attribute-based encryption (20110705) threshold abe (20110719) kp-abe (20110719) cp-abe (20111003)...

42
Attribute-based Encryption (20110705) Threshold ABE (20110719) KP-ABE (20110719) CP-ABE (20111003) v2 1

Upload: shane-hallsted

Post on 14-Jan-2016

233 views

Category:

Documents


4 download

TRANSCRIPT

Page 1: Attribute-based Encryption (20110705) Threshold ABE (20110719) KP-ABE (20110719) CP-ABE (20111003) v2 1

Attribute-based Encryption

(20110705) Threshold ABE

(20110719) KP-ABE

(20110719) CP-ABE

(20111003) v21

Page 2: Attribute-based Encryption (20110705) Threshold ABE (20110719) KP-ABE (20110719) CP-ABE (20111003) v2 1

Attribute-Based Encryption

[SW05] Threshold ABE

[GPSW06] Key-policy ABE

[BSW07] Cipher-policy ABE

2

Page 3: Attribute-based Encryption (20110705) Threshold ABE (20110719) KP-ABE (20110719) CP-ABE (20111003) v2 1

[SW05] THRESHOLD ABE

3

Page 4: Attribute-based Encryption (20110705) Threshold ABE (20110719) KP-ABE (20110719) CP-ABE (20111003) v2 1

Threshold ABE

aka Fuzzy IBE

Using biometrics in IBE

Identity as a set of “attributes”

First propose the term of Attribute Based Encryption

4

Page 5: Attribute-based Encryption (20110705) Threshold ABE (20110719) KP-ABE (20110719) CP-ABE (20111003) v2 1

Threshold ABE

5

Page 6: Attribute-based Encryption (20110705) Threshold ABE (20110719) KP-ABE (20110719) CP-ABE (20111003) v2 1

Setup

Bilinear map: e e: G1× G1 -> G2 G1 has prime order p g is a generator of G1

6

Page 7: Attribute-based Encryption (20110705) Threshold ABE (20110719) KP-ABE (20110719) CP-ABE (20111003) v2 1

Setup

7

Page 8: Attribute-based Encryption (20110705) Threshold ABE (20110719) KP-ABE (20110719) CP-ABE (20111003) v2 1

Setup

8

Page 9: Attribute-based Encryption (20110705) Threshold ABE (20110719) KP-ABE (20110719) CP-ABE (20111003) v2 1

Encryption

9

Page 10: Attribute-based Encryption (20110705) Threshold ABE (20110719) KP-ABE (20110719) CP-ABE (20111003) v2 1

Extract

10

Page 11: Attribute-based Encryption (20110705) Threshold ABE (20110719) KP-ABE (20110719) CP-ABE (20111003) v2 1

Decryption

11

Page 12: Attribute-based Encryption (20110705) Threshold ABE (20110719) KP-ABE (20110719) CP-ABE (20111003) v2 1

Decryption

12

Page 13: Attribute-based Encryption (20110705) Threshold ABE (20110719) KP-ABE (20110719) CP-ABE (20111003) v2 1

[GPSW06] KEY-POLICY ABE

13

Page 14: Attribute-based Encryption (20110705) Threshold ABE (20110719) KP-ABE (20110719) CP-ABE (20111003) v2 1

Key-policy ABE

Ciphertexts are labeled with a set of attributes

private keys are associated with access

structures that control which ciphertext a user is able to decrypt.

14

Page 15: Attribute-based Encryption (20110705) Threshold ABE (20110719) KP-ABE (20110719) CP-ABE (20111003) v2 1

Example

C1(3,5,6,7) ╳ K1( 1 and 2) ○ K2( 3 or 5 ) ○ K3( (1 and 2) or (3 and 7) ) ○ K4 ( 3 out of (1,2,3,4,5,6,7) ) ╳ K5 ( 2 out of (1,2,5) )

15

Page 16: Attribute-based Encryption (20110705) Threshold ABE (20110719) KP-ABE (20110719) CP-ABE (20111003) v2 1

Access Tree

(“child” and “<120cm”) or (2 of (“student”, ”<20”, ”disabled”,))

OR

AND 2 of 3

“student” “disabled”

“<20”

“<120cm”

“child”

16

Page 17: Attribute-based Encryption (20110705) Threshold ABE (20110719) KP-ABE (20110719) CP-ABE (20111003) v2 1

Access Tree

parent(x): parent of a node x

att(x): if x is a leaf node then return the attribute associated with x

17

Page 18: Attribute-based Encryption (20110705) Threshold ABE (20110719) KP-ABE (20110719) CP-ABE (20111003) v2 1

Access Tree

18

Page 19: Attribute-based Encryption (20110705) Threshold ABE (20110719) KP-ABE (20110719) CP-ABE (20111003) v2 1

Access Tree

index(x): return node’s index

1

8

32

5 67

4

19

Page 20: Attribute-based Encryption (20110705) Threshold ABE (20110719) KP-ABE (20110719) CP-ABE (20111003) v2 1

Setup

Bilinear map: e e: G1× G1 -> G2 G1 has prime order p g is a generator of G1

20

Page 21: Attribute-based Encryption (20110705) Threshold ABE (20110719) KP-ABE (20110719) CP-ABE (20111003) v2 1

Setup

21

Page 22: Attribute-based Encryption (20110705) Threshold ABE (20110719) KP-ABE (20110719) CP-ABE (20111003) v2 1

Setup

22

Page 23: Attribute-based Encryption (20110705) Threshold ABE (20110719) KP-ABE (20110719) CP-ABE (20111003) v2 1

Encryption

23

Page 24: Attribute-based Encryption (20110705) Threshold ABE (20110719) KP-ABE (20110719) CP-ABE (20111003) v2 1

Key Generation KeyGen(T, MK)

Choose a polynomial qx for each node:q1, q2, q3, … , q8. degree(qx) = K(x) - 1 degree(q1) = 0 degree(q2) = 1 degree(q3) = 1 degree(q4) = 0 ︴ degree(q8) = 0

24

Page 25: Attribute-based Encryption (20110705) Threshold ABE (20110719) KP-ABE (20110719) CP-ABE (20111003) v2 1

Key Generation

q1(0)=y

q2(0)=q1(2) q3(0)=q1(3)

q4(0)=q2(4) q5(0)=q2(5) q6(0)=q3(6)

q7(0)=q3(7)q8(0)=q3(8)

25

Page 26: Attribute-based Encryption (20110705) Threshold ABE (20110719) KP-ABE (20110719) CP-ABE (20111003) v2 1

Key Generation

26

Page 27: Attribute-based Encryption (20110705) Threshold ABE (20110719) KP-ABE (20110719) CP-ABE (20111003) v2 1

Decryption

27

Page 28: Attribute-based Encryption (20110705) Threshold ABE (20110719) KP-ABE (20110719) CP-ABE (20111003) v2 1

28

Page 29: Attribute-based Encryption (20110705) Threshold ABE (20110719) KP-ABE (20110719) CP-ABE (20111003) v2 1

q6(0)=q3(6)

q7(0)=q3(7)

q3(0)=q1(3)

29

Page 30: Attribute-based Encryption (20110705) Threshold ABE (20110719) KP-ABE (20110719) CP-ABE (20111003) v2 1

[BSW07] CIPHER-POLICY ABE

30

Page 31: Attribute-based Encryption (20110705) Threshold ABE (20110719) KP-ABE (20110719) CP-ABE (20111003) v2 1

Cipher-policy ABE

Private keys are labeled with a set S of attributes

Ciphertexts are associated with access

structures T that control which user is able to decrypt the ciphertext.

31

Page 32: Attribute-based Encryption (20110705) Threshold ABE (20110719) KP-ABE (20110719) CP-ABE (20111003) v2 1

Example

C1( (1 and 2) or (3 of (4,5,6,7)) )

╳ K1( 1) ○ K2(1, 2) ○ K3(4,5,6) ○ K4 (1,2,4,6,7) ╳ K5 (4,5,8)

32

Page 33: Attribute-based Encryption (20110705) Threshold ABE (20110719) KP-ABE (20110719) CP-ABE (20111003) v2 1

Setup

Bilinear map: e e: G1× G1 -> G2 G1 has prime order p g is a generator of G1

33

Page 34: Attribute-based Encryption (20110705) Threshold ABE (20110719) KP-ABE (20110719) CP-ABE (20111003) v2 1

Setup

U = {a1=child, a2=<120cm, … ,an } U is the set of all attributes

H: U -> G1

34

Page 35: Attribute-based Encryption (20110705) Threshold ABE (20110719) KP-ABE (20110719) CP-ABE (20111003) v2 1

Setup

35

Page 36: Attribute-based Encryption (20110705) Threshold ABE (20110719) KP-ABE (20110719) CP-ABE (20111003) v2 1

Encryption

36

Page 37: Attribute-based Encryption (20110705) Threshold ABE (20110719) KP-ABE (20110719) CP-ABE (20111003) v2 1

Encryption

q1(0)=s

q2(0)=q1(2) q3(0)=q1(3)

q4(0)=q2(4) q5(0)=q2(5) q6(0)=q3(6)

q7(0)=q3(7)q8(0)=q3(8)

37

Page 38: Attribute-based Encryption (20110705) Threshold ABE (20110719) KP-ABE (20110719) CP-ABE (20111003) v2 1

Encryption

38

Page 39: Attribute-based Encryption (20110705) Threshold ABE (20110719) KP-ABE (20110719) CP-ABE (20111003) v2 1

Key Generation

39

Page 40: Attribute-based Encryption (20110705) Threshold ABE (20110719) KP-ABE (20110719) CP-ABE (20111003) v2 1

Decryption

40

Page 41: Attribute-based Encryption (20110705) Threshold ABE (20110719) KP-ABE (20110719) CP-ABE (20111003) v2 1

41

Page 42: Attribute-based Encryption (20110705) Threshold ABE (20110719) KP-ABE (20110719) CP-ABE (20111003) v2 1

42