Combining ABCs with ABE: Privacy-Friendly Key Generation for Smart Card Based Attribute-Based Encryption

نویسنده

  • T. R. van de Kamp
چکیده

Attribute-Based Credential (ABC) schemes provide a privacy-friendly method to perform authentication. In such a system the user does not necessarily have to identify himself, but may reveal only partial information about him, i.e., attributes the user possesses. The use of this technique is a proper solution for several kinds of authentication where no full identification is required, e.g., buying liquor at the liquor store or opening the door to an office building. However, using Attribute-Based Encryption (ABE) provides some advantages of ABCs in the case of data protection. Ciphertext-Policy ABE schemes allow a user to define an access policy over an encrypted file, so that only the individuals possessing the right attributes can decrypt the file. The data authorization takes place when a user tries to decrypt a file; data access does not involve an on-line party such as would be required by an ABC system. A smart card implementation of the Identity Mixer (idemix) credentials system exists, making it feasible to implement the ABC system. Little progress has been made to create an ABE scheme that is suitable to run in a similar environment. Most ABE schemes require computationally complex decryption algorithms that take too much time to run on current smart cards. Moreover, many multi-authority ABE schemes violate the user’s privacy by requiring the user to reveal his unique identifier, enabling authorities to profile its users. We create an overview of different types of ABE schemes and describe several schemes in terms of security and efficiency. Using our classification, we select the [LW11] decentralized multi-authority ABE scheme that we can adapt to meet our requirements. We propose a Blind Key Generation protocol that provides a way to do privacy-friendly key issuance without the user having to reveal his identifier. We prove this protocol to be secure against three different types of attackers using the security definitions introduced by Green and Hohenberger [GH07]. Additionally, we propose an Off-card Decrypt protocol. This protocol enables us to outsource some of the most complex operations to a trusted device, yet safely store the decryption keys on the smart card and never reveal them.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

DoS-Resistant Attribute-Based Encryption in Mobile Cloud Computing with Revocation

Security and privacy are very important challenges for outsourced private data over cloud storages. By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage. In this paper, we extend previous Ciphertext Policy ABE (CP-ABE) schemes especially for mobile and resource-constrained devices in a cloud computing environment in two aspects, a ...

متن کامل

New Privacy-Preserving Architectures for Identity-/Attribute-based Encryption

The notion of identity-based encryption (IBE) was proposed as an economical alternative to public-key infrastructures. IBE is also a useful building block in various cryptographic primitives such as searchable encryption. A generalization of IBE is attribute-based encryption (ABE). A major application of ABE is fine-grained cryptographic access control of data. Research on these topics is still...

متن کامل

Integrating Anonymous Credentials with eIDs for Privacy-Respecting Online Authentication

Electronic Identity (eID) cards are rapidly emerging in Europe and are gaining user acceptance. As an authentication token, an eID card is a gateway to personal information and as such it is subject to privacy risks. Several European countries have taken extra care to protect their citizens against these risks. A notable example is the German eID card, which we take as a case study in this pape...

متن کامل

Attribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems

Electronic health record (EHR) system facilitates integrating patients' medical information and improves service productivity. However, user access to patient data in a privacy-preserving manner is still challenging problem. Many studies concerned with security and privacy in EHR systems. Rezaeibagha and Mu [1] have proposed a hybrid architecture for privacy-preserving accessing patient records...

متن کامل

Attribute-Based Identity Management Bridging the Cryptographic Design of ABCs with the Real World

Attribute-based credentials (ABCs) provide a new way to authenticate using selectively disclosed personal attributes, possibly without identification. Smart-card technology has now become sufficiently advanced to implement and deploy ABCs. This thesis focusses on the cryptographic and broader technical challenges of applying ABCs in identity management, both online and offline.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014