Generic Constructions for Fully Secure Revocable Attribute-Based Encryption

被引:5
作者
Yamada, Kotoko [1 ]
Attrapadung, Nuttapong [3 ]
Emura, Keita [4 ]
Hanaoka, Goichiro [3 ]
Tanaka, Keisuke [2 ]
机构
[1] Tokyo Inst Technol, Tokyo 1528550, Japan
[2] Tokyo Inst Technol, Sch Comp, Tokyo, Japan
[3] Natl Inst Adv Ind Sci & Technol, Adv Cryptog Res Group, Tokyo 1350064, Japan
[4] Natl Inst Informat & Commun Technol NICT, Cybersecur Res Inst, Koganei, Tokyo 1848795, Japan
关键词
revocable attribute-based encryption; pair encoding; identity-based revocation; doubly spatial encryption; IDENTITY-BASED ENCRYPTION; DUAL SYSTEM ENCRYPTION; PRIME-ORDER GROUPS; BROADCAST ENCRYPTION; PAIR ENCODINGS; CIPHERTEXTS;
D O I
10.1587/transfun.E101.A.1456
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Attribute-based encryption (ABE), a cryptographic primitive, realizes fine-grained access control. Because of its attractive functionality, many systems based on ABE have been constructed to date. In such cryptographic systems, revocation functionality is indispensable to handle withdrawal of users, secret key exposure, and others. Although many ABE schemes with various functionalities have been proposed, only a few of these are revocable ABE (RABE). In this paper, we propose two generic constructions of RABE from ABE. Our first construction employs the pair encoding framework (Attrapadung, EUROCRYPT 2014), and combines identity-based revocation and ABE via the generic conjunctive conversion of Attrapadung and Yamada (CT-RSA 2015). Our second construction converts ABE to RABE directly when ABE supports Boolean formulae. Because our constructions preserve functionalities of the underlying ABE, we can instantiate various fully secure RABE schemes for the first time, e.g., supporting regular languages, with unbounded attribute size and policy structure, and with constant-size ciphertext and secret key.
引用
收藏
页码:1456 / 1472
页数:17
相关论文
共 33 条
[1]   A Study of Pair Encodings: Predicate Encryption in Prime Order Groups [J].
Agrawal, Shashank ;
Chase, Melissa .
THEORY OF CRYPTOGRAPHY, TCC 2016-A, PT II, 2016, 9563 :259-288
[2]  
Attrapadung Nuttapong, 2015, Topics in Cryptology - CT-RSA 2015. The Cryptographers' Track at the RSA Conference 2015. Proceedings: LNCS 9048, P87, DOI 10.1007/978-3-319-16715-2_5
[3]   Dual System Encryption Framework in Prime-Order Groups via Computational Pair Encodings [J].
Attrapadung, Nuttapong .
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2016, PT II, 2016, 10032 :591-623
[4]   A Framework for Identity-Based Encryption with Almost Tight Security [J].
Attrapadung, Nuttapong ;
Hanaoka, Goichiro ;
Yamada, Shota .
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2015, PT I, 2015, 9452 :521-549
[5]  
Attrapadung N, 2014, LECT NOTES COMPUT SC, V8441, P557, DOI 10.1007/978-3-642-55220-5_31
[6]  
Attrapadung N, 2011, LECT NOTES COMPUT SC, V6571, P90, DOI 10.1007/978-3-642-19379-8_6
[7]  
Attrapadung N, 2010, LECT NOTES COMPUT SC, V6056, P384
[8]  
Attrapadung N, 2009, LECT NOTES COMPUT SC, V5921, P278, DOI 10.1007/978-3-642-10868-6_17
[9]  
Attrapadung N, 2009, LECT NOTES COMPUT SC, V5671, P248, DOI 10.1007/978-3-642-03298-1_16
[10]  
Boldyreva A, 2008, CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P417