Blind key-generation attribute-based encryption for general predicates

نویسندگان

چکیده

Abstract Attribute-based encryption (ABE) is a form of public-key that allows fine-grained access control on encrypted data. Blind key-generation (BKG) attribute-based (Rial, Designs, Codes and Cryptography 2016 ) variant in which the master authority issues secret keys without learning any information about attributes associated to them. This extra functionality makes it an appealing building block for several applications. In this work, we extend generic framework ABE based pair encodings (Attrapadung, Eurocrypt 2014 support blind key-generation. particular, define two new notions coin BKG-compatible algebraic encoding. We show every encoding satisfies former loss generality, whereas latter satisfied by all existing from literature. then how enhance achieve honest-but-curious case encodings, our protocol admits very efficient version, secure against malicious parties. The main advantage work generality. Our designed over recent most advanced modular frameworks can handle rich variety predicates.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Key Generation of Attribute Based Broadcast Encryption

Broadcast Encryption (BE) scheme is allows the sender to securely distribute a data to a dynamically changing set of users over a unsecure channel. Attribute based Broadcast Encryption (ABBE) is a excellent approach for broadcasting. Existing BE classical BE approach required an explicitly specified decrypter list. In ABBE differentiate groups of users by their attribute. In ABBE encrypter enfo...

متن کامل

Attribute-Based Key-Insulated Encryption

Attribute-based encryption (ABE) is an exciting alternative to public-key encryption, as ABE develops encryption systems with high expressiveness, without the need for a public key infrastructure (PKI) that makes publicly available the mapping between identities (sets of attributes), public keys, and validity of the latter. Any setting, PKI or attribute-based, must provide a means to revoke use...

متن کامل

Key-Policy Multi-authority Attribute-Based Encryption

Bilinear groups are often used to create Attribute-Based Encryption (ABE) algorithms. In particular, they have been used to create an ABE system with multi authorities, but limited to the ciphertext-policy instance. Here, for the first time, we propose two multi-authority key-policy ABE systems. In our first proposal, the authorities may be set up in any moment and without any coordination. A p...

متن کامل

Attribute-Based Encryption with Key Cloning Protection

In this work, we consider the problem of key cloning in attribute-based encryption schemes. We introduce a new type of attribute-based encryption scheme, called token-based attributebased encryption, that provides strong deterrence for key cloning, in the sense that delegation of keys reveals some personal information about the user. We formalize the security requirements for such a scheme in t...

متن کامل

A key-policy attribute-based broadcast encryption

According to the broadcast encryption scheme with wide applications in the real world without considering its security and efficiency in the model simultaneously an “unbounded”, Key-Policy Attribute-Based Broadcast Encryption scheme(KP-ABBE) was proposed by combining with waters dual system encryption, attribute-based encryption and broadcast encryption system. Based on the standard model, the ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Designs, Codes and Cryptography

سال: 2022

ISSN: ['0925-1022', '1573-7586']

DOI: https://doi.org/10.1007/s10623-022-01069-5