online/offline attribute-based encryption

19
Online/Offline Attribute-Based Encryption Brent Waters Susan Hohenberger Presented by Shai Halevi

Upload: monte

Post on 22-Feb-2016

46 views

Category:

Documents


0 download

DESCRIPTION

Online/Offline Attribute-Based Encryption. Susan Hohenberger. Brent Waters. Presented by Shai Halevi. SK. Access Control by Encryption. Idea: Need secret key to access data. PK. OR. AND. Internal Affairs. Undercover. Central. Rethinking Encryption. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Online/Offline  Attribute-Based Encryption

Online/Offline Attribute-Based Encryption

Brent WatersSusan Hohenberger

Presented by Shai Halevi

Page 2: Online/Offline  Attribute-Based Encryption

Access Control by EncryptionIdea: Need secret key to access data

SKPK

Page 3: Online/Offline  Attribute-Based Encryption

3

Rethinking EncryptionOR

Internal Affairs

AND

Undercover Central

Who matches this? Am I allowed to know?

What if they join later?

Problem: Disconnect between policy and mechanism

Page 4: Online/Offline  Attribute-Based Encryption

4

Attribute-Based Encryption [SW05,GPSW06,…]

Public Parameters

Authority

MSK

Key: f

SKCT: S (set of attributes)

Functionality: output message if f(S) = trueS is not hidden

Page 5: Online/Offline  Attribute-Based Encryption

5

Costs of Encryption

Typical cost ~ 1-3 exponentiations per attribute (KP-ABE)

Problems:• Bursty encryption periods• Low power devices

Page 6: Online/Offline  Attribute-Based Encryption

Can we move most of the encryption costs offline?

Page 7: Online/Offline  Attribute-Based Encryption

7

Online/Offline ABE

Offline:

Online:

Intermediate Ciphertext (IT)

Attribute set S

Ciphertext

ABE Key Encapsulation Mechanism (KEM)

Page 8: Online/Offline  Attribute-Based Encryption

8

Some Prior Online/Offline Work

Signatures: EGM96, ST01, …

Also in other contexts such as Multi-party computation

IBE: GMC08, …

Page 9: Online/Offline  Attribute-Based Encryption

9

The rest of the talk

(1)Warmup with IBE

(2) Our Online/Offline Construction

(3) “Pooling” for better efficiency

Page 10: Online/Offline  Attribute-Based Encryption

10

Brief Background on Bilinear maps

High Level: single multiplication

Page 11: Online/Offline  Attribute-Based Encryption

11

Structure Matters

CT:

Difficulty of online/offline on Boneh-Franklin IBE

Page 12: Online/Offline  Attribute-Based Encryption

12

IBE Warmup (Boneh-Boyen04 ish)

Offline:

Online (ID): “Correction Factor”

KeyGen(ID):

Decrypt:

Page 13: Online/Offline  Attribute-Based Encryption

13

Challenges for ABE

• Many ABE systems do not have right structure (e.g. GPSW06)

• More complex access policies

Use Rouselakis-Waters 2013

Page 14: Online/Offline  Attribute-Based Encryption

14

System Setup

Page 15: Online/Offline  Attribute-Based Encryption

15

Key Generation

OR

AND

(1)Share a according to formula(2)Generate key components

Page 16: Online/Offline  Attribute-Based Encryption

16

Encryption

Offline:

Online ( ):

System uses n attributes per CT (address later)

Page 17: Online/Offline  Attribute-Based Encryption

17

Decryption & Proof

• Brings together CT randomness and key shares

• Uses correction factor per node• Details in paper.Proof: Reduce to security of RW13 ABE scheme

Decryption:

Page 18: Online/Offline  Attribute-Based Encryption

18

ExtensionsPooling: Flexible number of attributes per ciphertext

Online/Offline Key Gen:

Matches CP-ABE

Page 19: Online/Offline  Attribute-Based Encryption

19

Thank you