Decentralized Policy-Hiding ABE with Receiver Privacy

被引:20
|
作者
Michalevsky, Yan [1 ,2 ]
Joye, Marc [3 ]
机构
[1] Anjuna Secur, Palo Alto, CA 94306 USA
[2] Stanford Univ, Stanford, CA 94305 USA
[3] NXP Semicond, San Jose, CA USA
来源
关键词
D O I
10.1007/978-3-319-98989-1_27
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Attribute-based encryption (ABE) enables limiting access to encrypted data to users with certain attributes. Different aspects of ABE were studied, such as the multi-authority setting (MA-ABE), and policy hiding, meaning the access policy is unknown to unauthorized parties. However, no practical scheme so far provably provides both properties, which are often desirable in real-world applications: supporting decentralization while hiding the access policy. We present the first practical decentralized ABE scheme with a proof of being policy-hiding. Our construction is based on a decentralized inner-product predicate encryption scheme, introduced in this paper, which hides the encryption policy. It results in an ABE scheme supporting conjunctions, disjunctions and threshold policies, that protects the access policy from parties that are not authorized to decrypt the content. Further, we address the issue of receiver privacy. By using our scheme in combination with vector commitments, we hide the overall set of attributes possessed by the receiver from individual authorities, only revealing the attribute that the authority is controlling. Finally, we propose randomizing-polynomial encodings that immunize the scheme in the presence of corrupt authorities.
引用
收藏
页码:548 / 567
页数:20
相关论文
共 50 条
  • [11] Privacy and Integrity Verification Model with Decentralized ABE and Double Encryption Storage Scheme
    Nair, Amrutha Muralidharan
    Santhosh, R.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2023, 14 (02) : 465 - 471
  • [12] How to Hide the Real Receiver Under the Cover Receiver: CP-ABE With Policy Deniability
    Chi, Po-Wen
    Wang, Ming-Hung
    Shiu, Hung-, Jr.
    IEEE ACCESS, 2020, 8 : 89866 - 89881
  • [13] An efficient and access policy-hiding keyword search and data sharing scheme in cloud-assisted IoT
    Yin, Hui
    Li, Yangfan
    Li, Fangmin
    Deng, Hua
    Zhang, Wei
    Li, Keqin
    JOURNAL OF SYSTEMS ARCHITECTURE, 2022, 128
  • [14] Privacy-Preserving Policy Iteration for Decentralized POMDPs
    Wu, Feng
    Zilberstein, Shlomo
    Chen, Xiaoping
    THIRTY-SECOND AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE / THIRTIETH INNOVATIVE APPLICATIONS OF ARTIFICIAL INTELLIGENCE CONFERENCE / EIGHTH AAAI SYMPOSIUM ON EDUCATIONAL ADVANCES IN ARTIFICIAL INTELLIGENCE, 2018, : 4759 - 4766
  • [15] Efficient Policy-Hiding and Large Universe Attribute-Based Encryption With Public Traceability for Internet of Medical Things
    Zeng, Peng
    Zhang, Zhiting
    Lu, Rongxing
    Choo, Kim-Kwang Raymond
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (13) : 10963 - 10972
  • [16] A CP-ABE Scheme Supporting Attribute Revocation and Policy Hiding in Outsourced Environment
    Wang, Wei
    Zhang, Guidong
    Shen, Yongjun
    PROCEEDINGS OF 2018 IEEE 9TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS), 2018, : 96 - 99
  • [17] Privacy-preserving decentralized ABE for secure sharing of personal health records in cloud storage
    Liang, Pengfei
    Zhang, Leyou
    Kang, Li
    Ren, Juan
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2019, 47 : 258 - 266
  • [18] Improving Privacy-Preserving CP-ABE with Hidden Access Policy
    Zhang, Leyou
    Cui, Yilei
    Mu, Yi
    CLOUD COMPUTING AND SECURITY, PT III, 2018, 11065 : 596 - 605
  • [19] Constant Size Ciphertext Distributed CP-ABE Scheme With Privacy Protection and Fully Hiding Access Structure
    Zhang, Yichen
    Li, Jiguo
    Yan, Hao
    IEEE ACCESS, 2019, 7 : 47982 - 47990
  • [20] Framework based on Privacy Policy Hiding for Preventing Unauthorized Face Image Processing
    Dabrowski, Adrian
    Weippl, Edgar R.
    Echizen, Isao
    2013 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC 2013), 2013, : 455 - 461