An Ad Hoc Group Signature Scheme for Accountable and Anonymous Access to Outsourced Data Chuang Wang a,b and Wensheng Zhang a a Department of Computer.

Slides:



Advertisements
Similar presentations
Simulation-sound NIZK Proofs for a Practical Language and Constant Size Group Signatures Jens Groth University of California Los Angeles Presenter: Eike.
Advertisements

Trusted Data Sharing over Untrusted Cloud Storage Provider Gansen Zhao, Chunming Rong, Jin Li, Feng Zhang, and Yong Tang Cloud Computing Technology and.
Efficient Information Retrieval for Ranked Queries in Cost-Effective Cloud Environments Presenter: Qin Liu a,b Joint work with Chiu C. Tan b, Jie Wu b,
BY JYH-HAW YEH COMPUTER SCIENCE DEPT. BOISE STATE UNIVERSITY Proxy Credential Forgery Attack to Two Proxy Signcryption Schemes.
Russell Martin August 9th, Contents Introduction to CPABE Bilinear Pairings Group Selection Key Management Key Insulated CPABE Conclusion & Future.
IAW 2006 Cascaded Authorization with Anonymous- Signer Aggregate Signatures Danfeng Yao Department of Computer Science Brown University Joint work with.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
Improving Privacy and Security in Multi- Authority Attribute-Based Encryption Advanced Information Security April 6, 2010 Presenter: Semin Kim.
Efficient Conjunctive Keyword-Searchable Encryption,2007 Author: Eun-Kyung Ryu and Tsuyoshi Takagi Presenter: 顏志龍.
Efficient fault-tolerant scheme based on the RSA system Author: N.-Y. Lee and W.-L. Tsai IEE Proceedings Presented by 詹益誌 2004/03/02.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Anonymity and Security in Public Internet Forums Ho-fung LEUNG Senior Member, IEEE Dept. of Computer Science & Engineering The Chinese University of Hong.
1 Hidden Exponent RSA and Efficient Key Distribution author: He Ge Cryptology ePrint Archive 2005/325 PDFPDF 報告人:陳昱升.
PRIAM: PRivate Information Access Management on Outsourced Storage Service Providers Mark Shaneck Karthikeyan Mahadevan Jeff Yongdae Kim.
Ciphertext-Policy, Attribute-Based Encryption Brent Waters SRI International John Bethencourt CMU Amit Sahai UCLA.
By Jyh-haw Yeh Boise State University ICIKM 2013.
Information Security and Management 13. Digital Signatures and Authentication Protocols Chih-Hung Wang Fall
Cong Wang1, Qian Wang1, Kui Ren1 and Wenjing Lou2
A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation.
Abstract Provable data possession (PDP) is a probabilistic proof technique for cloud service providers (CSPs) to prove the clients' data integrity without.
Xiaohua Jia Shen Zhen Graduate School Harbin Institute of Technology Data Security for Cloud Storage Systems 1.
An Efficient Identity-based Cryptosystem for
Guomin Yang et al. IEEE Transactions on Wireless Communication Vol. 6 No. 9 September
A Survey on Secure Cloud Data Storage ZENG, Xi CAI, Peng
DATA DYNAMICS AND PUBLIC VERIFIABILITY CHECKING WITHOUT THIRD PARTY AUDITOR GUIDED BY PROJECT MEMBERS: Ms. V.JAYANTHI M.E Assistant Professor V.KARTHIKEYAN.
General Key Management Guidance. Key Management Policy  Governs the lifecycle for the keying material  Hope to minimize additional required documentation.
Anonymous Identification in Ad Hoc Groups New York, NY, USAApril 6 th, 2004 Yevgeniy Dodis, Antonio Nicolosi, Victor Shoup
02/22/2005 Joint Seminer Satoshi Koga Information Technology & Security Lab. Kyushu Univ. A Distributed Online Certificate Status Protocol with Low Communication.
1 Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data Vipul Goyal Omkant Pandey Amit Sahai Brent Waters UCLA SRI.
1 A Secure System Based on Fingerprint Authentication Scheme Author : Zhe Wu,Jie Tian,Liang Li, Cai-ping Jiang,Xin Yang Prestented by Chia Jui Hsu.
Identity-Based Secure Distributed Data Storage Schemes.
Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems.
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
Fall, Privacy&Security - Virginia Tech – Computer Science Click to edit Master title style Collusion-Resistant Group Key Management Using Attribute-
Introduction to Public Key Infrastructure January 2004 CSG Meeting Jim Jokl.
Signcryption Parshuram Budhathoki Department of Mathematical Sciences Florida Atlantic University April 18, 2013
Identity-Based Distributed Provable Data Possession in Multi-Cloud Storage.
Content Sharing over Smartphone-Based Delay- Tolerant Networks.
Privacy Preserving Delegated Access Control in Public Clouds.
Public Key Encryption with keyword Search Author: Dan Boneh Rafail Ostroversity Giovanni Di Crescenzo Giuseppe Persiano Presenter: 陳昱圻.
Linkability of Some Blind Signature Schemes Swee-Huay Heng 1, Wun-She Yap 1 Khoongming Khoo 2 1 Multimedia University, 2 DSO National Laboratories.
Abstract With the advent of cloud computing, data owners are motivated to outsource their complex data management systems from local sites to the commercial.
Digital Signatures, Message Digest and Authentication Week-9.
Computer Science CSC 774 Adv. Net. Security1 Presenter: Tong Zhou 11/21/2015 Practical Broadcast Authentication in Sensor Networks.
Secure Conjunctive Keyword Search Over Encrypted Data Philippe Golle Jessica Staddon Palo Alto Research Center Brent Waters Princeton University.
Identity based signature schemes by using pairings Parshuram Budhathoki Department of Mathematical Science FAU 02/21/2013 Cyber Security Seminar, FAU.
m-Privacy for Collaborative Data Publishing
Attribute-Based Encryption With Verifiable Outsourced Decryption.
Security Analysis of a Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption Scheme.
1 An Ordered Multi-Proxy Multi-Signature Scheme Authors: Min-Shiang Hwang, Shiang-Feng Tzeng, Shu-Fen Chiou Speaker: Shu-Fen Chiou.
1 Compact Group Signatures Without Random Oracles Xavier Boyen and Brent Waters.
2011 IEEE TrustCom-11 Sushmita Ruj Amiya Nayak and Ivan Stojmenovic Regular Seminar Tae Hoon Kim.
Lecture 9 Overview. Digital Signature Properties CS 450/650 Lecture 9: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud.
ICICS2002, Singapore 1 A Group Signature Scheme Committing the Group Toru Nakanishi, Masayuki Tao, and Yuji Sugiyama Dept. of Communication Network Engineering.
VANETs. Agenda System Model → What is VANETs? → Why VANETs? Threats Proposed Protocol → AOSA → SPCP → PARROTS Evaluation → Entropy → Anonymity Set → Tracking.
Key Generation Protocol in IBC Author : Dhruti Sharma and Devesh Jinwala 論文報告 2015/12/24 董晏彰 1.
Online/Offline Attribute-Based Encryption Brent WatersSusan Hohenberger Presented by Shai Halevi.
HCBE: Achieving Fine-Grained Access Control in Cloud-based PHR Systems Xuhui Liu [1], Qin Liu [1], Tao Peng [2], and Jie Wu [3] [1] Hunan University, China.
Fast Transmission to Remote Cooperative Groups: A New Key Management Paradigm.
1 SFS: Secure File Sharing For Dynamic Groups In Cloud Shruthi Suresh M-tech CSE RCET.
CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring.
BY S.S.SUDHEER VARMA (13NT1D5816)
Shucheng Yu, Cong Wang, Kui Ren,
Key management issues in PGP
Sami Alsouri Özgür Dagdelen Stefan Katzenbeisser
Sindhusha Doddapaneni
Building an Encrypted and Searchable Audit Log
Slalom: Fast, Verifiable and Private Execution of Neural Networks in Trusted Hardware Kriti shreshtha.
Presentation transcript:

An Ad Hoc Group Signature Scheme for Accountable and Anonymous Access to Outsourced Data Chuang Wang a,b and Wensheng Zhang a a Department of Computer Science Iowa State University b Symantec Corporation

1 Background: Data Outsourcing remote un-trusted data storage server encrypt decrypt author authorized users

2 ABE (Attribute-based Encryption) OR AND “Computer Science” “ISU” ” Access Structure Graduate retrieve decrypt retrieve decrypt X derive key based on secrets associated with his attributes

3 Accountability? What if the secret doc is found exposed? A trusted third-party authority should be able to find out who have accessed the data (accountability/ traceability) Meanwhile, anonymity of users should be kept from entities other than the authority (including the un-trusted storage server) OR AND “Computer Science” “ISU” Symantec” Access Structure

4 Group Signature Scheme OR AND “Computer Science” “ISU” Symantec” Access Structure group public key (gpk) A user i’s personalized private key (gsk i ) m σ m = sign(gpk, gsk i, m) Verify(gpk, σ m )=1? Record σ m (Authority is able to trace the signature to user i.) Authorized Users

5 Group Signature Scheme: Problem OR AND “Computer Science” “ISU” Symantec” Access Structure group public key (gpk) A user i’s personalized private key (gsk i ) Access structures may be defined on the fly (when a document is outsourced) Significant communication overheads may need to set up private keys for the members of dynamic groups The groups of users satisfying the access structures are formed dynamically Authorized Users

6 Our Proposal: Ad Hoc Group Signature (AdHocSign) – Design Goals Objective: ad hoc group signature scheme. Design Requirements User anonymity: A successfully verified user could be any one of the authorized users. – Ex: Access Structure = “a AND b”; a successfully-verified user could be any one owning attributes a and b. – Ex: Access Structure = “(a AND b) OR c”; a successfully- verified user could be any one owning attributes a and b, or any one owning c, and the server and other users cannot know which of the above two cases occurs. Traceability: The authority is able to trace a signature to a user.

7 Our Proposal: Ad Hoc Group Signature (AdHocSign) – Design Goals Objective: ad hoc group signature scheme. Design Requirements User anonymity: A successfully verified user could be any one of the authorized users. Accountability (traceability): The authority is able to trace a signature to a user. Efficiency in communication (for group management): when a new access structure is created, no extra communication for group management (e.g., distributing keys) is required.

8 Our Proposal: Ad Hoc Group Signature (AdHocSign) – Key Ideas When a user joins: he/she is preloaded key materials for each attribute assigned. Storage CostCommunication Cost When a document (and associated access structure) posted to server: server is given key materials for the access structure (AS). A user’s attributes satisfy the AS Y Obtain: the user-specific and access structure-specific privacy key for group signature

9 Basis: Group Signature [BonehShacham’04] Complexity Assumptions: q-SDH problem Decision Linear problem x i, A i =g 1/(ζ+x i ) g, g’=g ζ user i’s private key (gsk i )public key (gpk) e(A i, g’×g ) = e(g, g) xixi bilinear mapping System-wide secret Signing: sign(gpk, gsk i, m)  σ m Verifying: verify(gpk, m, σ m )  1/0

10 AdHocSign: Roadmap of the Design What to do? Construct and give appropriate key materials to users and storage server, s.t., an authorized user is able to derive his/her private key as in the BS group signature scheme How? Consider a conjunction-only access structure – Ex: “a AND b” Consider a disjunction-only access structure – Ex: “a OR b” Consider a general (i.e., conjunction of disjunctive) access structure – Ex: “(a OR b) AND (c OR d)”

11 AdHocSign for Conjunction-only Access Structures: Intuition AND ab Access structure: T Secrets: α a, αbαb Authority Server Key materials: r a, r b Public key: g T = g g T ’ = g T ζ α a ×r a +α b ×r b User i Private key: x i Key materials: for attribute a: g i,a =g for attribute b: g i,b =g … … α a /(ζ+x i ) α b /(ζ+x i ) A i T = g i,a ×g i,b = g rbrb rara (α a ×r a +α b ×r b )/(ζ+x i ) e(A i T, g T ’×g T x i ) = e(g T, g T )

12 AdHocSign for Disjunction-only Access Structures: Intuition (1) OR ab Access structure: T Secrets: αa,αa, αb,αb, Authority Server Key materials: r a = r T /α a ; r b = r T /α b Public key: g T = g g T ’ = g T ζ rTrT User i Private key: x i Key materials: for attribute a: g i,a =g for attribute c: … … … α a /(ζ+x i ) A i T = g i,a = g rara r T /(ζ+x i ) e(A i T, g T ’×g T x i ) = e(g T, g T ) rTrT

13 AdHocSign for Disjunction-only Access Structures: Intuition (2) OR ab Access structure: T Secrets: αa,αa, αb,αb, Authority Server Key materials: r a = r T /α a ; r b = r T /α b User i Key materials: for attribute a: g i,a =g … … α a /(ζ+x i ) r T, ζ Problem: User i can derive g i,b = g i,a, r a /r b though user i does not own attribute b. Later on, user i can satisfy access structures such as “a AND b”, “b OR x”.

14 AdHocSign for Disjunction-only Access Structure: Intuition (3) The authority For each attribute a, multiple (instead of a single) secret numbers are picked: α a,1, α a,2, …, α a,N Each user i who owns attribute a is preloaded with N secrets (key materials): g i,a,1, g i,a,2, …, g i,a,N, where g i,a,k = g Every time when a new disjunction-only access structure, e.g., T=“a OR b”, is defined: r T is selected randomly r T,a = r T /α a,k1 and r T,b = r T /α b,k2, where α a,k1 and α b,k2 have not been used before A user i with attribute a or b should use g i,a,k1 or g i,b,k2 to derive its private key α a, k /(ζ+ x i )

15 AdHocSign for General Access Structures: Intuition OR cd Access structure α a,k1 Authority OR a b AND α b,k2 α c,k3 α d,k4 r T1 r T2 Server Key materials given to server: (a, k1, r T,a = r T1 / α a,k1 ) (b, k2, r T,b = r T1 / α b,k2 ) (c, k3, r T,c = r T2 / α c,k3 ) (d, k4, r T,d = r T2 / α d,k4 ) Public key: g T = g r T1 +r T2 g T ’ = g T ζ

16 AdHocSign for General Access Structures: Intuition User i Assume the user owns attributes a and d Key materials assigned to user i: For attribute a … g i,a,k1 = g … For attribute d … g i,d,k4 = g … α a,k1 /(ζ+x i ) α d,k4 /(ζ+x i ) Key materials provided by server: (a, k1, r T,a = r T1 / α a,k1 ) … …. (d, k4, r T,d = r T2 / α d,k4 ) A i T = g i,a,k1 × g i,d,k4 = g r T, a r T, d (r T1 +r T2 )/(ζ+x i ) Private key: (x i, A i T )

17 Security Features Traceability Intuitively: Storage server and/or collusive users are hard to forge valid signatures that cannot trace back to any of them, as long as the SDH problem is hard. Formally: Our proposed AdHocSign scheme is (t, q H, q S, n, m,ε) traceable if (q, t’, ε’)-SDH assumption holds, where n = q- 1, ε= 8n*sqrt(ε’q H ) + 2n/q, t’=O(tmN).

18 Security Features Selfless-anonymity Intuitively: Storage server and/or others are hard to determine if two signatures are pertinent to the same user or not, as long as the Decision Linear problem is hard. Formally: Our proposed AdHocSign scheme is (t, q H, q S, n, m,ε) selflessly anonymous if (t’, ε’) Decision Linear assumption holds, where ε’ = ε(1/n 2 – q S q H /p)/2.

19 Cost Analysis Computational cost User’s cost – Private key preparation – x exponential ops, where x is the number of disjunctive components in the access structure – typically lower than signing cost as long as x is not too large – Signing (using BS Group Signature Signing) Server’s cost – Verification (using BS Group Signature Signing) Overall: Typically less than twice of that of BS Group Signature scheme

20 Cost Analysis Communication cost O(L): L is the length of an access structure Storage cost O(Nx) – x - total number of attributes owned by a user – N - total number of secrets preloaded for each attribute N: the minimum number of different access structures that can be defined dynamically; in practice, more different access structures can be defined dynamically

21 Conclusion We design a new group signature scheme for dynamically-formed groups Selfless-anonymity Traceability No user key distribution at dynamic group forming time – at the cost of storing extra key materials when a user joins the system Applicable when: storage is cheaper than communication (cost for dynamic management of groups)

22 Thank you! Contacts of the authors {wzhang, Full paper:

23 Implementation Prototype development Based on jPBC (java pairing-based library) Adopting the type A curve Evaluation setup User: desktop with 1.83 GHz Genuine Intel processor and 3GB RAM Server: workstation with two 2.13 GHz Intel Xeon processors and 24 GB RAM Evaluation results BS Group Signature – Signing cost – 1.65 seconds by average – Verification cost – 0.28 seconds by average Private key computation in AdHocSign – ~0.1 second for each disjunctive component in the access structure