Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Vipul Goyal
Omkant Pandey Amit Sahai
UCLA
UCLA UCLA
Brent Waters
SRI
Encrypted Files stored on Untrusted Server Every user can decrypt its own files
File 2
Owner: Tim
File 2
Creator: Tim History
Admissions
Date: 03-20-05
3
An Encrypted Filesystem
File 1
Creator: John
Computer Science Admissions Date: 04-11-06
Authority
OR File 2
Creator: Tim
History
Admissions Date: 03-20-05
Computer Science
AND
Bob
Admissions 4
[SW05]
Sahai-Waters introduced ABE, but only for threshold policies: Ciphertext has set of attributes User has set of attributes If more than k attributes match, then User can decrypt. Main Application- Biometrics
OR
AND
Bob
Computer Science
Admissions 6
AND
AND
Computer Science
Admissions
History
Hiring
Related Work
Techniques
We combine two ideas
Bilinear maps General Secret Sharing Schemes
Bilinear Maps
G , G1 : multiplicative of prime order p.
e: GG G1
Efficiently computable.
Bob
y
Computer Science Admissions
(y-r)
r
11
12
Encryption
Public Parameters File 1
Creator: John (attribute 2) Computer Science (attribute 3) Admissions (attribute n) Select set of attributes, raise them to random s
Ciphertext
Key Generation
Public Parameters Ciphertext Private Key
Computer Science
Fresh randomness used for each key generated! gt1, gt2,.... gtn, e(g,g)y y OR y gst2 , gst3 , gstn, e(g,g)sy M AND Bob gy1/t1 , gy3/t3 , gyn/tn
Admissions
y1= y
y3= (y-r)
yn= r
14
Decryption
Ciphertext Private Key
15
Security
Reduction: Bilinear Decisional Diffie-Hellman
Given ga,gb,gc distinguish e(g,g)abc from random Collusion resistance Cant combine private key components
16
Private Key
17
Extensions
Building from any linear secret sharing scheme
In particular, tree of threshold gates Delegation of Private Keys
18
Delegation
Derive a key for a more restrictive policy Subsumes Hierarchical-IBE [Horwitz-Lynn 02, ] OR
AND
Bob
Bobs Assistant
Computer Science
admissions
Year=2006
19
AND
AND
Soccer
Germany
Sport
11-01-2006
20
Thank You
21