Decentralized Policy-Hiding ABE with Receiver Privacy

被引:20
|
作者
Michalevsky, Yan [1 ,2 ]
Joye, Marc [3 ]
机构
[1] Anjuna Secur, Palo Alto, CA 94306 USA
[2] Stanford Univ, Stanford, CA 94305 USA
[3] NXP Semicond, San Jose, CA USA
来源
关键词
D O I
10.1007/978-3-319-98989-1_27
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Attribute-based encryption (ABE) enables limiting access to encrypted data to users with certain attributes. Different aspects of ABE were studied, such as the multi-authority setting (MA-ABE), and policy hiding, meaning the access policy is unknown to unauthorized parties. However, no practical scheme so far provably provides both properties, which are often desirable in real-world applications: supporting decentralization while hiding the access policy. We present the first practical decentralized ABE scheme with a proof of being policy-hiding. Our construction is based on a decentralized inner-product predicate encryption scheme, introduced in this paper, which hides the encryption policy. It results in an ABE scheme supporting conjunctions, disjunctions and threshold policies, that protects the access policy from parties that are not authorized to decrypt the content. Further, we address the issue of receiver privacy. By using our scheme in combination with vector commitments, we hide the overall set of attributes possessed by the receiver from individual authorities, only revealing the attribute that the authority is controlling. Finally, we propose randomizing-polynomial encodings that immunize the scheme in the presence of corrupt authorities.
引用
收藏
页码:548 / 567
页数:20
相关论文
共 50 条
  • [1] A Policy-Hiding Attribute-Based Access Control Scheme in Decentralized Trust Management
    Ruan, Conghao
    Hu, Chunqiang
    Zhao, Ruifeng
    Liu, Zewei
    Huang, Hongyu
    Yu, Jiguo
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (20) : 17656 - 17665
  • [2] Security and Privacy in Smart Health: Efficient Policy-Hiding Attribute-Based Access Control
    Zhang, Yinghui
    Zheng, Dong
    Deng, Robert H.
    IEEE INTERNET OF THINGS JOURNAL, 2018, 5 (03): : 2130 - 2145
  • [3] Ciphertext Policy-Hiding Attribute-Based Encryption
    Yadav, Umesh Chandra
    Ali, Syed Taqi
    2015 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2015, : 2067 - 2071
  • [4] Access Control in Decentralized Online Social Networks: Applying a Policy-Hiding Cryptographic Scheme and Evaluating Its Performance
    Bodriagov, Oleksandr
    Kreitz, Gunnar
    Buchegger, Sonja
    2014 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS (PERCOM WORKSHOPS), 2014, : 622 - 628
  • [5] Privacy Protection of Task in Crowdsourcing: Policy-Hiding and Attribute Updating Attribute-Based Access Control Based on Blockchain
    Yang, Kunwei
    Yang, Bo
    Zhou, Yanwei
    Wang, Tao
    Gong, Linming
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [6] HTAC: Fine-Grained Policy-Hiding and Traceable Access Control in mHealth
    Li, Qi
    Zhang, Yinghui
    Zhang, Tao
    Huang, Haiping
    He, Yingjie
    Xiong, Jinbo
    IEEE ACCESS, 2020, 8 : 123430 - 123439
  • [7] PPDCP-ABE: Privacy-Preserving Decentralized Ciphertext-Policy Attribute-Based Encryption
    Han, Jinguang
    Susilo, Willy
    Mu, Yi
    Zhou, Jianying
    Au, Man Ho
    COMPUTER SECURITY - ESORICS 2014, PT II, 2014, 8713 : 73 - 90
  • [8] Ciphertext-policy attribute-based encryption supporting policy-hiding and cloud auditing in smart health
    Wang, Huiyong
    Liang, Jialing
    Ding, Yong
    Tang, Shijie
    Wang, Yujue
    COMPUTER STANDARDS & INTERFACES, 2023, 84
  • [9] Efficient Privacy-Preserving Decentralized ABE Supporting Expressive Access Structures
    Zhang, Liangxuan
    Li, Hui
    Zhang, Yinghui
    Khan, Fawad
    2017 IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2017, : 547 - 552
  • [10] Fully Secure Cipertext-Policy Hiding CP-ABE
    Lai, Junzuo
    Deng, Robert H.
    Li, Yingjiu
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, 2011, 6672 : 24 - 39