Decentralized Policy-Hiding ABE with Receiver Privacy

被引:27
作者
Michalevsky, Yan [1 ,2 ]
Joye, Marc [3 ]
机构
[1] Anjuna Secur, Palo Alto, CA 94306 USA
[2] Stanford Univ, Stanford, CA 94305 USA
[3] NXP Semicond, San Jose, CA USA
来源
COMPUTER SECURITY (ESORICS 2018), PT II | 2018年 / 11099卷
关键词
D O I
10.1007/978-3-319-98989-1_27
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Attribute-based encryption (ABE) enables limiting access to encrypted data to users with certain attributes. Different aspects of ABE were studied, such as the multi-authority setting (MA-ABE), and policy hiding, meaning the access policy is unknown to unauthorized parties. However, no practical scheme so far provably provides both properties, which are often desirable in real-world applications: supporting decentralization while hiding the access policy. We present the first practical decentralized ABE scheme with a proof of being policy-hiding. Our construction is based on a decentralized inner-product predicate encryption scheme, introduced in this paper, which hides the encryption policy. It results in an ABE scheme supporting conjunctions, disjunctions and threshold policies, that protects the access policy from parties that are not authorized to decrypt the content. Further, we address the issue of receiver privacy. By using our scheme in combination with vector commitments, we hide the overall set of attributes possessed by the receiver from individual authorities, only revealing the attribute that the authority is controlling. Finally, we propose randomizing-polynomial encodings that immunize the scheme in the presence of corrupt authorities.
引用
收藏
页码:548 / 567
页数:20
相关论文
共 27 条
[1]  
Agrawal S, 2011, LECT NOTES COMPUT SC, V7073, P21, DOI 10.1007/978-3-642-25385-0_2
[2]  
Agrawal S, 2012, LECT NOTES COMPUT SC, V7293, P280, DOI 10.1007/978-3-642-30057-8_17
[3]   Verified Computational Differential Privacy with Applications to Smart Metering [J].
Barthe, Gilles ;
Danezis, George ;
Gregoire, Benjamin ;
Kunz, Cesar ;
Zanella-Beguelin, Santiago .
2013 IEEE 26TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2013, :287-301
[4]  
Benaloh J., 1994, Advances in Cryptology - EUROCRYPT '93. Workshop on the Theory and Application of Cryptographic Techniques Proceedings, P274
[5]   A New Framework for Privacy-Preserving Aggregation of Time-Series Data [J].
Benhamouda, Fabrice ;
Joye, Marc ;
Libert, Benoit .
ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2016, 18 (03)
[6]  
Boneh D, 2007, LECT NOTES COMPUT SC, V4392, P535
[7]  
Boneh D, 2011, LECT NOTES COMPUT SC, V6597, P253, DOI 10.1007/978-3-642-19571-6_16
[8]  
Catalano D, 2013, LECT NOTES COMPUT SC, V7778, P55, DOI 10.1007/978-3-642-36362-7_5
[9]  
Chase M, 2007, LECT NOTES COMPUT SC, V4392, P515
[10]  
Chase M, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P121