Decentralized Policy-Hiding ABE with Receiver Privacy

被引:20
|
作者
Michalevsky, Yan [1 ,2 ]
Joye, Marc [3 ]
机构
[1] Anjuna Secur, Palo Alto, CA 94306 USA
[2] Stanford Univ, Stanford, CA 94305 USA
[3] NXP Semicond, San Jose, CA USA
来源
关键词
D O I
10.1007/978-3-319-98989-1_27
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Attribute-based encryption (ABE) enables limiting access to encrypted data to users with certain attributes. Different aspects of ABE were studied, such as the multi-authority setting (MA-ABE), and policy hiding, meaning the access policy is unknown to unauthorized parties. However, no practical scheme so far provably provides both properties, which are often desirable in real-world applications: supporting decentralization while hiding the access policy. We present the first practical decentralized ABE scheme with a proof of being policy-hiding. Our construction is based on a decentralized inner-product predicate encryption scheme, introduced in this paper, which hides the encryption policy. It results in an ABE scheme supporting conjunctions, disjunctions and threshold policies, that protects the access policy from parties that are not authorized to decrypt the content. Further, we address the issue of receiver privacy. By using our scheme in combination with vector commitments, we hide the overall set of attributes possessed by the receiver from individual authorities, only revealing the attribute that the authority is controlling. Finally, we propose randomizing-polynomial encodings that immunize the scheme in the presence of corrupt authorities.
引用
收藏
页码:548 / 567
页数:20
相关论文
共 50 条
  • [21] Privacy in Decentralized Cryptocurrencies
    Genkin, Daniel
    Papadopoulos, Dimitrios
    Papamanthou, Charalampos
    COMMUNICATIONS OF THE ACM, 2018, 61 (06) : 78 - 88
  • [22] Sharing and Privacy in PHRs: Efficient Policy Hiding and Update Attribute-based Encryption
    Liu, Zhenhua
    Ji, Jiaqi
    Yin, Fangfang
    Wang, Baocang
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2021, 15 (01): : 323 - 342
  • [23] New Hidden Policy CP-ABE for Big Data Access Control with Privacy-preserving Policy in Cloud Computing
    Khuntia, Sucharita
    Kumar, P. Syam
    2018 9TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT), 2018,
  • [24] Bounded-collusion decentralized ABE with sublinear parameters
    Zhao, Jun
    Yang, Minghao
    Gong, Junqing
    Zhang, Kai
    Qian, Haifeng
    THEORETICAL COMPUTER SCIENCE, 2023, 960
  • [25] Fully Adaptive Decentralized Multi-Authority ABE
    Datta, Pratish
    Komargodski, Ilan
    Waters, Brent
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2023, PT III, 2023, 14006 : 447 - 478
  • [26] Decentralized receiver in a MIMO system
    Sanderovich, Amichai
    Shamai, Shlomo
    Steinberg, Yossef
    Peleg, Michael
    2006 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, VOLS 1-6, PROCEEDINGS, 2006, : 6 - +
  • [27] A Decentralized Receiver in Gaussian Interference
    Chapman, Christian D.
    Mittelmann, Hans
    Margetts, Adam R.
    Bliss, Daniel W.
    ENTROPY, 2018, 20 (04)
  • [28] Privacy-Preserving WebID Analytics on the Decentralized Policy-Aware Social Web
    Hu, Yuh-Jong
    2014 IEEE/WIC/ACM INTERNATIONAL JOINT CONFERENCES ON WEB INTELLIGENCE (WI) AND INTELLIGENT AGENT TECHNOLOGIES (IAT), VOL 2, 2014, : 503 - 510
  • [29] Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption
    Han, Jinguang
    Susilo, Willy
    Mu, Yi
    Yan, Jun
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2012, 23 (11) : 2150 - 2162
  • [30] Improving Privacy and Security in Decentralized Ciphertext-Policy Attribute-Based Encryption
    Han, Jinguang
    Susilo, Willy
    Mu, Yi
    Zhou, Jianying
    Au, Man Ho Allen
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (03) : 665 - 678