Combining ABCs with ABE: Privacy-Friendly Key Generation for Smart Card Based Attribute-Based Encryption

作者: T.R. van de Kamp

DOI:

关键词:

摘要: Attribute-Based Credential (ABC) schemes provide a privacy-friendly method to perform authentication. In such system the user does not necessarily have identify himself, but may reveal only partial information about him, i.e., attributes possesses. The use of this technique is proper solution for several kinds authentication where no full identification required, e.g., buying liquor at store or opening door an office building. However, using Encryption (ABE) provides some advantages ABCs in case data protection. Ciphertext-Policy ABE allow define access policy over encrypted file, so that individuals possessing right can decrypt file. The authorization takes place when tries file; involve on-line party as would be required by ABC system. A smart card implementation Identity Mixer (idemix) credentials exists, making it feasible implement system. Little progress has been made create scheme suitable run similar environment. Most require computationally complex decryption algorithms take too much time on current cards. Moreover, many multi-authority violate user’s privacy requiring his unique identifier, enabling authorities profile its users. We overview different types and describe terms security efficiency. Using our classification, we select Lewko–Waters decentralized adapt meet requirements. We propose Blind Key Generation protocol way do key issuance without having identifier. We prove secure against three attackers definitions introduced Green Hohenberger. Additionally, Off-card Decrypt protocol. This enables us outsource most operations trusted device, yet safely keys never them.

参考文章(17)
Zhen Liu, Zhenfu Cao, Qiong Huang, Duncan S. Wong, Tsz Hon Yuen, Fully Secure Multi-authority Ciphertext-Policy Attribute-Based Encryption without Random Oracles Computer Security – ESORICS 2011. pp. 278- 297 ,(2011) , 10.1007/978-3-642-23822-2_16
Y. Sreenivasa Rao, Ratna Dutta, Decentralized Ciphertext-Policy Attribute-Based Encryption Scheme with Fast Decryption international conference on communications. pp. 66- 81 ,(2013) , 10.1007/978-3-642-40779-6_5
Amit Sahai, Brent Waters, Fuzzy identity-based encryption theory and application of cryptographic techniques. ,vol. 3494, pp. 457- 473 ,(2005) , 10.1007/11426639_27
Huang Lin, Zhenfu Cao, Xiaohui Liang, Jun Shao, None, Secure Threshold Multi Authority Attribute Based Encryption without a Central Authority international conference on cryptology in india. pp. 426- 436 ,(2008) , 10.1007/978-3-540-89754-5_33
Adi Shamir, Identity-based cryptosystems and signature schemes international cryptology conference. ,vol. 196, pp. 47- 53 ,(1985) , 10.1007/3-540-39568-7_5
Allison Lewko, Brent Waters, Decentralizing attribute-based encryption international cryptology conference. pp. 568- 588 ,(2011) , 10.1007/978-3-642-20465-4_31
Lingling Xu, Fangguo Zhang, Oblivious transfer with complex attribute-based access control international conference on information security and cryptology. pp. 370- 395 ,(2010) , 10.1007/978-3-642-24209-0_25
Torben Pryds Pedersen, Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing international cryptology conference. pp. 129- 140 ,(1991) , 10.1007/3-540-46766-1_9
Y. Rahulamathavan, M. Rajarajan, Raphael C.-W Phan, Fei Li, Low Complexity Multi-authority Attribute Based Encryption Scheme for Mobile Cloud Computing 2013 IEEE Seventh International Symposium on Service-Oriented System Engineering. pp. 573- 577 ,(2013) , 10.1109/SOSE.2013.12
R. L. Rivest, A. Shamir, L. Adleman, A method for obtaining digital signatures and public-key cryptosystems Communications of the ACM. ,vol. 26, pp. 96- 99 ,(1983) , 10.1145/357980.358017