Attribute-based encryption with enforceable obligations

被引:0
作者
Hamed Arshad
Pablo Picazo-Sanchez
Christian Johansen
Gerardo Schneider
机构
[1] University of Oslo,Department of Informatics
[2] Chalmers University of Technology,Department of Computer Science and Engineering
[3] Halmstad University,School of Information Technology
[4] Norwegian University of Science and Technology,Department of Computer Science and Engineering
[5] University of Gothenburg,undefined
来源
Journal of Cryptographic Engineering | 2023年 / 13卷
关键词
Attribute-based encryption; Intel SGX; Enforceable obligations; Security; Trusted hardware enclaves;
D O I
暂无
中图分类号
学科分类号
摘要
Attribute-based encryption (ABE) is a cryptographic mechanism that provides fine-grained access control to encrypted data, which can thus be stored in, e.g., public clouds. However, ABE schemes lack the notion of obligations, which is common in attribute-based access control systems such as eXtensible Access Control Markup Language and Usage Control. Obligations are used to define and enforce extra constraints that happen before approving or denying an access request. In this paper, we propose OB-ABE, a system for extending any classical ABE with enforceable obligations. Our system architecture has as core component trusted hardware enclaves, implemented with SGX, used for enforcing obligations. We employ ProVerif to formally model OB-ABE and verify its main property called “enforceable obligations,” i.e., if a message is encrypted along with an obligation, then the message can be decrypted only after enforcing the attached obligation. OB-ABE has two more properties: (i) OB-ABE is a “conservative extension” of the underlying ABE scheme, preserving its security properties; (ii) OB-ABE is “backward compatible” in the sense that any ciphertext produced by an ABE scheme can be decrypted by its extended OB-ABE version, and moreover, a ciphertext produced by an OB-ABE scheme can be decrypted by its underlying ABE scheme provided that the ciphertext does not have obligations attached. We also implement in C using Intel SGX a prototype of an OB-ABE extending the well-known ciphertext-policy ABE.
引用
收藏
页码:343 / 371
页数:28
相关论文
共 167 条
[1]  
Abadi M(2017)The applied pi calculus: mobile values, new names, and secure communication J. ACM (JACM) 65 1-41
[2]  
Blanchet B(2017)An attribute based access control framework for healthcare system J. Phys. Conf. Ser. 933 1-15
[3]  
Fournet C(2019)eHealth cloud security challenges: a survey J. Healthc. Eng. 2019 191-233
[4]  
Afshar M(2001)TRBAC: a temporal role-based access control model ACM Trans. Inf. Syst. Security (TISSEC) 4 3-51
[5]  
Samet S(2008)Automated verification of selected equivalences for security protocols J. Logic Algebraic Program. 75 48-37
[6]  
Hu T(2017)PRESAGE: privacy-preserving genetic testing via software guard extension BMC Med. Genom. 10 28-633
[7]  
Al-Issa Y(2020)Sgxpectre: stealing intel secrets from SGX enclaves via speculative execution IEEE Secur. Priv. 18 620-191
[8]  
Ottom MA(2019)A comparative analysis of emerging approaches for securing java software with Intel SGX Futur. Gener. Comput. Syst. 97 171-833
[9]  
Tamrawi A(2018)CacheQuote: efficiently recovering long-term secrets of SGX EPID via cache attacks IACR Trans. Cryptogr. Hardw. Embed. Syst. 2018 798-335
[10]  
Bertino E(2006)Kleene algebra with domain ACM Trans. Comput. Logic (TOCL) 7 311-47