Dynamic Credentials and Ciphertext Delegation for Attribute-Based Encryption

作者: Amit Sahai , Hakan Seyalioglu , Brent Waters

DOI: 10.1007/978-3-642-32009-5_13

关键词: Access controlRevocationOn-the-fly encryptionEncryptionSemantic securityAccess structureComputer scienceDelegationPairingKey (cryptography)Computer securityCiphertextAttribute-based encryptionCiphertext indistinguishability

摘要: Motivated by the question of access control in cloud storage, we consider problem using Attribute-Based Encryption ABE a setting where users' credentials may change and ciphertexts be stored third party. Our main result is obtained pairing two contributions:We first ask how party who not trusted with secret key information can process ciphertext to disqualify revoked users from decrypting data encrypted past. core tool new procedure called delegation that allows 're-encrypted' more restrictive policy only public information.Second, study revocable attribute-based encryption. We provide fully secure construction modifying an encryption scheme due Lewko et al. [9] prove security standard model. We then combine these results for approach revocation on data. storage server update accessing was before user's while broadcasts dynamically revoke selected users.

参考文章(32)
Topics in Cryptology – CT-RSA 2009 Lecture Notes in Computer Science. ,vol. 5473, ,(2009) , 10.1007/978-3-642-00862-7
Advances in Cryptology - CRYPTO 2010 Lecture Notes in Computer Science. ,vol. 6223, ,(2010) , 10.1007/978-3-642-14623-7
Allison Lewko, Brent Waters, New Proof Methods for Attribute-Based Encryption: Achieving Full Security through Selective Techniques international cryptology conference. ,vol. 2012, pp. 180- 198 ,(2012) , 10.1007/978-3-642-32009-5_12
Public Key Cryptography - PKC 2011 Lecture Notes in Computer Science. ,vol. 6571, ,(2011) , 10.1007/978-3-642-19379-8
Allison Lewko, Tatsuaki Okamoto, Amit Sahai, Katsuyuki Takashima, Brent Waters, Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption theory and application of cryptographic techniques. pp. 62- 91 ,(2010) , 10.1007/978-3-642-13190-5_4
Moni Naor, Dalit Naor, Jeffery Lotspiech, Revocation and Tracing Schemes for Stateless Receivers Electronic Colloquium on Computational Complexity. ,(2002)
Mihir Bellare, Sara K. Miner, A Forward-Secure Digital Signature Scheme international cryptology conference. pp. 431- 448 ,(1999) , 10.1007/3-540-48405-1_28
Amit Sahai, Brent Waters, Fuzzy identity-based encryption theory and application of cryptographic techniques. ,vol. 3494, pp. 457- 473 ,(2005) , 10.1007/11426639_27
S. Micali, NOVOMODO : Scalable Certificate Validation and Simplified PKI Management Proc. 1st Annual PKI Research Workshop (2002). ,(2002)