Decentralizing Attribute-Based Encryption

نویسندگان

  • Allison Bishop
  • Brent Waters
چکیده

We propose a Multi-Authority Attribute-Based Encryption (ABE) system. In our sys-tem, any party can become an authority and there is no requirement for any global coor-dination other than the creation of an initial set of common reference parameters. A partycan simply act as an ABE authority by creating a public key and issuing private keys todifferent users that reflect their attributes. A user can encrypt data in terms of any booleanformula over attributes issued from any chosen set of authorities. Finally, our system doesnot require any central authority.In constructing our system, our largest technical hurdle is to make it collusion resistant.Prior Attribute-Based Encryption systems achieved collusion resistance when the ABE sys-tem authority “tied” together different components (representing different attributes) of auser’s private key by randomizing the key. However, in our system each component willcome from a potentially different authority, where we assume no coordination between suchauthorities. We create new techniques to tie key components together and prevent collusionattacks between users with different global identifiers.We prove our system secure using the recent dual system encryption methodology wherethe security proof works by first converting the challenge ciphertext and private keys toa semi-functional form and then arguing security. We follow a recent variant of the dualsystem proof technique due to Lewko and Waters and build our system using bilinear groupsof composite order. We prove security under similar static assumptions to the LW paper inthe random oracle model.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Expressive Decentralizing KP-ABE Scheme with Constant-Size Ciphertext

Decentralizing attribute based encryption is a variant of multi-authority attribute based encryption which doesn’t require a trusted central authority to conduct the system setup. In this paper, we propose an expressive decentralizing KP-ABE scheme with constant ciphertext size. In our construction, the access policy can be expressed as any non-monotone access structure. Meanwhile, the cipherte...

متن کامل

Decentralizing Policy-Hiding Attribute-Based Encryption

Attribute-based encryption (ABE) enables limiting access to encrypted data to users who possess certain attributes. Different aspects of ABE have been studied, such as the multi-authority setting (MA-ABE), and policy hiding, meaning the access policy is unknown to unauthorized parties, as in predicate encryption (PE). However, no practical scheme so far provided both properties, which are often...

متن کامل

DoS-Resistant Attribute-Based Encryption in Mobile Cloud Computing with Revocation

Security and privacy are very important challenges for outsourced private data over cloud storages. By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage. In this paper, we extend previous Ciphertext Policy ABE (CP-ABE) schemes especially for mobile and resource-constrained devices in a cloud computing environment in two aspects, a ...

متن کامل

Efficient Ciphertext Policy Attribute-Based Encryption with Constant-Size Ciphertext and Constant Computation-Cost

Attribute-based encryption provides good solutions to the problem of anonymous access control by specifying access policies among private keys or ciphertexts over encrypted data. In ciphertext-policy attribute-based encryption (CP-ABE), each user is associated with a set of attributes, and data is encrypted with access structures on attributes. A user is able to decrypt a ciphertext if and only...

متن کامل

Decentralizing Attribute-Based Encryption

We propose a Multi-Authority Attribute-Based Encryption (ABE) system. In our sys-tem, any party can become an authority and there is no requirement for any global coor-dination other than the creation of an initial set of common reference parameters. A partycan simply act as an ABE authority by creating a public key and issuing private keys todifferent users that reflect their a...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2010  شماره 

صفحات  -

تاریخ انتشار 2010