Attribute based Encryption: Traitor Tracing, Revocation and Fully Security on Prime Order Groups

Xiaoyi Li, Kaitai Liang, Zhen Liu, Duncan Wong

Abstract

A Ciphertext-Policy Attribute-Based Encryption (CP-ABE) allows users to specify the access policies without having to know the identities of users. In this paper, we contribute by proposing an ABE scheme which enables revoking corrupted users. Given a key-like blackbox, our system can identify at least one of the users whose key must have been used to construct the blackbox and can revoke the key from the system. This paper extends the work of Liu and Wong to achieve traitor revocability. We construct an Augmented Revocable CPABE (AugR-CP-ABE) scheme, and describe its security by message-hiding and index-hiding games. Then we prove that an AugR-CP-ABE scheme with message-hiding and index-hiding properties can be transferred to a secure Revocable CP-ABE with fully collusion-resistant blackbox traceability. In the proof for index-hiding, we divide the adversary’s behaviors in two ways and build direct reductions that use adversary to solve the D3DH problem. Our scheme achieves the sub-linear overhead of O(√N), where N is the number of users in the system. This scheme is highly expressive and can take any monotonic access structures as ciphertext policies.

References

  1. Attrapadung, N. and Imai, H. (2009). Conjunctive broadcast and attribute-based encryption. In Pairing, pages 248- 265.
  2. Bethencourt, J., Sahai, A., and Waters, B. (2007). Ciphertext-policy attribute-based encryption. In IEEE Symposium on Security and Privacy, pages 321-334.
  3. Cheung, L. and Newport, C. C. (2007). Provably secure ciphertext policy ABE. In ACM Conference on Computer and Communications Security, pages 456-465.
  4. Deng, H., Wu, Q., Qin, B., Mao, J., Liu, X., Zhang, L., and Shi, W. (2014). Who is touching my cloud. In ESORICS, Part I, pages 362-379.
  5. Garg, S., Kumarasubramanian, A., Sahai, A., and Waters, B. (2010). Building efficient fully collusion-resilient traitor tracing and revocation schemes. In ACM Conference on Computer and Communications Security, pages 121-130.
  6. Goyal, V., Jain, A., Pandey, O., and Sahai, A. (2008). Bounded ciphertext policy attribute based encryption. In ICALP (2), pages 579-591.
  7. Herranz, J., Laguillaumie, F., and Ràfols, C. (2010). Constant size ciphertexts in threshold attribute-based encryption. In Public Key Cryptography, pages 19-34.
  8. Lewko, A. B. (2012). Tools for simulating features of composite order bilinear groups in the prime order setting. In EUROCRYPT, pages 318-335.
  9. Lewko, A. B., Okamoto, T., Sahai, A., Takashima, K., and Waters, B. (2010). Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption. In EUROCRYPT, pages 62- 91.
  10. Lewko, A. B. and Waters, B. (2012a). New proof methods for attribute-based encryption: Achieving full security through selective techniques. In CRYPTO, pages 180- 198.
  11. Lewko, A. B. and Waters, B. (2012b). New proof methods for attribute-based encryption: Achieving full security through selective techniques. IACR Cryptology ePrint Archive, 2012:326.
  12. Li, X., Liang, K., Liu, Z., and Wong, D. S. (2016). Attribute based encryption: Traitor tracing, revocation and fully security on prime order groups. IACR Cryptology ePrint Archive, 2016:1140.
  13. Liu, Z., Cao, Z., and Wong, D. S. (2013a). Blackbox traceable CP-ABE: how to catch people leaking their keys by selling decryption devices on ebay. In ACM Conference on Computer and Communications Security, pages 475-486.
  14. Liu, Z., Cao, Z., and Wong, D. S. (2013b). White-box traceable ciphertext-policy attribute-based encryption supporting any monotone access structures. IEEE Transactions on Information Forensics and Security, 8(1):76-88.
  15. Liu, Z. and Wong, D. S. (2015a). Practical ciphertext-policy attribute-based encryption: Traitor tracing, revocation, and large universe. In Malkin, T., Kolesnikov, V., Lewko, A. B., and Polychronakis, M., editors, Applied Cryptography and Network Security - 13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers, volume 9092 of Lecture Notes in Computer Science, pages 127- 146. Springer.
  16. Liu, Z. and Wong, D. S. (2015b). Traceable CP-ABE on prime order groups: Fully secure and fully collusionresistant blackbox traceable. In Qing, S., Okamoto, E., Kim, K., and Liu, D., editors, Information and Communications Security - 17th International Conference, ICICS 2015, Beijing, China, December 9- 11, 2015, Revised Selected Papers, volume 9543 of Lecture Notes in Computer Science, pages 109-124. Springer.
  17. Okamoto, T. and Takashima, K. (2008). Homomorphic encryption and signatures from vector decomposition. In Pairing, pages 57-74.
  18. Okamoto, T. and Takashima, K. (2009). Hierarchical predicate encryption for inner-products. In ASIACRYPT, pages 214-231.
  19. Okamoto, T. and Takashima, K. (2010). Fully secure functional encryption with general relations from the decisional linear assumption. In Crypto, pages 191-208.
  20. Rouselakis, Y. and Waters, B. (2013). Practical constructions and new proof methods for large universe attribute-based encryption. In ACM Conference on Computer and Communications Security, pages 463- 474.
  21. Sahai, A., Seyalioglu, H., and Waters, B. (2012). Dynamic credentials and ciphertext delegation for attributebased encryption. In CRYPTO, pages 199-217.
  22. Sahai, A. and Waters, B. (2005). Fuzzy identity-based encryption. In Eurocrypt, pages 457-473.
  23. Waters, B. (2011). Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization. In Public Key Cryptography, pages 53-70.
Download


Paper Citation


in Harvard Style

Li X., Liang K., Liu Z. and Wong D. (2017). Attribute based Encryption: Traitor Tracing, Revocation and Fully Security on Prime Order Groups . In Proceedings of the 7th International Conference on Cloud Computing and Services Science - Volume 1: CLOSER, ISBN 978-989-758-243-1, pages 309-320. DOI: 10.5220/0006220203090320


in Bibtex Style

@conference{closer17,
author={Xiaoyi Li and Kaitai Liang and Zhen Liu and Duncan Wong},
title={Attribute based Encryption: Traitor Tracing, Revocation and Fully Security on Prime Order Groups},
booktitle={Proceedings of the 7th International Conference on Cloud Computing and Services Science - Volume 1: CLOSER,},
year={2017},
pages={309-320},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0006220203090320},
isbn={978-989-758-243-1},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 7th International Conference on Cloud Computing and Services Science - Volume 1: CLOSER,
TI - Attribute based Encryption: Traitor Tracing, Revocation and Fully Security on Prime Order Groups
SN - 978-989-758-243-1
AU - Li X.
AU - Liang K.
AU - Liu Z.
AU - Wong D.
PY - 2017
SP - 309
EP - 320
DO - 10.5220/0006220203090320