Attribute-Based Encryption in the Generic Group Model: Automated Proofs and New Constructions

被引:27
作者
Ambrona, Miguel [1 ,2 ]
Barthe, Gilles [1 ]
Gay, Romain [3 ]
Wee, Hoeteck [3 ,4 ]
机构
[1] IMDEA Software Inst, Madrid, Spain
[2] Univ Politecn Madrid, Madrid, Spain
[3] ENS, Paris, France
[4] CNRS, Paris, France
来源
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY | 2017年
基金
欧盟地平线“2020”;
关键词
automated proofs; symbolic security; attribute-based encryption; generic group model; IDENTITY-BASED ENCRYPTION; DUAL SYSTEM ENCRYPTION; PRIME-ORDER GROUPS; RANDOM ORACLES; PREDICATE ENCRYPTION; BILINEAR GROUPS; INNER-PRODUCTS; SECURE IBE; FRAMEWORK; CRYPTOGRAPHY;
D O I
10.1145/3133956.3134088
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Attribute-based encryption (ABE) is a cryptographic primitive which supports fine-grained access control on encrypted data, making it an appealing building block for many applications. In this paper, we propose, implement, and evaluate fully automated methods for proving security of ABE in the Generic Bilinear Group Model (Boneh, Boyen, and Goh, 2005, Boyen, 2008), an idealized model which admits simpler and more effcient constructions, and can also be used to find attacks. Our method is applicable to Rational-Fraction Induced ABE, a large class of ABE that contains most of the schemes from the literature, and relies on a Master Theorem, which reduces security in the GGM to a (new) notion of symbolic security, which is amenable to automated verification using constraint-based techniques. We relate our notion of symbolic security for Rational-Fraction Induced ABE to prior notions for Pair Encodings. Finally, we present several applications, including automated proofs for new schemes.
引用
收藏
页码:647 / 664
页数:18
相关论文
共 64 条
[1]  
Abe M, 2014, LECT NOTES COMPUT SC, V8349, P688, DOI 10.1007/978-3-642-54242-8_29
[2]  
Abe M, 2011, LECT NOTES COMPUT SC, V6841, P649, DOI 10.1007/978-3-642-22792-9_37
[3]  
Abe M, 2011, LECT NOTES COMPUT SC, V7073, P628, DOI 10.1007/978-3-642-25385-0_34
[4]  
Abe M, 2010, LECT NOTES COMPUT SC, V6223, P209, DOI 10.1007/978-3-642-14623-7_12
[5]   Simplifying Design and Analysis of Complex Predicate Encryption Schemes [J].
Agrawal, Shashank ;
Chase, Melissa .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2017, PT I, 2017, 10210 :627-656
[6]   A Study of Pair Encodings: Predicate Encryption in Prime Order Groups [J].
Agrawal, Shashank ;
Chase, Melissa .
THEORY OF CRYPTOGRAPHY, TCC 2016-A, PT II, 2016, 9563 :259-288
[7]  
Akinyele J.A., 2013, Proceedings of the 2013 ACM SIGSAC Conference on Computer #38
[8]  
Communications Security, P399
[9]   Charm: a framework for rapidly prototyping cryptosystems [J].
Akinyele, Joseph A. ;
Garman, Christina ;
Miers, Ian ;
Pagano, Matthew W. ;
Rushanan, Michael ;
Green, Matthew ;
Rubin, Aviel D. .
JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2013, 3 (02) :111-128
[10]  
Akinyele JosephA., 2011, P 1 ACM WORKSHOP SEC, P75, DOI DOI 10.1145/2046614.2046628