. This paper presents the first MA-ABE proven secure under the standard search variant of bilinear Diffie-Hellman (CBDH) and in the random oracle model. Our scheme supports all access policies captured by NC1 circuits. All previous constructions were proven secure in the random oracle model and additionally were based on decision assumptions such as the DLIN assumption, non-standard q-type assumptions, or subspace decision assumptions over composite-order bilinear groups.
引用
收藏
页数:31
相关论文
共 82 条
[11]   Dual System Encryption Framework in Prime-Order Groups via Computational Pair Encodings [J].
Attrapadung, Nuttapong .
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2016, PT II, 2016, 10032 :591-623
[12]  
Attrapadung N, 2014, LECT NOTES COMPUT SC, V8441, P557, DOI 10.1007/978-3-642-55220-5_31
[13]  
Attrapadung N, 2011, LECT NOTES COMPUT SC, V6571, P90, DOI 10.1007/978-3-642-19379-8_6
[14]  
Barbulescu R, 2014, LECT NOTES COMPUT SC, V8441, P1, DOI 10.1007/978-3-642-55220-5_1
[15]  
BENALOH J, 1990, LECT NOTES COMPUT SC, V403, P27
[16]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[17]   Short group signatures [J].
Boneh, D ;
Boyen, X ;
Shacham, H .
ADVANCES IN CRYPTOLOGY - CRYPTO 2004, PROCEEDINGS, 2004, 3152 :41-55
[18]   Identity-based encryption from the Weil pairing [J].
Boneh, D ;
Franklin, M .
SIAM JOURNAL ON COMPUTING, 2003, 32 (03) :586-615
[19]  
Boneh D, 2014, LECT NOTES COMPUT SC, V8441, P533, DOI 10.1007/978-3-642-55220-5_30
[20]  
Boyen X, 2013, LECT NOTES COMPUT SC, V7785, P122, DOI 10.1007/978-3-642-36594-2_8