Blind key-generation attribute-based encryption for general predicates
-
Published:2022-08-13
Issue:10
Volume:90
Page:2271-2299
-
ISSN:0925-1022
-
Container-title:Designs, Codes and Cryptography
-
language:en
-
Short-container-title:Des. Codes Cryptogr.
Author:
Abe Masayuki, Ambrona MiguelORCID
Abstract
AbstractAttribute-based encryption (ABE) is a form of public-key encryption that allows fine-grained access control on encrypted data. Blind key-generation (BKG) attribute-based encryption (Rial,Designs, Codes and Cryptography 2016) is a variant in which the master authority issues secret keys without learning any information about the attributes associated to them. This extra functionality makes it an appealing building block for several applications. In this work, we extend the generic framework of ABE based on pair encodings (Attrapadung,Eurocrypt 2014) to support blind key-generation. In particular, we define two new notions of pair encodings that we coinBKG-compatibleandalgebraicpair encoding. We show that every encoding satisfies the former without loss of generality, whereas the latter is satisfied by all existing pair encodings from the literature. We then show how to enhance any ABE based on a BKG-compatible pair encoding to achieve honest-but-curious blind key-generation. In the case of algebraic encodings, our protocol admits a very efficient version, secure against malicious parties. The main advantage of our work is generality. Our protocol is designed over the recent and most advanced modular frameworks of ABE that can handle a rich variety of predicates.
Publisher
Springer Science and Business Media LLC
Subject
Applied Mathematics,Computer Science Applications
Reference50 articles.
1. Ambrona, M., Barthe, G., Gay, R., Wee, H.: Attribute-based encryption in the generic group model: automated proofs and new constructions. In: Thuraisingham, B.M., Evans, D., Malkin, T., Xu, D. (eds.) ACM CCS 2017, pp. 647–664. ACM Press (October/November 2017) 2. Ambrona, M., Gilles, B., Benedikt, S.: Generic transformations of predicate encodings: constructions and applications. In: Jonathan, K., Hovav, S. (eds.) CRYPTO 2017, Part I, LNCS, vol. 10401, pp. 36–66. Springer, Heidelberg (2017) 3. Agrawal S., Chase M.: A study of pair encodings: predicate encryption in prime order groups. In: Kushilevitz E., Malkin T. (eds.) TCC 2016-A, Part II, LNCS, vol. 9563, pp. 259–288. Springer, Heidelberg (2016). 4. Agrawal, S., Chase, M.: Simplifying design and analysis of complex predicate encryption schemes. In: Coron, J.-S., Nielsen, J.B. (eds.) EUROCRYPT 2017, Part I, LNCS, vol. 10210, pp. 627–656. Springer, Heidelberg (April/May 2017) 5. Aranha, D.F., Gouvêa, C.P.L., Markmann, T., Wahby, R.S., Liao, K.: RELIC is an Efficient LIbrary for Cryptography. https://github.com/relic-toolkit/relic
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
|
|