屬性加密泄露的輔助輸入Attribute-basedEncryptionResilienttoAuxiliaryInput_第1頁
屬性加密泄露的輔助輸入Attribute-basedEncryptionResilienttoAuxiliaryInput_第2頁
屬性加密泄露的輔助輸入Attribute-basedEncryptionResilienttoAuxiliaryInput_第3頁
屬性加密泄露的輔助輸入Attribute-basedEncryptionResilienttoAuxiliaryInput_第4頁
屬性加密泄露的輔助輸入Attribute-basedEncryptionResilienttoAuxiliaryInput_第5頁
已閱讀5頁,還剩20頁未讀, 繼續(xù)免費(fèi)閱讀

下載本文檔

版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請進(jìn)行舉報(bào)或認(rèn)領(lǐng)

文檔簡介

1、2 Problem Statement Attribute-Based Encryption w/ Auxiliary Inputs and Continual Auxiliary Inputs Our Techniques3 The central notion of modern cryptography relies on the secrecy of the secret key. In practice, this paradigm is subject to the immanent threat of side-channel attacks. 4 Formal security

2、 guarantees even when the secret (key/randomness) leaks Here we only consider memory leakage. The adversary is allowed to specify an efficiently computable leakage function f Obtain the output of f applied to the secret Aims to model the possible leakage in practice5 Goldwasser Eurocrypt 09 Invited

3、Talk allowing for continuous unbounded leakage without additionally restricting its type AGV09, NS09, ADNSWW10, BKKV10, CDRW10, DGKPV10, DHLW10, LLW11, LRW116 Allowed bits of leakage is l l is also a system parameter Size of the secret key increases with l But l does not affect public key size, comm

4、unication and computation efficiency e.g., ADNSWW10, CDRW10 Hope the attack is detected and stopped before the whole secret is leaked7 Any f that no poly. time adversary can invert E.g., One-way permutation (OWP) OWP is not allowed in the relative model DGKPV10 proposed public-key encryption (PKE) s

5、chemes with auxiliary inputs YSY12 proposed ABE schemes with auxiliary inputs All these bound the leakage throughout the entire lifetime of the secret key8 Allows for continuous memory leakage (CML) Continually updates / refreshes the secret key Leakage between updates are still bounded DHLW10: sign

6、ature and identification BKKV10: signature, PKE, and selective-ID IBE LLW11: signature and PKE Zhang13: ABE9 ABE found many applications Resilience = composition of Attribute-based systems A “clean” security definition Free from numeric bounds10 Current CML models for ABE consider leakage of the cur

7、rent secret key for a given time only Zhang13 The old secret key should be securely erased. Less disastrous leakage = Less benefits11Continual Auxiliary Model for ABE Continual Leakage Model + Auxiliary Input Model Minimal restriction: no polynomial time algorithm can use the leaked information to o

8、utput a valid attribute-based secret key Can leak from all refreshed master secret keys and attribute-based secret keys “Cleaner” model: no “version number” of keys “Ultimate model” for ABE?12 We tackle the problem of “allowing ABE for continuous unbounded leakage, without additionally restricting t

9、he type of leakage”. DGKPV10: PKE, no continual leakage BKKV10: IBE,selective-ID, no leakage from msk LRW11: IBE, adaptive-ID, leakage size bounded YSY12: IBE, adaptive-ID13 We propose the first CP-ABE scheme that is secure in the presence of auxiliary inputs Adaptive security in the Standard Model

10、Based on Static Assumptions Moderate costs (ctxt. size, comp. complexity) We propose the first KP-ABE scheme resilience to auxiliary inputs We impove our ABE schemes secure in the presence of continual auxiliary model14 The key technique in DGKPV10 is the modified Goldreich-Levin (GL) theorem. The o

11、riginal GL theorem is over GF(2) For an uninvertible function h: GF(2)m - 0, 1*, GF(2) is pseudorandom given h(e) and uniformly random y15 Let q be a prime H be a poly(m)-sized subset of GF (q) h : Hm 0,1* be any (randomized) function If there is a PPT algorithm D that distinguishes between and the

12、uniform distribution over GF(q) given h(e) and y GF(q) m then there is a PPT algorithm A that inverts h with probability 1/(q2 poly(m)16 Attribute-based secret key has “structure” Not a l-bit number Secret random factors from a small domain The size of attribute-based secret key is according to the

13、number of attributes17 Even worse, many many secret keys in ABE Leak “semi-functional” (SF) keys in simulation SF-key is perturbed from a real key by m blinding factors from Zp where p is of size 2l. Inefficient invertor if we followed Countermeasure for leakage just appears in the security proof bu

14、t not the actual scheme.18 Usual secure against chosen-plaintext attack (CPA) Leakage oracle (LO) in additional to Key Extraction oracle (KEO) LO takes an input of f F and S returns f(msk, skS, mpk, S) No LO query after challenge phase F: Given mpk, S*, fi (msk, skSi, mpk, Si), and a set of secret k

15、eys w/o skSi, no PPT algo. can output a secret key skS* of S*Here are the parameters, I will keep msk from youI want f0(msk), f1(skS1), skS4, skS1 and f3(msk, skS4)Sure, just make your adaptive choicesI want to be challenged with these 2 messages: m0, m1Now I encrypt a random 1 of them, make your gu

16、ess19Our ABE with Auxiliary InputsZhang-Shi-Wang-Chen-Mu LR-ABEYuen-Chow-Zhang-Yiu IBE with Auxiliary InputsLewko-Rouselakis-Waters LR-IBELewko-Waters Adaptive-ID IBE20 We know how to “fake” everything! We can leak them too. Caution: leaking cant spoil faking. Correlation regarding SF objects is inf

17、ormation-theoretically (IT) hidden21 Small blinding factors are used in SF key When the key is leaked, uninvertible function of key can be created from uninv.-func. of factors Inner product = 0 = Exponent in Gq = 0 Use modified GL theorem to ensure the indistinguishability of 2 types of SF keys.22 F

18、or the security poof, we propose three improved statics assumptions, and prove them in appendix.23 We extend our basic scheme to support leakage of randomness during setup. We need a lattice-based assumption in our pairing-based construction.24 Basic: Given mpk, S*, fi (msk, skSi, mpk, Si), and a set of secret keys w/o skSi, no PPT a

溫馨提示

  • 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
  • 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
  • 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會(huì)有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
  • 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
  • 5. 人人文庫網(wǎng)僅提供信息存儲(chǔ)空間,僅對用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對任何下載內(nèi)容負(fù)責(zé)。
  • 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請與我們聯(lián)系,我們立即糾正。
  • 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時(shí)也不承擔(dān)用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。

最新文檔

評論

0/150

提交評論