首页> 外文会议>International conference on cryptology and network security >Server-Aided Revocable Attribute-Based Encryption Resilient to Decryption Key Exposure
【24h】

Server-Aided Revocable Attribute-Based Encryption Resilient to Decryption Key Exposure

机译:基于服务器辅助的Revocable属性的加密适用于解密密钥曝光

获取原文

摘要

Attribute-based encryption (ABE) is a promising approach that enables scalable access control on encrypted data. However, one of the main efficiency drawbacks of ABE is the lack of practical user revocation mechanisms. In CCS 2008, Boldyreva, Goyal and Kumar put forward an efficient way to revoke users. But, it requires each data user storing a (non-constant) number of long-term private keys and periodically communicating with the key generation center to update his/her decryption keys. In ESORICS 2016, Cui et al. proposed the first server-aided revocable ABE scheme to address the above two issues. It involves an untrusted server to transform any non-revoked user's ABE ciphertexts into short ciphertexts using user's short-term transformation keys. The data user can fully decrypt the transformed ciphertexts using his/her local decryption keys. Cui et al. also introduced the decryption key exposure (DKE) attacks on transformation keys. However, if the untrusted server colludes with an adversary, the scheme may be insecure against DKE attacks on user's local decryption keys. In this paper, we first revisit Cui et al. security model, and enhance it by capturing the DKE attacks on user's local decryption keys and allowing the adversary to fully corrupt the server simultaneously. We then construct a server-aided revocable ABE based on Rouselakis-Waters ciphertext-policy ABE (CCS 2013). We show that our scheme is secure against local decryption key exposure attacks, and maintains the outstanding properties of efficient user revocation, short local ciphertext size and fast local decryption.
机译:基于属性的加密(ABE)是一种有希望的方法,可在加密数据上实现可扩展的访问控制。然而,ABE的主要效率缺点之一是缺乏实用的用户撤销机制。在CCS 2008中,BoldyReva,Goyal和Kumar提出了一种有效的方法来撤消用户。但是,它需要每个数据用户存储(非常数)长期私钥的数量,并与密钥生成中心周期性地通信以更新他/她的解密密钥。在2016年的esorics中,Cui等人。提出了第一台服务器辅助可撤销ABE方案,以解决上述两个问题。它涉及不受信任的服务器,将任何未撤销的用户的APE密文转换为使用用户的短期转换键将任何未撤销的用户的ABE密文转换为短密文。数据用户可以使用他/她的本地解密密钥完全解密转换的密文。 Cui等人。还引入了对转换键的解密键曝光(DKE)攻击。然而,如果不受信任的服务器与对手勾结,则该方案可以对用户的本地解密密钥的DKE攻击不安全。在本文中,我们首先重新审视Cui等人。安全模型,并通过捕获用户本地解密密钥的DKE攻击并允许对手同时完全破坏服务器的DKE攻击来增强它。然后,我们根据RouseLakis-Waters密文 - 策略abe构建一个服务器辅助revocable abe(CCS 2013)。我们展示我们的计划对本地解密密钥曝光攻击安全,并保持高效用户撤销,本地密文大小和快速本地解密的出色属性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号