DMCA
Attribute-based encryption for fine-grained access control of encrypted data (2006)
Cached
Download Links
Venue: | In Proc. of ACMCCS’06 |
Citations: | 521 - 23 self |
Citations
2578 | How to share a secret - SHAMIR - 1979 |
1641 | Random oracles are practical: a paradigm for designing efficient protocols
- Bellare, Rogaway
- 1993
(Show Context)
Citation Context ... universe. Yet the size of public parameters only grow linearly in a parameter n. The parameter n is the maximum size of the set γ we can encrypt under. 3 3 If we are willing to accept random oracles =-=[4]-=-, it is possible to overcome the size-limitation on γ by replacing the function T (X) in our construction (see Setup) by a hash function As noted in [32], having large universe allows us to apply a co... |
581 |
Safeguarding cryptographic keys
- Blakley
- 1979
(Show Context)
Citation Context ...e (of the secret) for that party. Every SSS realizes some access structure that defines the sets of parties who should be able to reconstruct the secret by using their shares. Shamir [33] and Blakley =-=[6]-=- were the first to propose a construction for secret-sharing schemes where the access structure is a threshold gate. That is, if any t or more parties come together, they can reconstruct the secret by... |
383 | Public key encryption with keyword search - Boneh, Crescenzo, et al. - 2004 |
282 | An identity based encryption scheme based on quadratic residues
- Cocks
- 2001
(Show Context)
Citation Context ... by Sahai and Waters [32], who also presented a particular scheme that they called Fuzzy Identity-Based Encryption (FIBE). The Fuzzy-IBE scheme builds upon several ideas from IdentityBased Encryption =-=[9, 34, 17]-=-. In FIBE, an identity is viewed as a set of attributes. FIBE allows for a private key for an identity, ω, to decrypt to a ciphertext encrypted with an identity, ω ′ , if and only if the identities ω ... |
280 |
Identity based encryption from the Weil pairing.
- Boneh, Franklin
- 2003
(Show Context)
Citation Context ... by Sahai and Waters [32], who also presented a particular scheme that they called Fuzzy Identity-Based Encryption (FIBE). The Fuzzy-IBE scheme builds upon several ideas from IdentityBased Encryption =-=[9, 34, 17]-=-. In FIBE, an identity is viewed as a set of attributes. FIBE allows for a private key for an identity, ω, to decrypt to a ciphertext encrypted with an identity, ω ′ , if and only if the identities ω ... |
279 | Chosen-ciphertext security from identity-based encryption
- Boneh, Canetti, et al.
(Show Context)
Citation Context ...security of an ABE scheme. We define a selective-set model for proving the security of the attribute based under chosen plaintext attack. This model can be seen as analogous to the selective-ID model =-=[15, 16, 7]-=- used in identity-based encryption (IBE) schemes [34, 9, 17]. Selective-Set Model for ABE Init The adversary declares the set of attributes, γ, that he wishes to be challenged upon. Setup The challeng... |
257 | Hierarchical ID-Based Cryptography
- Gentry, Silverberg
- 2002
(Show Context)
Citation Context ...r access structure Y, if and only if Y is more restrictive than X. Somewhat surprisingly, we observe that our construction with the delegation property subsumes Hierarchical Identity-Based Encryption =-=[24, 20]-=- and its derivatives [1]. 1.1 Organization We begin with a discussion of related work in Section 2. Next, we give necessary background information and our definitions of security in Section 3. We then... |
251 | A forward-secure public-key encryption scheme
- Canetti, Halevi, et al.
(Show Context)
Citation Context ...security of an ABE scheme. We define a selective-set model for proving the security of the attribute based under chosen plaintext attack. This model can be seen as analogous to the selective-ID model =-=[15, 16, 7]-=- used in identity-based encryption (IBE) schemes [34, 9, 17]. Selective-Set Model for ABE Init The adversary declares the set of attributes, γ, that he wishes to be challenged upon. Setup The challeng... |
197 | Collusion resistant broadcast encryption with short ciphertexts and private keys”,
- Boneh, Gentry, et al.
- 2005
(Show Context)
Citation Context ...ely allow the flexibility we envision in issuing private keys for the unique needs of each user. It is worth mentioning that handling such a situation with the best known broadcast encryption schemes =-=[10, 22]-=- (which allow encrypting to an arbitrary subset of users) is quite inefficient in comparison. The efficiency of such systems is dependent on the size of the authorized user set or the number of users ... |
184 | Generalized secret sharing and monotone functions
- Benaloh, Leichter
- 1988
(Show Context)
Citation Context ...ate. That is, if any t or more parties come together, they can reconstruct the secret by using their shares; however, any lesser number of parties do not get any information about the secret. Benaloh =-=[5]-=- extended Shamir’s idea to realize any access structure that can be represented as a tree consisting of threshold gates. Other notable secretsharing schemes are [25, 14]. In SSS, one can specify a tre... |
184 | Non-Malleable Non-Interactive Zero Knowledge and Adaptive Chosen-Ciphertext Security
- Sahai
- 1999
(Show Context)
Citation Context ...l. Similar to [32], we notice that our construction can be extended to the chosen-ciphertext model by applying the technique of using simulation-sound NIZK proofs to achieve chosenciphertext security =-=[31]-=-. However, in Section 9 we describe how our delegation mechanism can be used with the techniques of Cannetti, Halevi, and Katz [16] to achieve a much more efficient CCA-2 system. 5. LARGE UNIVERSE CON... |
156 |
Some Ideal Secret Sharing Schemes.
- Brickell
- 1983
(Show Context)
Citation Context ...formation about the secret. Benaloh [5] extended Shamir’s idea to realize any access structure that can be represented as a tree consisting of threshold gates. Other notable secretsharing schemes are =-=[25, 14]-=-. In SSS, one can specify a tree-access structure where the interior nodes consist of AND and OR gates and the leaves consist of different parties. Any set of parties that satisfy the tree can come to... |
154 | Efficient Selective-ID Secure Identity Based Encryption Without Random Oracles
- Boneh, Boyen
- 2004
(Show Context)
Citation Context ...security of an ABE scheme. We define a selective-set model for proving the security of the attribute based under chosen plaintext attack. This model can be seen as analogous to the selective-ID model =-=[15, 16, 7]-=- used in identity-based encryption (IBE) schemes [34, 9, 17]. Selective-Set Model for ABE Init The adversary declares the set of attributes, γ, that he wishes to be challenged upon. Setup The challeng... |
147 | On Span Programs - Karchmer, Wigderson - 1993 |
141 | Toward Hierarchical Identity-Based Encryption. Adv
- Horwitz, Lynn
- 2002
(Show Context)
Citation Context ...r access structure Y, if and only if Y is more restrictive than X. Somewhat surprisingly, we observe that our construction with the delegation property subsumes Hierarchical Identity-Based Encryption =-=[24, 20]-=- and its derivatives [1]. 1.1 Organization We begin with a discussion of related work in Section 2. Next, we give necessary background information and our definitions of security in Section 3. We then... |
137 |
Secret sharing schemes realizing general access structures
- Ito, Saito, et al.
- 1987
(Show Context)
Citation Context ...formation about the secret. Benaloh [5] extended Shamir’s idea to realize any access structure that can be represented as a tree consisting of threshold gates. Other notable secretsharing schemes are =-=[25, 14]-=-. In SSS, one can specify a tree-access structure where the interior nodes consist of AND and OR gates and the leaves consist of different parties. Any set of parties that satisfy the tree can come to... |
113 | The LSD Broadcast Encryption Scheme,”
- Halevy, Shamir
- 2002
(Show Context)
Citation Context ...ely allow the flexibility we envision in issuing private keys for the unique needs of each user. It is worth mentioning that handling such a situation with the best known broadcast encryption schemes =-=[10, 22]-=- (which allow encrypting to an arbitrary subset of users) is quite inefficient in comparison. The efficiency of such systems is dependent on the size of the authorized user set or the number of users ... |
96 |
Secure Schemes for Secret Sharing and Key Distribution,”
- Beimel
- 1996
(Show Context)
Citation Context ...ucture is specified in the private key, while the ciphertexts are simply labeled with a set of descriptive attributes. 1 We note that this setting is reminiscent of secret sharing schemes (see, e.g., =-=[3]-=-). Using known techniques one can build a secret-sharing scheme that specifies that a set of parties must cooperate in order to reconstruct a secret. For example, one can specify a tree access structu... |
90 | A unified scheme for resource protection in automated trust negotiation
- Yu, Winslett
- 2003
(Show Context)
Citation Context ...ers and allow flexibility in specifying the access rights of individual users. Several techniques are known for implementing fine grained access control. Common to the existing techniques (see, e.g., =-=[26, 19, 36, 27, 23, 28]-=- and the references therein) is the fact that they employ a trusted server that stores the data in clear. Access control relies on software checks to ensure that a user can access a piece of data only... |
89 | Improved efficiency for CCA-secure cryptosystems built using identity-based encryption
- Boneh, Katz
- 2005
(Show Context)
Citation Context ...it creates an new key for the access structure of “X AND CCA : VK”. By similar arguments to those in Canetti, Halevi, and Katz [16] this gives chosen-ciphertex security. We can also use other methods =-=[11, 12]-=- to achieve greater efficiency. We can realize a HIBE by simply managing the the assignment of attributes in a careful manner. For example, to encrypt to the hierarchical identity “edu:ucla” one can e... |
86 |
Identity based cryptosystems and signature schemes,”
- Shamir
- 1984
(Show Context)
Citation Context ... by Sahai and Waters [32], who also presented a particular scheme that they called Fuzzy Identity-Based Encryption (FIBE). The Fuzzy-IBE scheme builds upon several ideas from IdentityBased Encryption =-=[9, 34, 17]-=-. In FIBE, an identity is viewed as a set of attributes. FIBE allows for a private key for an identity, ω, to decrypt to a ciphertext encrypted with an identity, ω ′ , if and only if the identities ω ... |
85 | No registration needed: How to use declarative policies and negotiation to access sensitive resources on the semantic web. In: European Semantic Web Symposium
- Gavriloaie, Nejdl, et al.
- 2004
(Show Context)
Citation Context ...ers and allow flexibility in specifying the access rights of individual users. Several techniques are known for implementing fine grained access control. Common to the existing techniques (see, e.g., =-=[26, 19, 36, 27, 23, 28]-=- and the references therein) is the fact that they employ a trusted server that stores the data in clear. Access control relies on software checks to ensure that a user can access a piece of data only... |
84 | Problems and Theorems in Linear Algebra, - Prasolov - 1994 |
83 | Direct Chosen Ciphertext Security from Identity-Based Techniques
- Boyen, Mei, et al.
- 2005
(Show Context)
Citation Context ...it creates an new key for the access structure of “X AND CCA : VK”. By similar arguments to those in Canetti, Halevi, and Katz [16] this gives chosen-ciphertex security. We can also use other methods =-=[11, 12]-=- to achieve greater efficiency. We can realize a HIBE by simply managing the the assignment of attributes in a careful manner. For example, to encrypt to the hierarchical identity “edu:ucla” one can e... |
70 | Concealing complex policies with hidden credentials
- Bradshaw, Holt, et al.
(Show Context)
Citation Context ... the number of attributes. We also note that there has been other work that applied IBE techniques to access control, but did not address our central concern of resisting attacks from colluding users =-=[35, 13]-=-. 3. BACKGROUND We first give formal definitions for the security of KeyPolicy Attribute Based Encryption (KP-ABE). Then we give background information on bilinear maps and our cryptographic assumptio... |
62 | Access Control Mechanisms for Inter-organizational Workflows
- Kang, Park
- 2001
(Show Context)
Citation Context ...ers and allow flexibility in specifying the access rights of individual users. Several techniques are known for implementing fine grained access control. Common to the existing techniques (see, e.g., =-=[26, 19, 36, 27, 23, 28]-=- and the references therein) is the fact that they employ a trusted server that stores the data in clear. Access control relies on software checks to ensure that a user can access a piece of data only... |
61 | W.H.: Automated trust negotiation using cryptographic credentials. In:
- Li, Li, et al.
- 2005
(Show Context)
Citation Context ...ers and allow flexibility in specifying the access rights of individual users. Several techniques are known for implementing fine grained access control. Common to the existing techniques (see, e.g., =-=[26, 19, 36, 27, 23, 28]-=- and the references therein) is the fact that they employ a trusted server that stores the data in clear. Access control relies on software checks to ensure that a user can access a piece of data only... |
61 | Fuzzy identity based encryption.
- Sahai, Waters
- 2005
(Show Context)
Citation Context .... Neither one of these options is particularly appealing. An important setting where these issues give rise to serious problems is audit logs (discussed in more detail in Section 7). Sahai and Waters =-=[32]-=- made some initial steps to solving this problem by introducing the concept of Attributed-Based Encryption (ABE). In an ABE system, a user’s keys and ciphertexts are labeled with sets of descriptive a... |
52 | Methods and limitations of security policy reconciliation,” in
- McDaniel, Prakash
- 2002
(Show Context)
Citation Context ...ers and allow flexibility in specifying the access rights of individual users. Several techniques are known for implementing fine grained access control. Common to the existing techniques (see, e.g., =-=[26, 19, 36, 27, 23, 28]-=- and the references therein) is the fact that they employ a trusted server that stores the data in clear. Access control relies on software checks to ensure that a user can access a piece of data only... |
40 | ID-Based Encryption for Complex Hierarchies with Applications to Forward Security and Broadcast Encryption
- Yao, Dodis, et al.
- 2004
(Show Context)
Citation Context ... structures. Our constructions support a wide variety of access structures (indeed, in its most general form, every LSSS realizable access structure), including a tree of threshold gates. Yao et. al. =-=[18]-=- show how an IBE system that encrypts to multiple hierarchical identities in a collusion-resistant manner implies a forward secure Hierarchical IBE scheme. They also note how their techniques for resi... |
39 |
Access control using pairing based cryptography,
- Smart
- 2003
(Show Context)
Citation Context ... the number of attributes. We also note that there has been other work that applied IBE techniques to access control, but did not address our central concern of resisting attacks from colluding users =-=[35, 13]-=-. 3. BACKGROUND We first give formal definitions for the security of KeyPolicy Attribute Based Encryption (KP-ABE). Then we give background information on bilinear maps and our cryptographic assumptio... |
28 |
Attribute- Based Encryption for Fine-Grained Access Control of Encrypted Data
- Goyal, Pandey, et al.
- 2006
(Show Context)
Citation Context ...tems are useful in different contexts. 2 In fact, we can extend our scheme to work for any access structure for which a Linear Secret Sharing Scheme exists (see full version of this paper for details =-=[21]-=-). 2. RELATED WORK Fine-grained Access Control. Fine-grained access control systems facilitate granting differential access rights to a set of users and allow flexibility in specifying the access righ... |
25 |
Identity-based encryption gone wild,
- Abdalla, Catalano, et al.
- 2006
(Show Context)
Citation Context ...only if Y is more restrictive than X. Somewhat surprisingly, we observe that our construction with the delegation property subsumes Hierarchical Identity-Based Encryption [24, 20] and its derivatives =-=[1]-=-. 1.1 Organization We begin with a discussion of related work in Section 2. Next, we give necessary background information and our definitions of security in Section 3. We then present our first const... |
21 |
Cryptographic solution to a multilevel security problem’,
- AKL, TAYLOR
- 1982
(Show Context)
Citation Context ... Furthermore, there is always a danger of “insider attacks” wherein a person having access to the server steals and leaks the information, for example, for economic gains. Some techniques (see, e.g., =-=[2]-=-) create user hierarchies and require the users to share a common secret key if they are in a common set in the hierarchy. The data is then classified according to the hierarchy and encrypted under th... |
19 | Principles of policy in secure groups,” in
- Harney, Colgrove, et al.
- 2001
(Show Context)
Citation Context ...ers and allow flexibility in specifying the access rights of individual users. Several techniques are known for implementing fine grained access control. Common to the existing techniques (see, e.g., =-=[26, 19, 36, 27, 23, 28]-=- and the references therein) is the fact that they employ a trusted server that stores the data in clear. Access control relies on software checks to ensure that a user can access a piece of data only... |
8 |
Secure Atrribute-Based Systems
- Pirretti, Traynor, et al.
- 2006
(Show Context)
Citation Context ...et values to the user: Dx = g qx(0) 2 · T (i) rx where i = att(x) Rx = g rx where rx is chosen uniformly at random from Zp for each node x. The set of above secret pairs is the decryption key D. (see =-=[30]-=- for details). This also improves the efficiency of the system. 4 With some minor modifications, which we omit for simplicity, we can encrypt to all sets of size ≤ n. 94Decryption (E,D) As for the ca... |
4 | Elementary linear algebra, 9th edition - Anton - 2005 |