Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption Allison Lewko Tatsuaki Okamoto Amit Sahai The.

Slides:



Advertisements
Similar presentations
Efficient Lattice (H)IBE in the standard model Shweta Agrawal, Dan Boneh, Xavier Boyen.
Advertisements

Quantum Software Copy-Protection Scott Aaronson (MIT) |
Boneh-Franklin Identity-based Encryption. 2 Symmetric bilinear groups G = ágñ, g p = 1 e: G G G t Bilinear i.e. e(u a, v b ) = e(u, v) ab Non-degenerate:
Simulation-sound NIZK Proofs for a Practical Language and Constant Size Group Signatures Jens Groth University of California Los Angeles Presenter: Eike.
Adaptively Attribute-Hiding ( Hierarchical ) Inner Product Encryption
Allison Lewko TexPoint fonts used in EMF.
Functional Encryption & Property Preserving Encryption
Probabilistic Public Key Encryption with Equality Test Duncan S. Wong Department of Computer Science City University of Hong Kong Joint work with Guomin.
Attribute-based Encryption
See you at the next conference! Hope you like our slides Hello everybody!
Russell Martin August 9th, Contents Introduction to CPABE Bilinear Pairings Group Selection Key Management Key Insulated CPABE Conclusion & Future.
CS555Topic 191 Cryptography CS 555 Topic 19: Formalization of Public Key Encrpytion.
Encryption Public-Key, Identity-Based, Attribute-Based.
Dual System Encryption: Concept, History and Recent works Jongkil Kim.
Foundations of Cryptography Lecture 13 Lecturer: Moni Naor.
Public-Key Encryption in the Bounded-Retrieval Model Joël Alwen, Yevgeniy Dodis, Moni Naor, Gil Segev, Shabsi Walfish, Daniel Wichs Earlier Today: Yevgeniy.
On the Practical Security of Inner Product Functional Encryption Shashank Agrawal (UIUC), Shweta Agrawal (IIT Delhi), Saikrishna Badrinarayanan (UCLA),
Dual System Encryption: Realizing IBE and HIBE from Simple Assumptions Brent Waters.
S EMANTICALLY - SECURE FUNCTIONAL ENCRYPTION : P OSSIBILITY RESULTS, IMPOSSIBILITY RESULTS AND THE QUEST FOR A GENERAL DEFINITION Adam O’Neill, Georgetown.
Dennis Hofheinz, Jessica Koch, Christoph Striecks
1 IDENTITY BASED ENCRYPTION SECURITY NOTIONS AND NEW IBE SCHEMES FOR SAKAI KASAHARA KEY CONSTRUCTION N. DENIZ SARIER.
Models and Security Requirements for IDS. Overview The system and attack model Security requirements for IDS –Sensitivity –Detection Analysis methodology.
Identity Based Encryption
Co-operative Private Equality Test(CPET) Ronghua Li and Chuan-Kun Wu (received June 21, 2005; revised and accepted July 4, 2005) International Journal.
1 Identity-Based Encryption form the Weil Pairing Author : Dan Boneh Matthew Franklin Presentered by Chia Jui Hsu Date :
A Designer’s Guide to KEMs Alex Dent
Asymmetric Cryptography part 1 & 2 Haya Shulman Many thanks to Amir Herzberg who donated some of the slides from
1 Conjunctive, Subset, and Range Queries on Encrypted Data Dan Boneh Brent Waters Stanford University SRI International.
Strongly Secure Certificateless Encryption Alexander W. Dent Information Security Group
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
ON THE PROVABLE SECURITY OF HOMOMORPHIC ENCRYPTION Andrej Bogdanov Chinese University of Hong Kong Bertinoro Summer School | July 2014 based on joint work.
Ciphertext-Policy, Attribute-Based Encryption Brent Waters SRI International John Bethencourt CMU Amit Sahai UCLA.
Functional Encryption: An Introduction and Survey Brent Waters.
Cryptography Lecture 8 Stefan Dziembowski
1 Hierarchical Identity-Based Encryption with Constant Size Ciphertext Dan Boneh, Xavier Boyen and Eu-Jin Goh Eurocrypt 2005 投影片製作:張淑慧.
Functional Encryption: Beyond Public Key Cryptography
1 Attribute-Based Encryption Brent Waters SRI International.
1 Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data Vipul Goyal Omkant Pandey Amit Sahai Brent Waters UCLA SRI.
Background on security
Cryptography Lecture 2 Arpita Patra. Summary of Last Class  Introduction  Secure Communication in Symmetric Key setting >> SKE is the required primitive.
Public Key Encryption with keyword Search Author: Dan Boneh Rafail Ostroversity Giovanni Di Crescenzo Giuseppe Persiano Presenter: 陳昱圻.
Indifferentiability of Permutation-Based Compression Functions and Tree-Based Modes of Operation, with Applications to MD6 Yevgeniy Dodis Leonid Reyzin.
Witness Encryption and Indistinguishability Obfuscation from the Multilinear Subgroup Elimination Assumption Craig Gentry IBM Allison Lewko Columbia Amit.
Attribute-Based Encryption
1 Efficient Ring Signatures Without Random Oracles Hovav Shacham and Brent Waters.
1 Efficient Selective-ID IBE Without Random Oracle Dan Boneh Stanford University Xavier Boyen Voltage Security.
1/28 Chosen-Ciphertext Security from Identity- Based Encryption Jonathan Katz U. Maryland Ran Canetti, Shai Halevi IBM.
1 Compact Group Signatures Without Random Oracles Xavier Boyen and Brent Waters.
Compact CCA-Secure Encryption for Messages of Arbitrary Length Presentation By: D. Vamsi Krishna CS09B006.
2011 IEEE TrustCom-11 Sushmita Ruj Amiya Nayak and Ivan Stojmenovic Regular Seminar Tae Hoon Kim.
Constructing Verifiable Random Functions for Large Input Spaces Brent Waters Susan Hohenberger.
Keyword search on encrypted data. Keyword search problem  Linux utility: grep  Information retrieval Basic operation Advanced operations – relevance.
Online/Offline Attribute-Based Encryption Brent WatersSusan Hohenberger Presented by Shai Halevi.
Topic 36: Zero-Knowledge Proofs
Group theory exercise.
Modern symmetric-key Encryption
Secrecy of (fixed-length) stream ciphers
Semantic Security and Indistinguishability in the Quantum World
Attribute-Based Encryption
Cryptography Lecture 6.
Fuzzy Identity Based Encryption
Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data An, Sanghong KAIST
Cryptography Lecture 25.
Rishab Goyal Venkata Koppula Brent Waters
Functional Encryption: An Introduction and Survey
Attribute-Based Encryption
The power of Pairings towards standard model security
Cryptography Lecture 21.
Compact Adaptively Secure ABE for NC1 from k-Lin
Cryptography Lecture 23.
Presentation transcript:

Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption Allison Lewko Tatsuaki Okamoto Amit Sahai The University of Texas at Austin NTT UCLA Katsuyuki Takashima Brent Waters Mitsubishi Electric The University of Texas at Austin

Functional Encryption Functionality f(x,y) – specifies what will be learned about ciphertext x y Learn f(x,y) and nothing else General applications: processing encrypted data, access control

Application Who should be able to read my data? access policy

Attribute-Based Encryption [SW05] Ciphertexts: associated with access formulas (A Ç B) Æ C Secret Keys: associated with attributes {A, C} Decryption: {A, C} satisfies (AÇB)ÆC {A, C} Message (A Ç B) Æ C

ABE Example OR AND AND Medical researcher Company X Doctor Hospital Y {Doctor, Hospital Z} {Nurse, Hospital Y}

ABE Algorithms Encrypt(PP, M, Access formula) MSK Public Params Setup (¸, U) Encrypt(PP, M, Access formula) KeyGen(PP, MSK, Set of attributes) Decrypt(PP, SK, CT) M

Security Definition (ABE) [IND-CPA GM84] Key Query Phase II Key Query Phase I Challenge Phase Setup Phase Challenger Attacker Public Params S1 MSK S1 S2 Si : set of attributes S2 M0, M1, access policy A Enc(Mb, A, PP) Same as Phase I – in both phases, no queried Si can satisfy A Attacker must guess b

 Proving Security Hard problem Hard problem ABE ABE attacker Make arrows ABE attacker Simulator breaks ABE

Challenges in Proving Security Simulator must: respond to key requests leverage attacker’s success on challenge

Partitioning Previous approach for IBE – Partitioning [BF01, BB04, W05] Key Space We hope: Key Request Key Requests Key Request Key Request Abort Challenge Challenge Abort Challenge

Partitioning with More Structure ID0 HIBE: ID0:ID1 ID0:ID2 ID0:ID1:ID3 ID0:ID2:ID4 ID0:ID2:ID5 Exponential security degradation in depth ABE: ( A Ç B Ç C) Æ (A Ç D) … Exponential security degradation in formula length

Previous Solutions Selective Security Model: Attacker declares challenge before seeing Public Parameters A weaker model of security To go to standard model by guessing –> exponential loss Until recently, only results were in this model Exception: Fully secure HIBE with polynomially many levels [G06, GH09]

Dual System Encryption [W09] New methodology for proving full security No partitioning, no aborts Simulator prepared to make any key and use any key as the challenge

Dual System Encryption Normal Used in real system Semi-Functional   Normal  Semi-Functional Types are indistinguishable (with a caveat)

Hybrid Security Proof Normal keys and ciphertext Normal keys, S.F. ciphertext S.F. ciphertext, keys turn S.F. one by one Security now much easier to prove

Previously on Dual System Encryption… [W09] Fully secure IBE and HIBE [LW10] Fully secure HIBE with short CTs negligible correctness error ciphertext size linear in depth of hierarchy no correctness error CT = constant # group elements closely resembles selectively secure scheme [BBG05]

Our Results - ABE Fully secure ABE arbitrary monotone access formulas security proven from static assumptions closely resembles selectively secure schemes [GPSW06, W08]

ABE – Solution Framework G = a bilinear group of order N = p1p2p3 e: G £ G ! GT is a bilinear map Subgroups Gp1, Gp2, Gp3 – orthogonal under e, e.g. e(Gp1, Gp2) = 1 Gp1 = main scheme Gp1 Gp2 = semi-functional space Gp3 Gp2 Gp3 = randomization for keys

ABE – Solution Framework Gp1 Gp2 Gp3 Normal S.F. Decryption: Key paired with CT under e Normal S.F.

Technical Challenge Achieve nominal semi-functionality: [LW10] ? S.F. key and S.F. CT correlated - decryption works in simulator’s view regular S.F. key in attacker’s view ? simulator can’t test for S.F.

Key Technique Semi-functional space imitates the main scheme Linear Secret Sharing Scheme: shares reconstructed in parallel in Gp1 and Gp2 shares secret shares secret Regular s.f. : red secret is random, masks blue result Nominal s.f. : red secret is 0, won’t hinder decryption

Key Technique Attacker doesn’t have key capable of decrypting Attacker can’t distinguish nominal from regular s.f. Oh no! I was fooled! Value shared in s.f. space is info-theoretically hidden

Illustrative Example ? ? A B {A} shared value = x AND share = z share = x-z Note if attacker has a different key for B it will have a different shared value associated {A}

Technical Challenge g1a±1+ z1r1 g2±2 + z2r2 g1r1g2r2 Hiding the shared value in the CT: blinding factors linked to attributes Ciphertext elements are of the form: share blinding share blinding g1a±1+ z1r1 g2±2 + z2r2 g1r1g2r2 random random where g1 2 Gp1 g2 2 Gp2 Attributes can only be used once in the formula

Encoding Solution Example: To use an attribute A up to 4 times : A A:1 (A Æ B) Ç (A Æ C) becomes (A:1 Æ B) Ç (A:2 Æ C) max times used fixed at setup It would be better to get rid of the one-use restriction Open problem

Summary of ABE result Full security ABE Static assumptions Similar to selectively secure schemes

Inner Product Encryption [KSW08] Ciphertexts and secret keys: associated with vectors x v Decryption: if x ¢ v = 0 Message x v Advantage: ciphertext policy can be hidden

Coming Attractions Stay tuned for CRYPTO 2010: full security for Inner Product/ Attribute-Based Encryption from decisional Linear Assumption by Okamoto and Takashima

Questions?