Duality in ABE: Converting Attribute Based Encryption for Dual Predicate and Dual Policy via Computational Encodings
نویسندگان
چکیده
We show a generic conversion that converts an attribute based encryption (ABE)scheme for arbitrary predicate into an ABE scheme for its dual predicate. In particular, itcan convert key-policy ABE (KP-ABE) into ciphertext-policy ABE (CP-ABE), and viceversa, for dually related predicates. It is generic in the sense that it can be applied toarbitrary predicates. On the other hand, it works only within the generic ABE frameworkrecently proposed by Attrapadung (Eurocrypt’14), which provides a generic compilerthat compiles a simple primitive called pair encodings into fully secure ABE. Insidethis framework, Attrapadung proposed the first generic dual conversion that works onlyfor subclass of encodings, namely, perfectly secure encodings. However, there are manypredicates for which realizations of such encodings are not known, and hence the problemsof constructing fully secure ABE for their dual predicates were left unsolved.In this paper, we revisit the dual conversion of Attrapadung, and show that, somewhatsurprisingly, the very same conversion indeed also works for broader classes of encodings,namely, computationally secure encodings. Consequently, we thus solve the above openproblems as we obtain the first fully secure realizations of completely-unbounded CP-ABE and CP-ABE with short keys for Boolean formulae, via applying the conversion topreviously proposed KP-ABE.Moreover, we provide a generic conversion that converts ABE into its dual-policyvariant. Dual-policy ABE (DP-ABE) conjunctively combines both KP-ABE and CP-ABE into one primitive, and hence can be useful in general-purpose applications. Asfor instantiations, we obtain the first realizations of fully secure DP-ABE for formulae,unbounded DP-ABE for formulae, and DP-ABE for regular languages. The latter twosystems are the first to realize such functionalities, let alone are fully secure.
منابع مشابه
Improved Dual System ABE in Prime-Order Groups via Predicate Encodings
We present a modular framework for the design of efficient adaptively secure attribute-based encryption(ABE) schemes for a large class of predicates under the standard k-Lin assumption in prime-order groups; this is thefirst uniform treatment of dual system ABE across different predicates and across both composite and prime-ordergroups. Via this framework, we obtain concrete efficie...
متن کاملDual System Encryption Framework in Prime-Order Groups via Computational Pair Encodings
We propose a new generic framework for achieving fully secure attribute based encryption (ABE) in prime-order bilinear groups. It is generic in the sense that it can be applied to ABE for arbitrary predicate. All previously available frameworks that are generic in this sense are given only in composite-order bilinear groups, of which operations are known to be much less efficient than in prime-...
متن کاملDual System Encryption via Predicate Encodings
We introduce the notion of predicate encodings, an information-theoretic primitive reminiscent of linear secret-sharing that in addition, satisfies a novel notion of reusability. Using this notion, we obtain a unifying framework for adaptively-secure public-index predicate encryption schemes for a large class of predicates. Our framework relies onWaters’ dual system encryption methodology (Cryp...
متن کاملDecentralizing Policy-Hiding Attribute-Based Encryption
Attribute-based encryption (ABE) enables limiting access to encrypted data to users who possess certain attributes. Different aspects of ABE have been studied, such as the multi-authority setting (MA-ABE), and policy hiding, meaning the access policy is unknown to unauthorized parties, as in predicate encryption (PE). However, no practical scheme so far provided both properties, which are often...
متن کاملDoS-Resistant Attribute-Based Encryption in Mobile Cloud Computing with Revocation
Security and privacy are very important challenges for outsourced private data over cloud storages. By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage. In this paper, we extend previous Ciphertext Policy ABE (CP-ABE) schemes especially for mobile and resource-constrained devices in a cloud computing environment in two aspects, a ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2015 شماره
صفحات -
تاریخ انتشار 2015