Download presentation
1
Attribute-Based Encryption
Brent Waters SRI International Joint work with Vipul Goyal, Omkant Pandey, and Amit Sahai
2
IBE [BF01] Is regular PKI good enough?
IBE: [BF01] Public key encryption scheme where public key is an arbitrary string (ID). Examples: user’s address Is regular PKI good enough? I am Private key encrypted using public key: Alice does not access a PKI CA/PKG Authority is offline master-key
3
Generalizing the Framework
Capability Request Private “Capability” Encrypt “Structured” Data CA/PKG Authority is offline master-key
4
Attributed-Based Encryption(ABE) [SW05]
Encrypt Data with descriptive “Attributes” Users Private Keys reflect Decryption Policies master-key CA/PKG Authority is offline Encrypt w/attributes
5
An Encrypted Filesystem
Encrypted Files on Untrusted Server Label files with attributes File 1 “Creator: bsanders” “Computer Science” “Admissions” “Date: ” File 2 “Creator: akeen” “History” “Hiring” “Date: ”
6
An Encrypted Filesystem
“Creator: bsanders” “Computer Science” “Admissions” “Date: ” Authority OR File 2 “Creator: akeen” “History” “Hiring” “Date: ” AND “bsmith” “CS” “admissions”
7
This Talk Threshold ABE & Biometrics More “Advanced” ABE Other Systems
8
A Warmup: Threshold ABE[SW05]
Data labeled with attributes Keys of form “At least k” attributes Application: IBE with Biometric Identities
9
Biometric Identities Iris Scan Voiceprint Fingerprint
10
Biometric Identities Stay with human Are unique No registration
Certification is natural
11
Biometric Identities Deviations Environment
Difference in sensors Small change in trait Can’t use previous IBE solutions!
12
Error-tolerance in Identity
k attributes must match Example: 5 attributes Public Key master-key CA/PKG Private Key 5 matches
13
Error-tolerance in Identity
k attributes must match Example: 5 attributes Public Key Private Key CA/PKG 3 matches master-key
14
Secret Sharing Split message M into shares such that need k to reconstruct Choose random k-1 degree polynomial, q, s.t. q(0)=M Need k points to interpolate
15
First Method Key Pair per Trait Encrypt shares of message
Deg. 4 (need 5 traits) polynomial q(x), such that q(0)=M Ciphertext E3(q(3))... 5 Private Key 2 7 8 11 13 16 q(x) at 5 points ) q(0)=M
16
Collusion Attack Private Key 5 6 7 9 10 8 6 8 9 7 5 10
17
Our Approach Goals Threshold Collusion Resistance Methods
Secret-share private key Bilinear maps
18
Bilinear Maps G , G1 : finite cyclic groups of prime order p.
Def: An admissible bilinear map e: GG G is: Bilinear: e(ga, gb) = e(g,g)ab a,bZ, gG Non-degenerate: g generates G e(g,g) generates G1 . Efficiently computable.
19
The SW05 Threshold ABE system
Public Parameters e(g,g)y 2 G1, gt1, gt2,.... gtn 2 G Private Key Random degree 4 polynomial q(x) s.t. q(0)=y gq(5)/t5 Bilinear Map e(g,g)rq(5) Ciphertext gr¢ t5 Me(g,g)ry Interpolate in exponent to get e(g,g)rq(0)=e(g,g)ry
20
Intuition Threshold Need k values of e(g,g)rq(x) Collusion resistance
Can’t combine private key components ( shares of q(x), q’(x) ) Reduction Given ga,gb,gc distinguish e(g,g)ab/c from random
21
Moving Beyond Threshold ABE
Threshold ABE not very expressive “Grafting” has limitations Shamir Secret Sharing => k of n Base new ABE off of general secret sharing schemes OR AND “ksmith” “CS” “admin”
22
Access Trees [Ben86] Secret Sharing for tree-structure of AND + OR
Replicate ORs Split ANDs s OR s AND AND OR s-s’’ s’’ Alice Bob Charlie s’ s-s’ s’’ Doug Edith
23
Key-Policy Attribute-Based Encryption [GPSW06]
Encryption similar to Threshold ABE Keys reflect a tree access structure Randomness to prevent collusion! Use Threshold Gates Decrypt iff attributes from CT satisfy key’s policy OR AND “ksmith” “CS” “admin”
24
Delegation Can delegate any key to a more restrictive policy
Subsumes Hierarchical-IBE OR AND “ksmith” Year=2005 “CS” “admin”
25
A comparison ABE [GPSW06] Arbitrary Attributes Expressive Policy
Attributes in Clear Hidden Vector Enc. [BW06] Fields Fixed at Setup Conjunctions & don’t care Hidden Attributes
26
Ciphertext Policy ABE (opposite)
Encrypt Data reflect Decryption Policies Users’ Private Keys are descriptive attributes master-key CA/PKG “Blond”, “Well-dressed”, “Age=21”, “Height=5’2” OR AND “Rhodes Scholar” “25-35” “millionaire”
27
Multi-Authority ABE [Chase07]
Authorities over different domains E.g. DMV and IRS Challenge: Prevent Collusion Across Domains Insight: Use “globally verifiable ID/attribute” to link
28
Open Problems Ciphertext Policy ABE ABE with “hidden attributes”
Policies from Circuits instead of Trees
29
Generalizing the Framework
Capability Request Private “Capability” Encrypt “Structured” Data CA/PKG Authority is offline master-key
30
Health Records Weight=125 Height = 5’4 Age = 46 Blood Pressure= 125
Partners = … If Weight/Height >30 AND Age > 45 Output Blood Pressure Private “Capability” No analogous PKI solution CA/PKG Authority is offline master-key
31
THE END
32
Related Work Secret Sharing Schemes [Shamir79, Benaloh86…]
Allow Collusion Building from IBE + Secret Sharing [Smart03, Juels] IBE gives key Compression Not Collusion Resistant
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.