new proof methods for attribute based encryption
play

New Proof Methods for Attribute-Based Encryption: Achieving Full - PowerPoint PPT Presentation

New Proof Methods for Attribute-Based Encryption: Achieving Full Security through Selective Techniques Allison Lewko Brent Waters Roots of Attribute-Based Encryption Moving beyond Public Key Encryption: CEO Manager 1 Manager 2 Bob


  1. New Proof Methods for Attribute-Based Encryption: Achieving Full Security through Selective Techniques Allison Lewko Brent Waters

  2. Roots of Attribute-Based Encryption Moving beyond Public Key Encryption: CEO Manager 1 Manager 2 “Bob” Alice employee employee Encrypt to “Bob” Individual + superiors Encrypt to Bob “users with hats” Hierarchical Identity-based Attribute-based Identity-based Encryption [S84,BF01,C01] Encryption [SW05] Encryption [HL02,GS02]

  3. Two Kinds of ABE Ciphertext Policy ABE: {A, C} (A Ç B) Æ C Key Policy ABE: (A Ç B) Æ C {A, C}

  4. Security Goal for ABE Public Params Challenger Attacker S 1 Repeat S 1 MSK M 0 , M 1 , Policy S i : set of attributes Enc(M b , PP, policy) S 2 Repeat S 2

  5. Proof Challenges  Hard problem ABE Hard problem ABE attacker Simulator breaks ABE Challenge: simulator must: • respond to key requests • leverage attacker’s success on challenge

  6. Partitioning Proofs Previous approach – Partitioning [BF01, BB04, W05, GPSW06] Key Space We Need: Key Request Keys Simulator Key Request Can Make Key Request Abort Can’t Make Challenge Abort Challenge

  7. Problem: Why Should Attacker Respect the Partition? Two Approaches: 1. Make Attacker Commit (weaker) selective security 2. Guess and quit when wrong HA!

  8. Selectively Secure ABE [GPSW06, W11] Selectively Secure KP-ABE [GPSW06]: Attribute set S Public Parameters Formulas NOT satisfied by S Satisfied Simulator by S

  9. Selectively Secure ABE [GPSW06, W11] Selectively Secure CP-ABE [W11]: Access Policy P Public Parameters Sets NOT satisfying P Simulator Satisfying P

  10. Dual System Encryption [W09] Normal Used in real system   Normal  Semi-Functional

  11. A Dual System Encryption Proof Hardest step previously done Real Security Game: Hybrid Argument: With info-theoretic argument - Efficiency drawbacks Not Compatible! M b Regardless of Compability! High probability decryption failure Incompatiblity of key/CT Message independent CT Decryption failure

  12. Dual System Encryption Reimagined Decompose: Parameters in S.F. Space “delayed” until Semi-functional Semi-functional first semi-functional component Space object appears! Normal Component Public Parameters Separated from PP Normal Space

  13. The Security Game in S.F. Space Public Params PP in S.F. Space S 1 Repeat M 0 , M 1 , policy Challenger Attacker Enc(M b , PP, policy) S i : sets of attributes S i Repeat

  14. Dividing the Proof: Two Cases Thought experiment: consider attacker requesting one key (generalize to many keys via hybrid argument) Case 1: CT request comes before key Access Policy P Sets NOT satisfying P challenger attacker Satisfying P Like selective CP-ABE! Semi-functional space

  15. Dividing the Proof: Two Cases Thought experiment: consider attacker requesting one key (generalize to many keys via hybrid argument) Case 2: key request comes before CT Set S Formulas NOT satisfied by S challenger attacker Satisfied by S Like selective KP-ABE! Semi-functional space

  16. Proof Schematic Timeline of Game -> Erase Message Partitioning proof Partitioning proof PP Key 1 Key 2 Key 3 Key 4 Key 5 Key 6 CT Expand into Expand into S.F. Space S.F. Space

  17. Summary of Techniques Selective security Selective security proof for KP-ABE proof for CP-ABE Dual System Encryption Fully Secure ABE

  18. Open Problems • Selectively secure CP-ABE from a non-“q-type” assumption ABE for more general policies (ideally, circuits) • - Progress to be reported later in this session

  19. Thanks for your attention! Questions?

Recommend


More recommend