Ciphertext-Delegatable CP-ABE for a Dynamic Credential: A Modular Approach

被引:10
作者
Kim, Jongkil [1 ]
Susilo, Willy [1 ]
Baek, Joonsang [1 ]
Nepal, Surya [2 ]
Liu, Dongxi [2 ]
机构
[1] Univ Wollongong, Sch Comp & Informat Technol, Wollongong, NSW, Australia
[2] Commonwealth Sci & Ind Res Org, Data61, Marsfield, Australia
来源
INFORMATION SECURITY AND PRIVACY, ACISP 2019 | 2019年 / 11547卷
关键词
Ciphertext-delegation; Revocation; Attribute-based Encryption; Dynamic access control; ATTRIBUTE-BASED ENCRYPTION; REVOCATION;
D O I
10.1007/978-3-030-21548-4_1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We introduce a new technique converting Ciphertext-policy Attribute-based Encryption (CP-ABE) to Ciphertext-delegatable CP-ABE (CD-CP-ABE). Ciphertext delegation is an important technique to deal with dynamic credentials, which enable users to be joined and revoked at any time while the system is operating. The delegation of CD-CP-ABE allows third parties such as cloud or proxy servers to convert a ciphertext to the other one with a more restrictive policy. Therefore, it can be used to revoke users dynamically in an access control system. Prior to our work, a delegation algorithm of CD-CP-ABE is not generic and the completeness of the delegation is shown when the size of the delegated access structure increases quadratically with the sizes of original and revocation access structures. In this paper, we provide a generic delegation algorithm to reform CP-ABE to CD-CP-ABE. We generalize properties necessary for the ciphertext delegation using the syntax of encodings for the modularity and construct a generic delegation algorithm based on those properties. In our new technique, we build the delegated access structures, which generally determines the size of the ciphertext, in a defined way. The size of delegated access structures grows only linearly with those of original and revocation access structures. Through presenting instances, we show that our technique is readily applicable to existing CP-ABE schemes including CP-ABE scheme with non-monotonic access structures.
引用
收藏
页码:3 / 20
页数:18
相关论文
共 25 条
[1]   Generalized Key Delegation for Wildcarded Identity-Based and Inner-Product Encryption [J].
Abdalla, Michel ;
De Caro, Angelo ;
Duong Hieu Phan .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (06) :1695-1706
[2]   Wildcarded Identity-Based Encryption [J].
Abdalla, Michel ;
Birkett, James ;
Catalano, Dario ;
Dent, Alexander W. ;
Malone-Lee, John ;
Neven, Gregory ;
Schuldt, Jacob C. N. ;
Smart, Nigel P. .
JOURNAL OF CRYPTOLOGY, 2011, 24 (01) :42-82
[3]  
[Anonymous], 1996, SECURE SCHEMES SECRE
[4]  
Attrapadung Nuttapong, 2015, Topics in Cryptology - CT-RSA 2015. The Cryptographers' Track at the RSA Conference 2015. Proceedings: LNCS 9048, P87, DOI 10.1007/978-3-319-16715-2_5
[5]  
Attrapadung N, 2014, LECT NOTES COMPUT SC, V8441, P557, DOI 10.1007/978-3-642-55220-5_31
[6]  
Attrapadung N, 2009, LECT NOTES COMPUT SC, V5921, P278, DOI 10.1007/978-3-642-10868-6_17
[7]  
Attrapadung N, 2009, LECT NOTES COMPUT SC, V5671, P248, DOI 10.1007/978-3-642-03298-1_16
[8]   Hierarchical identity based encryption with constant size ciphertext [J].
Boneh, D ;
Boyen, X ;
Goh, EJ .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2005,PROCEEDINGS, 2005, 3494 :440-456
[9]  
Fiat A., 1993, LNCS, P480, DOI [DOI 10.1007/3-540-48329-240, DOI 10.1007/3-540-48329-2]
[10]  
Goodrich MT, 2004, LECT NOTES COMPUT SC, V3152, P511