Cross-Domain Attribute-Based Access Control Encryption

被引:2
|
作者
Sedaghat, Mahdi [1 ]
Preneel, Bart [1 ]
机构
[1] Katholieke Univ Leuven, Imec COSIC, Leuven, Belgium
来源
关键词
Access Control Encryption; Ciphertext-Policy; Attribute-Based Encryption; Structure-Preserving Signature; Non-Interactive Zero-Knowledge Proofs; FUNCTIONAL ENCRYPTION; IDENTIFICATION; SIGNATURES;
D O I
10.1007/978-3-030-92548-2_1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Logic access control enforces who can read and write data; the enforcement is typically performed by a fully trusted entity. At TCC 2016, Damga'rd et al. proposed Access Control Encryption (ACE) schemes where a predicate function decides whether or not users can read (decrypt) and write (encrypt) data, while the message secrecy and the users' anonymity are preserved against malicious parties. Subsequently, several ACE constructions with an arbitrary identity-based access policy have been proposed, but they have huge ciphertext and key sizes and/or rely on indistinguishability obfuscation. At IEEE S&P 2021, Wang and Chow proposed a Cross-Domain ACE scheme with constant-size ciphertext and arbitrary identity-based policy; the key generators are separated into two distinct parties, called Sender Authority and Receiver Authority. In this paper, we improve over their work with a novel construction that provides a more expressive access control policy based on attributes rather than on identities, the security of which relies on standard assumptions. Our generic construction combines Structure-Preserving Signatures, Non-Interactive Zero-Knowledge proofs, and Rerandomizable Ciphertext-Policy Attribute-Based Encryption schemes. Moreover, we propose an efficient scheme in which the sizes of ciphertexts and encryption and decryption keys are constant and thus independent of the number of receivers and their attributes. Our experiments demonstrate that not only is our system more flexible, but it also is more efficient and results in shorter decryption keys (reduced from about 100 to 47 bytes) and ciphertexts (reduced from about 1400 to 1047).
引用
收藏
页码:3 / 23
页数:21
相关论文
共 50 条
  • [21] An Access Control Model for Cloud Storage Using Attribute-Based Encryption
    Sukhodolskiy, Ilya A.
    Zapechnikov, Sergey V.
    [J]. PROCEEDINGS OF THE 2017 IEEE RUSSIA SECTION YOUNG RESEARCHERS IN ELECTRICAL AND ELECTRONIC ENGINEERING CONFERENCE (2017 ELCONRUS), 2017, : 578 - 581
  • [22] Cross-domain access control based on trusted third-party and attribute center
    Bai, Liyang
    Fan, Kai
    Bai, Yuhan
    Cheng, Xiaochun
    Li, Hui
    Yang, Yintang
    [J]. JOURNAL OF SYSTEMS ARCHITECTURE, 2021, 116
  • [23] Attribute-Based Access Control
    Hu, Vincent C.
    Kuhn, D. Richard
    Ferraiolo, David F.
    [J]. COMPUTER, 2015, 48 (02) : 85 - 88
  • [24] A Role-Based Access Control System Using Attribute-Based Encryption
    Wang, Yong
    Ma, Yuan
    Xiang, Keyu
    Liu, Zhenyan
    Li, Ming
    [J]. 2018 INTERNATIONAL CONFERENCE ON BIG DATA AND ARTIFICIAL INTELLIGENCE (BDAI 2018), 2018, : 128 - 133
  • [25] Using attribute-based access control to enable attribute-based messaging
    Bobba, Rakesh
    Fatemieh, Omid
    Khan, Fariba
    Gunter, Carl A.
    Khurana, Himanshu
    [J]. 22ND ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2006, : 403 - +
  • [26] Efficient attribute-based encryption with hidden access structures
    School of Communication and Information Engineering, Shanghai Univ., Shanghai
    200444, China
    [J]. Xi'an Dianzi Keji Daxue Xuebao, 3 (97-102):
  • [27] Secure Access Control of E-Health System with Attribute-Based Encryption
    Yan, Hongyang
    Li, Jin
    Li, Xuan
    Zhao, Gansen
    Lee, Sun-Young
    Shen, Jian
    [J]. INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2016, 22 (03): : 345 - 352
  • [28] Auditable σ-Time Outsourced Attribute-Based Encryption for Access Control in Cloud Computing
    Ning, Jianting
    Cao, Zhenfu
    Dong, Xiaolei
    Liang, Kaitai
    Ma, Hui
    Wei, Lifei
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (01) : 94 - 105
  • [29] Verifiable and Exculpable Outsourced Attribute-Based Encryption for Access Control in Cloud Computing
    Ma, Hui
    Zhang, Rui
    Wan, Zhiguo
    Lu, Yao
    Lin, Suqing
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2017, 14 (06) : 679 - 692
  • [30] Attribute-Based Encryption as a Service for Access Control in Large-Scale Organizations
    Bloemer, Johannes
    Guenther, Peter
    Krummel, Volker
    Loeken, Nils
    [J]. FOUNDATIONS AND PRACTICE OF SECURITY (FPS 2017), 2018, 10723 : 3 - 17