Ciphertext-Policy Attribute-Based Encryption (CP-ABE)

Size: px
Start display at page:

Download "Ciphertext-Policy Attribute-Based Encryption (CP-ABE)"

Transcription

1 Ciphertext-Policy Attribute-Based Encryption (CP-ABE) Presented by Sherley Codio Fall, Privacy&Security - Virginia Tech Computer Science

2 Application Scenario Sharing data on distributed systems Bob sends a sensitive memo People with a set of credentials/attributes receives it Office: Public Corruption City: Knoxville Bob FBI Head Office: Public Corruption City: Denver Access structure for accessing this information: (( Public Corruption Office AND ( Knoxville OR San Francisco )) Office: Public Corruption City: San Francisco Fall, Privacy&Security - Virginia Tech Computer Science 2

3 Application Scenario Advantages of replicating data across several locations: - Performance - Reliability Fall, Privacy&Security - Virginia Tech Computer Science 3

4 Application Scenario Disadvantage: If a server is compromised, data confidentiality is compromised Solution: Store data in encrypted form: Encrypted access control Fall, Privacy&Security - Virginia Tech Computer Science 4

5 Attribute-Based Encryption (ABE) Attribute-based encryption (ABE): New means for encrypted access control. Ciphertexts not necessarily encrypted to one particular user. Users private keys and ciphertexts associated with a set of attributes or a policy over attributes. A match between user s private key and the ciphertext, decryption is possible. Fall, Privacy&Security - Virginia Tech Computer Science 5

6 Ciphertext-Policy Attribute-Based Encryption Bob ciphertext Access Structure over attributes Sends Private Key Set of attributes Y E S Fall, Privacy&Security - Virginia Tech Computer Science 6

7 Ciphertext-Policy Attribute-Based Encryption Access Structure: monotonic access Tree Gate Gate AND Gate OR Attribute Attribute Attribute AND gate: n-of-n threshold gates OR gate: 1-of-n threshold gates Fall, Privacy&Security - Virginia Tech Computer Science 7

8 Ciphertext-Policy Attribute-Based Encryption Access Structure: monotonic access Tree X Kx=1 Kx=1 numx == number of children of X kx == numx => AND gate kx== 1 => OR gate Leaf: k == 1 Threshold gate: Described by children and threshold value Fall, Privacy&Security - Virginia Tech Computer Science 8

9 Ciphertext-Policy Attribute-Based Encryption Satisfying an Access Tree r Tr == T x Tx Kx=1 Kx=1 att(x): denotes the attribute associated with the leaf node x γ set of attributes => Tx(γ) == 1 Tx(γ) == 1 iff at least kx == 1 x is a leaf node => then Tx(γ)== 1 iff att(x) γ Fall, Privacy&Security - Virginia Tech Computer Science 9

10 Difference between KP-ABE and CP-ABE KP-ABE ciphertext Sends Private Key Bob Descriptive attributes Policies CP-ABE ciphertext Private Key Set of attributes Bob Access Structure over attributes Sends Y E S Fall, Privacy&Security - Virginia Tech Computer Science 10

11 CP-ABE: Fundamental Algorithms Setup Encrypt Keygen Decrypt Delegate Fall, Privacy&Security - Virginia Tech Computer Science 11

12 CP-ABE: Fundamental Algorithms Implicit security parameter M Setup PK Encrypt A S MK Keygen PK SK CT Decrypt M Fall, Privacy&Security 12 - Virginia Tech Computer Science

13 Bilinear map G0 and G1: two multiplicative cyclic groups of prime order p. g a generator of G0 and e a bilinear map, e : G0 G0 G1. e has the following properties: 1. Bilinearity: for all u, v G0 and a, b Zp, e(u^a, v^b) = e(u, v)^ab. 2. Non-degeneracy: e(g, g) =/ 1 Fall, Privacy&Security - Virginia Tech Computer Science 13

14 The Setup Algorithm Public Key PK PK = G0, g, h = g^β, f = g^1/β, e(g, g)^α Master key MK (β, g^α) Fall, Privacy&Security - Virginia Tech Computer Science 14

15 The Encryption Algorithm Let, Y be the set of leaf nodes in T. The ciphertext is constructed by giving the tree access structure T and computing CT =T, C = Me(g, g)^αs, C = h^s, y Y : Cy = g^qy (0), C y = H(att(y))^qy (0) Fall, Privacy&Security - Virginia Tech Computer Science 15

16 The Keygen Algorithm Let r Zp, rj Zp, j S. Then it computes the key as SK = (D = g^(α+r)/β, j S : Dj = g^r. H(j)^rj, D j = g^rj) Fall, Privacy&Security - Virginia Tech Computer Science 16

17 The Decryption Algorithm I x is a leaf node, i = att(x), i S CT = (T, C, C, y Y : Cy, C ) DecryptNode(CT, SK, x) =e(di, Cx)/e(D i, C x) =e(g^r. H(i)^ri, g^qx(0))/e(g^ri, H(i)^qx(0) == e(g, g)^rqx(0) If i / S DecryptNode(CT, SK, x) = Fall, Privacy&Security - Virginia Tech Computer Science 17

18 The Decryption Algorithm I x is a non-leaf node Fall, Privacy&Security - Virginia Tech Computer Science 18

19 The Delegate algorithm Delegate( SK, S ), S S SK = (D, j S : Dj, D j) SK = (D = Df^r, k S : D k = Dkg^r H(k)^r k, D k = D kg^r k) Fall, Privacy&Security - Virginia Tech Computer Science 19

20 Security Intuition To decrypt an attacker needs e(g, g)^αs To recover e(g, g)^αs, C must be paired with the D component from some user s private key. Fall, Privacy&Security - Virginia Tech Computer Science 20

21 How is Collusion Prevented? e(g, g)^αs is blinded e(g, g)^rs To blind e(g, g)^αs, correct key components needed blinding value is randomized Fall, Privacy&Security - Virginia Tech Computer Science 21

Key-Policy Attribute-Based Encryption

Key-Policy Attribute-Based Encryption Key-Policy Attribute-Based Encryption Present by Xiaokui Shu 09/08/2011 Identity-Based Encryption Basic KP-ABE Secret-Sharing Scheme Fine-grained Access Control Application Scenario Advanced Topics Related

More information

Collusion-Resistant Group Key Management Using Attributebased

Collusion-Resistant Group Key Management Using Attributebased Collusion-Resistant Group Key Management Using Attributebased Encryption Presented by: Anurodh Joshi Overview of the Paper Presents a ciphertext-policy attribute-based encryption (CP-ABE) scheme to solve

More information

Attribute-Sets: A Practically Motivated Enhancement to Attribute-Based Encryption

Attribute-Sets: A Practically Motivated Enhancement to Attribute-Based Encryption Attribute-Sets: A Practically Motivated Enhancement to Attribute-Based Encryption Rakesh Bobba, Himanshu Khurana and Manoj Prabhakaran University of Illinois, Urbana-Champaign IL USA, {rbobba,hkhurana,mmp}@illinois.edu

More information

Insecurity of an Dynamic User Revocation and Key Refreshing for Attribute-Based Encryption Scheme

Insecurity of an Dynamic User Revocation and Key Refreshing for Attribute-Based Encryption Scheme 2014 Tenth 10th International Conference on Computational Intelligence and Security Insecurity of an Dynamic User Revocation and Key Refreshing for Attribute-Based Encryption Scheme Changji Wang, Haitao

More information

Attribute-based encryption with encryption and decryption outsourcing

Attribute-based encryption with encryption and decryption outsourcing Edith Cowan University Research Online Australian Information Security Management Conference Conferences, Symposia and Campus Events 2014 Attribute-based encryption with encryption and decryption outsourcing

More information

Attribute-Sets: A Practically Motivated Enhancement to Attribute-Based Encryption

Attribute-Sets: A Practically Motivated Enhancement to Attribute-Based Encryption Attribute-Sets: A Practically Motivated Enhancement to Attribute-Based Encryption Rakesh Bobba, Himanshu Khurana and Manoj Prabhakaran University of Illinois at Urbana-Champaign {rbobba,hkhurana,mmp}@illinois.edu

More information

Security Weaknesses of an Anonymous Attribute Based Encryption appeared in ASIACCS 13

Security Weaknesses of an Anonymous Attribute Based Encryption appeared in ASIACCS 13 Security Weaknesses of an Anonymous Attribute Based Encryption appeared in ASIACCS 13 Payal Chaudhari, Manik Lal Das, Anish Mathuria DA-IICT, Gandhinagar, India {payal chaudhari, maniklal das, anish mathuria}@daiict.ac.in

More information

Unbounded Inner Product Functional Encryption from Bilinear Maps ASIACRYPT 2018

Unbounded Inner Product Functional Encryption from Bilinear Maps ASIACRYPT 2018 Unbounded Inner Product Functional Encryption from Bilinear Maps ASIACRYPT 2018 Junichi Tomida (NTT), Katsuyuki Takashima (Mitsubishi Electric) Functional Encryption[OʼNeill10, BSW11] msk Bob f(x) sk f

More information

A compact Aggregate key Cryptosystem for Data Sharing in Cloud Storage systems.

A compact Aggregate key Cryptosystem for Data Sharing in Cloud Storage systems. A compact Aggregate key Cryptosystem for Data Sharing in Cloud Storage systems. G Swetha M.Tech Student Dr.N.Chandra Sekhar Reddy Professor & HoD U V N Rajesh Assistant Professor Abstract Cryptography

More information

Bounded Ciphertext Policy Attribute Based Encryption

Bounded Ciphertext Policy Attribute Based Encryption Bounded Ciphertext Policy Attribute Based Encryption Vipul Goyal, Abhishek Jain, Omkant Pandey, and Amit Sahai Department of Computer Science, UCLA {vipul,abhishek,omkant,sahai}@cs.ucla.edu Abstract. In

More information

Verifiable Outsourced Ciphertext-Policy Attribute-Based Encryption for Mobile Cloud Computing

Verifiable Outsourced Ciphertext-Policy Attribute-Based Encryption for Mobile Cloud Computing KSII TRANSACTINS N INTERNET AND INFRMATIN SYSTEMS VL, N 6, Jun 27 3254 Copyright c27 KSII Verifiable utsourced Ciphertext-Policy Attribute-Based Encryption for Mobile Cloud Computing Zhiyuan Zhao, Jianhua

More information

Group Selection and Key Management Strategies for Ciphertext-Policy Attribute-Based Encryption

Group Selection and Key Management Strategies for Ciphertext-Policy Attribute-Based Encryption Rochester Institute of Technology RIT Scholar Works Theses Thesis/Dissertation Collections 12-2013 Group Selection and Key Management Strategies for Ciphertext-Policy Attribute-Based Encryption Russell

More information

On the Insecurity of a Method for Providing Secure and Private Fine-Grained Access to Outsourced Data

On the Insecurity of a Method for Providing Secure and Private Fine-Grained Access to Outsourced Data On the Insecurity of a Method for Providing Secure and Private Fine-Grained Access to Outsourced Data Alfredo Rial Interdisciplinary Centre for Security, Reliability and Trust (SnT) University of Luxembourg

More information

PIRATTE: Proxy-based Immediate Revocation of ATTribute-based Encryption

PIRATTE: Proxy-based Immediate Revocation of ATTribute-based Encryption PIRATTE: Proxy-based Immediate Revocation of ATTribute-based Encryption Sonia Jahid and Nikita Borisov {sjahid2,nikita}@illinois.edu University of Illinois at Urbana-Champaign arxiv:208.4877v [cs.cr] 23

More information

Optimal Multicast Group Communication

Optimal Multicast Group Communication Optimal Multicast Group Communication Zhibin Zhou and Dijiang Huang Arizona State University Abstract Many IP multicast based applications, such as Pay- TV, Multiplayer games, require controlling the group

More information

Spatial Encryption. March 17, Adam Barth, Dan Boneh, Mike Hamburg

Spatial Encryption. March 17, Adam Barth, Dan Boneh, Mike Hamburg Adam Barth Dan Boneh Mike Hamburg March 17, 2008 Traditional Public-Key Infrastructure CA Alice Bob Traditional Public-Key Infrastructure CA PK Bob, proof of identity Alice Bob Traditional Public-Key Infrastructure

More information

A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing

A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing IEEE TRANSACTIONS ON CLOUD COMPUTING, 2016 1 A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing Ruixuan Li, Member, IEEE, Chenglin Shen, Heng He, Zhiyong Xu, and Cheng-Zhong Xu, Member,

More information

Publicly Verifiable Secret Sharing for Cloud-based Key Management

Publicly Verifiable Secret Sharing for Cloud-based Key Management Publicly Verifiable Secret Sharing for Cloud-based Key Management Roy D Souza, David Jao, Ilya Mironov and Omkant Pandey Microsoft Corporation and University of Waterloo December 13, 2011 Overview Motivation:

More information

Attribute-Based Encryption. Allison Lewko, Microsoft Research

Attribute-Based Encryption. Allison Lewko, Microsoft Research Attribute-Based Encryption Allison Lewko, Microsoft Research The Cast of Characters This talk will feature work by: Brent Waters Amit Sahai Vipul Goyal Omkant Pandey With special guest appearances by:

More information

Various Attribute Based Encryption Algorithms in Clouds-A Survey P. Sivakumar 1 K. Devi 2 M. Navinkumar 3

Various Attribute Based Encryption Algorithms in Clouds-A Survey P. Sivakumar 1 K. Devi 2 M. Navinkumar 3 IJSRD - International Journal for Scientific Research & Development Vol. 3, Issue 03, 2015 ISSN (online): 2321-0613 Various Attribute Based Encryption Algorithms in Clouds-A Survey P. Sivakumar 1 K. Devi

More information

An Efficient Certificateless Proxy Re-Encryption Scheme without Pairing

An Efficient Certificateless Proxy Re-Encryption Scheme without Pairing An Efficient Certificateless Proxy Re-Encryption Scheme without Pairing Presented By: Arinjita Paul Authors: S. Sharmila Deva Selvi, Arinjita Paul, C. Pandu Rangan TCS Lab, Department of CSE, IIT Madras.

More information

Structure-Preserving Certificateless Encryption and Its Application

Structure-Preserving Certificateless Encryption and Its Application SESSION ID: CRYP-T06 Structure-Preserving Certificateless Encryption and Its Application Prof. Sherman S. M. Chow Department of Information Engineering Chinese University of Hong Kong, Hong Kong @ShermanChow

More information

Inter-domain Identity-based Proxy Re-encryption

Inter-domain Identity-based Proxy Re-encryption Inter-domain Identity-based Proxy Re-encryption Qiang Tang, Pieter Hartel, Willem Jonker Faculty of EWI, University of Twente, the Netherlands {q.tang, pieter.hartel, jonker}@utwente.nl August 19, 2008

More information

Clock-Based Proxy Re-encryption Scheme in Unreliable Clouds

Clock-Based Proxy Re-encryption Scheme in Unreliable Clouds Clock-Based Proxy Re-encryption Scheme in Unreliable Clouds Qin Liu [1][2], Guojun Wang [1], and Jie Wu [2], [1] Central South University, China [2] Temple University, USA 1 Outline 1. 1. Introduction

More information

Key Escrow free Identity-based Cryptosystem

Key Escrow free Identity-based Cryptosystem Key Escrow free Manik Lal Das DA-IICT, Gandhinagar, India About DA-IICT and Our Group DA-IICT is a private university, located in capital of Gujarat state in India. DA-IICT offers undergraduate and postgraduate

More information

Attribute-Based Authenticated Key Exchange

Attribute-Based Authenticated Key Exchange 1 / 22 Attribute-Based Authenticated Key Exchange Choudary Gorantla, Colin Boyd and Juan González Nieto ACISP 2010 2 / 22 Outline Introduction 1 Introduction 2 3 4 3 / 22 Outline Introduction 1 Introduction

More information

Collusion-Resistant Identity-based Proxy Re-encryption

Collusion-Resistant Identity-based Proxy Re-encryption Collusion-Resistant Identity-based Proxy Re-encryption Woo Kwon Koo 1, Jung Yeon Hwang 2, and Dong Hoon Lee 1,* 1 Graduate School of Information Security, Korea University, Seoul, Korea 2 Electronics and

More information

Cryptography III. Public-Key Cryptography Digital Signatures. 2/1/18 Cryptography III

Cryptography III. Public-Key Cryptography Digital Signatures. 2/1/18 Cryptography III Cryptography III Public-Key Cryptography Digital Signatures 2/1/18 Cryptography III 1 Public Key Cryptography 2/1/18 Cryptography III 2 Key pair Public key: shared with everyone Secret key: kept secret,

More information

Session Based Ciphertext Policy Attribute Based Encryption Method for Access Control in Cloud Storage

Session Based Ciphertext Policy Attribute Based Encryption Method for Access Control in Cloud Storage IOSR Journal of Engineering (IOSRJEN) ISSN (e): 2250-3021, ISSN (p): 2278-8719 Vol. 04, Issue 09 (September. 2014), V3 PP 21-25 www.iosrjen.org Session Based Ciphertext Policy Attribute Based Encryption

More information

Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010

Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010 CS 494/594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010 1 Public Key Cryptography Modular Arithmetic RSA

More information

Attribute-based encryption scheme supporting decryption outsourcing and attribute revocation in cloud storage

Attribute-based encryption scheme supporting decryption outsourcing and attribute revocation in cloud storage Attribute-based encryption scheme supporting decryption outsourcing and attribute reocation in cloud storage Hongwei Liu 1, a 1 College of Information Engineering Shenhen Uniersity Shenhen, China a liuhw@sueducn

More information

Relaxing IND-CCA: Indistinguishability Against Chosen. Chosen Ciphertext Verification Attack

Relaxing IND-CCA: Indistinguishability Against Chosen. Chosen Ciphertext Verification Attack Relaxing IND-CCA: Indistinguishability Against Chosen Ciphertext Verification Attack Indian Statistical Institute Kolkata January 14, 2012 Outline 1 Definitions Encryption Scheme IND-CPA IND-CCA IND-CCVA

More information

Inter-Domain Identity-based Authenticated Key Agreement Protocol from the Weil Pairing

Inter-Domain Identity-based Authenticated Key Agreement Protocol from the Weil Pairing Inter-Domain Identity-based Authenticated Key Agreement Protocol from the Weil Pairing Tsai, Hong-Bin Chiu, Yun-Peng Lei, Chin-Laung Dept. of Electrical Engineering National Taiwan University July 10,

More information

On the Security of Group-based Proxy Re-encryption Scheme

On the Security of Group-based Proxy Re-encryption Scheme On the Security of Group-based Proxy Re-encryption Scheme Purushothama B R 1, B B Amberker Department of Computer Science and Engineering National Institute of Technology Warangal Warangal, Andhra Pradesh-506004,

More information

Efficient Routing In Delay Tolerant Network Based On Secure Fuzzy Spray Decision Algorithm

Efficient Routing In Delay Tolerant Network Based On Secure Fuzzy Spray Decision Algorithm INTERNATIONAL JOURNAL OF TECHNOLOGY ENHANCEMENTS AND EMERGING ENGINEERING RESEARCH, VOL 2, ISSUE 10 37 Efficient Routing In Delay Tolerant Network Based On Secure Fuzzy Spray Decision Algorithm Kumar Kombaiya.A,

More information

Mediated Ciphertext-Policy Attribute-Based Encryption and its Application

Mediated Ciphertext-Policy Attribute-Based Encryption and its Application Mediated Ciphertext-Policy Attribute-Based Encryption and its Application Luan Ibraimi 1,2, Milan Petkovic 2, Svetla Nikova 1, Pieter Hartel 1, Willem Jonker 1,2 1 Faculty of EEMCS, University of Twente,

More information

Efficient Generation of Linear Secret Sharing. Scheme Matrices from Threshold Access Trees

Efficient Generation of Linear Secret Sharing. Scheme Matrices from Threshold Access Trees Efficient Generation of Linear Secret Sharing 1 Scheme Matrices from Threshold Access Trees Zhen Liu, Zhenfu Cao, and Duncan S. Wong Abstract Linear Secret Sharing Scheme (LSSS) matrices are commonly used

More information

On the Security of an Efficient Group Key Agreement Scheme for MANETs

On the Security of an Efficient Group Key Agreement Scheme for MANETs On the Security of an Efficient Group Key Agreement Scheme for MANETs Purushothama B R 1,, Nishat Koti Department of Computer Science and Engineering National Institute of Technology Goa Farmagudi, Ponda-403401,

More information

Outsourcing Encryption of Attribute-based Encryption with MapReduce

Outsourcing Encryption of Attribute-based Encryption with MapReduce Outsourcing Encryption of Attribute-based Encryption with MapReduce Jingwei Li 1, Chunfu Jia 1, Jin Li 2, and Xiaofeng Chen 3 1 College of Information Technical Science, Nankai University lijw@mail.nankai.edu.cn;

More information

Third-Party Authentication in the Institutional File System

Third-Party Authentication in the Institutional File System CITI Technical Report 92-1 Third-Party Authentication in the Institutional File System Bill Doster Bill.Doster@umich.edu Jim Rees Jim.Rees@umich.edu Institutional File System Project Center for Information

More information

Hiding software components using functional encryption. Janek Jochheim

Hiding software components using functional encryption. Janek Jochheim Hiding software components using functional encryption by Janek Jochheim Fakultät für Elektrotechnik, Informatik und Mathematik Heinz Nixdorf Institut und Institut für Informatik Fachgebiet Softwaretechnik

More information

ISSN: (Online) Volume 3, Issue 5, May 2015 International Journal of Advance Research in Computer Science and Management Studies

ISSN: (Online) Volume 3, Issue 5, May 2015 International Journal of Advance Research in Computer Science and Management Studies ISSN: 2321-7782 (Online) Volume 3, Issue 5, May 2015 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online at:

More information

A Key-Policy Attribute-based Encryption Scheme for General Circuit from Bilinear Maps

A Key-Policy Attribute-based Encryption Scheme for General Circuit from Bilinear Maps International Journal of Network Security, Vol.19, No.5, PP.704-710, Sept. 2017 (DOI: 10.6633/IJNS.201709.19(5).07) 704 A Key-Policy Attribute-based Encryption Scheme for General Circuit from Bilinear

More information

A Procedural Based Encryption Technique for Accessing Data on Cloud

A Procedural Based Encryption Technique for Accessing Data on Cloud A Procedural Based Encryption Technique for Accessing Data on Cloud Avinash N 1, Divya C 2 P.G. Student, Department of Computer Science and Engineering, SVIT, Bangalore, Karnataka, India 1 Assistant Professor,

More information

DABKS: Dynamic Attribute-based Keyword Search in Cloud Computing

DABKS: Dynamic Attribute-based Keyword Search in Cloud Computing DABKS: Dynamic Attribute-based Keyword Search in Cloud Computing Baishuang Hu, Qin Liu, Xuhui Liu, Tao Peng, Guojun Wang, and Jie Wu College of Computer Science and Electronic Engineering, Hunan University,

More information

TO satisfy requirements of data storage and high

TO satisfy requirements of data storage and high 1484 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 27, NO. 5, MAY 2016 TMACS A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud Storage Wei Li, Kaiping

More information

WIRELESS sensor networks (WSNs) have been an area of

WIRELESS sensor networks (WSNs) have been an area of IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 22, NO. 4, APRIL 2011 673 FDAC: Toward Fine-Grained Distributed Data Access Control in Wireless Sensor Networks Shucheng Yu, Member, IEEE, Kui

More information

An Encryption Scheme for a Secure Policy Updating

An Encryption Scheme for a Secure Policy Updating An Encryption Scheme for a Secure Policy Updating Luan Ibraimi Faculty of Electrical Engineering, Mathematics and Computer Science, University of Twente, The Netherlands ibraimi@ewi.utwente.nl Muhammad

More information

Secure Multiparty Computation

Secure Multiparty Computation Secure Multiparty Computation Li Xiong CS573 Data Privacy and Security Outline Secure multiparty computation Problem and security definitions Basic cryptographic tools and general constructions Yao s Millionnare

More information

Oblivious Signature-Based Envelope

Oblivious Signature-Based Envelope Oblivious Signature-Based Envelope Ninghui Li Department of Computer Sciences and CERIAS Purdue University 656 Oval Dr, West Lafayette, IN 47907-2086 ninghui@cs.purdue.edu Wenliang Du Department of Electrical

More information

CSCI 454/554 Computer and Network Security. Topic 5.2 Public Key Cryptography

CSCI 454/554 Computer and Network Security. Topic 5.2 Public Key Cryptography CSCI 454/554 Computer and Network Security Topic 5.2 Public Key Cryptography Outline 1. Introduction 2. RSA 3. Diffie-Hellman Key Exchange 4. Digital Signature Standard 2 Introduction Public Key Cryptography

More information

Policy-Sealed Data: A New Abstraction for Building Trusted Cloud Services

Policy-Sealed Data: A New Abstraction for Building Trusted Cloud Services Max Planck Institute for Software Systems Policy-Sealed Data: A New Abstraction for Building Trusted Cloud Services 1, Rodrigo Rodrigues 2, Krishna P. Gummadi 1, Stefan Saroiu 3 MPI-SWS 1, CITI / Universidade

More information

CS 161 Computer Security

CS 161 Computer Security Popa & Wagner Spring 2016 CS 161 Computer Security Discussion 5 Week of February 19, 2017 Question 1 Diffie Hellman key exchange (15 min) Recall that in a Diffie-Hellman key exchange, there are values

More information

Attribute Based Group Key Management

Attribute Based Group Key Management 1 Attribute Based Group Key Management Mohamed Nabeel, Elisa Bertino Purdue University, West Lafayette, Indiana, USA {nabeel, bertino}@cs.purdue.edu 2 Abstract Attribute based systems enable fine-grained

More information

Outline. CSCI 454/554 Computer and Network Security. Introduction. Topic 5.2 Public Key Cryptography. 1. Introduction 2. RSA

Outline. CSCI 454/554 Computer and Network Security. Introduction. Topic 5.2 Public Key Cryptography. 1. Introduction 2. RSA CSCI 454/554 Computer and Network Security Topic 5.2 Public Key Cryptography 1. Introduction 2. RSA Outline 3. Diffie-Hellman Key Exchange 4. Digital Signature Standard 2 Introduction Public Key Cryptography

More information

An IBE Scheme to Exchange Authenticated Secret Keys

An IBE Scheme to Exchange Authenticated Secret Keys An IBE Scheme to Exchange Authenticated Secret Keys Waldyr Dias Benits Júnior 1, Routo Terada (Advisor) 1 1 Instituto de Matemática e Estatística Universidade de São Paulo R. do Matão, 1010 Cidade Universitária

More information

Updating attribute in CP-ABE: A New Approach

Updating attribute in CP-ABE: A New Approach Updating attribute in CP-ABE: A New Approach Nishant Doshi and Devesh Jinwala National Institute of Technology, Surat, India {doshinikki2004,dcjinwala}@gmail.com Abstract. In Ciphertext-Policy Attribute

More information

Secret Sharing With Trusted Third Parties Using Piggy Bank Protocol

Secret Sharing With Trusted Third Parties Using Piggy Bank Protocol Secret Sharing With Trusted Third Parties Using Piggy Bank Protocol Adnan Memon Abstract This paper presents a new scheme to distribute secret shares using two trusted third parties to increase security

More information

Country

Country Total EU-12 31,2 26,6 21,1 22,5 25,9 29,2 29,6 29,7 30,5 29,9 25,3 25,1 EU-15 28,1 28,6 28,6 29,4 28,8 24,3 24,2 EU-25 25,0 25,0 A 15,0 13,4 14,3 15,6 14,9 16,6 13,6 5,3 10,9 10,8 B 41,9 44,7 51,6 53,5

More information

Two-Dimensional Representation of Cover Free Families and its Applications: Short Signatures and More Shota Yamada The University of Tokyo

Two-Dimensional Representation of Cover Free Families and its Applications: Short Signatures and More Shota Yamada The University of Tokyo Two-Dimensional Representation of Cover Free Families and its Applications: Short Signatures and More Shota Yamada The University of Tokyo Session ID: CRYP-303 Session Classification: Advanced Our Results

More information

Outline. Public Key Cryptography. Applications of Public Key Crypto. Applications (Cont d)

Outline. Public Key Cryptography. Applications of Public Key Crypto. Applications (Cont d) Outline AIT 682: Network and Systems Security 1. Introduction 2. RSA 3. Diffie-Hellman Key Exchange 4. Digital Signature Standard Topic 5.2 Public Key Cryptography Instructor: Dr. Kun Sun 2 Public Key

More information

Defining Encryption. Lecture 2. Simulation & Indistinguishability

Defining Encryption. Lecture 2. Simulation & Indistinguishability Defining Encryption Lecture 2 Simulation & Indistinguishability Roadmap First, Symmetric Key Encryption Defining the problem We ll do it elaborately, so that it will be easy to see different levels of

More information

Secure Data Storage and Data Retrieval in Cloud Storage using Cipher Policy Attribute based Encryption

Secure Data Storage and Data Retrieval in Cloud Storage using Cipher Policy Attribute based Encryption Indian Journal of Science and Technology, Vol 8(S9), 318 325, May 2015 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 DOI: 10.17485/ijst/2015/v8iS9/65600 Secure Data Storage and Data Retrieval in Cloud

More information

On the security of a certificateless signature scheme in the standard model

On the security of a certificateless signature scheme in the standard model On the security of a certificateless signature scheme in the standard model Lin Cheng, Qiaoyan Wen, Zhengping Jin, Hua Zhang State Key Laboratory of Networking and Switch Technology, Beijing University

More information

Brief Introduction to Provable Security

Brief Introduction to Provable Security Brief Introduction to Provable Security Michel Abdalla Département d Informatique, École normale supérieure michel.abdalla@ens.fr http://www.di.ens.fr/users/mabdalla 1 Introduction The primary goal of

More information

Secure Multiparty Computation

Secure Multiparty Computation CS573 Data Privacy and Security Secure Multiparty Computation Problem and security definitions Li Xiong Outline Cryptographic primitives Symmetric Encryption Public Key Encryption Secure Multiparty Computation

More information

Tuesday, January 17, 17. Crypto - mini lecture 1

Tuesday, January 17, 17. Crypto - mini lecture 1 Crypto - mini lecture 1 Cryptography Symmetric key cryptography (secret key crypto): sender and receiver keys identical Asymmetric key cryptography (public key crypto): encryption key public, decryption

More information

Secure Data Sharing in Cloud Computing: Challenges and Research Directions

Secure Data Sharing in Cloud Computing: Challenges and Research Directions Cyber Summer School Melbourne, 12-13 Feb 2018 Secure Data Sharing in Cloud Computing: Challenges and Research Directions Willy Susilo Institute of Cybersecurity and Cryptology School of Computing and Information

More information

Security. Alessandro Margara Slides based on previous work by Matteo Migliavacca and Alessandro Sivieri

Security. Alessandro Margara Slides based on previous work by Matteo Migliavacca and Alessandro Sivieri Security Alessandro Margara alessandro.margara@polimi.it Slides based on previous work by Matteo Migliavacca and Alessandro Sivieri Why security in a DS course? Sharing of resources is the motivating factor

More information

A practical application of CP ABE for mobile PHR system: a study on the user accountability

A practical application of CP ABE for mobile PHR system: a study on the user accountability DOI 10.1186/s40064-016-3002-y SHORT REPORT Open Access A practical application of CP ABE for mobile PHR system: a study on the user accountability Hanshu Hong 1, Di Chen 2 and Zhixin Sun 1* *Correspondence:

More information

Blum-Blum-Shub cryptosystem and generator. Blum-Blum-Shub cryptosystem and generator

Blum-Blum-Shub cryptosystem and generator. Blum-Blum-Shub cryptosystem and generator BBS encryption scheme A prime p is called a Blum prime if p mod 4 = 3. ALGORITHM Alice, the recipient, makes her BBS key as follows: BBS encryption scheme A prime p is called a Blum prime if p mod 4 =

More information

Time-Based Proxy Re-encryption Review

Time-Based Proxy Re-encryption Review Time-Based Proxy Re-encryption Review Meghatai Maruti Bhoite 1, I Govardhan Rao 2 CSE, University College of Engineering Osmania University, Hyderabad, India Abstract :- Fundamentals approach for secure

More information

CS573 Data Privacy and Security. Cryptographic Primitives and Secure Multiparty Computation. Li Xiong

CS573 Data Privacy and Security. Cryptographic Primitives and Secure Multiparty Computation. Li Xiong CS573 Data Privacy and Security Cryptographic Primitives and Secure Multiparty Computation Li Xiong Outline Cryptographic primitives Symmetric Encryption Public Key Encryption Secure Multiparty Computation

More information

Public-Key Cryptography. Professor Yanmin Gong Week 3: Sep. 7

Public-Key Cryptography. Professor Yanmin Gong Week 3: Sep. 7 Public-Key Cryptography Professor Yanmin Gong Week 3: Sep. 7 Outline Key exchange and Diffie-Hellman protocol Mathematical backgrounds for modular arithmetic RSA Digital Signatures Key management Problem:

More information

Attribute Based Encryption with Privacy Protection in Clouds

Attribute Based Encryption with Privacy Protection in Clouds Attribute Based Encryption with Privacy Protection in Clouds Geetanjali. M 1, Saravanan. N 2 PG Student, Department of Information Technology, K.S.R College of Engineering, Tiruchengode, Tamilnadu, India

More information

A Review: Data Security in Cloud via Decentralized Access Control Technique

A Review: Data Security in Cloud via Decentralized Access Control Technique A Review: Data Security in Cloud via Decentralized Access Control Technique Ashwini.S. Kale mone.ashwini@gmail.com Niraj N. Kasliwal kasliwaln@gmail.com Deepika A. Kadale deepikakadale@gmail.com Vaibhav

More information

Verifiably Encrypted Signature Scheme with Threshold Adjudication

Verifiably Encrypted Signature Scheme with Threshold Adjudication Verifiably Encrypted Signature Scheme with Threshold Adjudication M. Choudary Gorantla and Ashutosh Saxena Institute for Development and Research in Banking Technology Road No. 1, Castle Hills, Masab Tank,

More information

An Efficient Verifiable Multi-Authority Secret Access control scheme in Cloud Storage M.Sreelakshmi & P.Gangadhara

An Efficient Verifiable Multi-Authority Secret Access control scheme in Cloud Storage M.Sreelakshmi & P.Gangadhara An Efficient Verifiable Multi-Authority Secret Access control scheme in Cloud Storage M.Sreelakshmi & P.Gangadhara 1 M.Tech, Dept of CSE,Shri Shirdi Sai Institute of Science and Engineering, Affiliated

More information

P2P Social Networks With Broadcast Encryption Protected Privacy

P2P Social Networks With Broadcast Encryption Protected Privacy P2P Social Networks With Broadcast Encryption Protected Privacy Oleksandr Bodriagov, Sonja Buchegger School of Computer Science and Communication KTH - The Royal Institute of Technology Stockholm, Sweden

More information

Universally Composable Attribute-based Group Key Exchange

Universally Composable Attribute-based Group Key Exchange , pp.179-190 http://dx.doi.org/10.14257/ijsia.2015.9.1.19 Universally Composable Attribute-based Group Key Exchange Hui Xie, Yongjie Yan and Sihui Shu School of Mathematics & Computer Science, Jiangxi

More information

FDAC: Toward Fine-grained Distributed Data Access Control in Wireless Sensor Networks

FDAC: Toward Fine-grained Distributed Data Access Control in Wireless Sensor Networks FDAC: Toward Fine-grained Distributed Data Access Control in Wireless Sensor Networks Shucheng Yu Department of ECE Worcester Polytechnic Institute Email: yscheng@wpi.edu Kui Ren Department of ECE Illinois

More information

Advanced Topics in Cryptography

Advanced Topics in Cryptography Advanced Topics in Cryptography Lecture 9: Identity based encryption (IBE), Cocks scheme. Benny Pinkas page 1 1 Related papers Lecture notes from MIT http://crypto.csail.mit.edu/classes/6.876/lecture-notes.html

More information

On Efficient Ciphertext-Policy Attribute Based Encryption and Broadcast Encryption

On Efficient Ciphertext-Policy Attribute Based Encryption and Broadcast Encryption On Efficient Ciphertext-Policy Attribute Based Encryption and Broadcast Encryption Zhibin Zhou and Dijiang Huang Arizona State University Abstract. Ciphertext Policy Attribute Based Encryption (CP-ABE)

More information

Keywords: Multi-authority attribute based encryption, key policy, ciphertext policy, central authority free

Keywords: Multi-authority attribute based encryption, key policy, ciphertext policy, central authority free Computing and Informatics, Vol. 35, 2016, 128 142 SIMPLE MULTI-AUTHORITY ATTRIBUTE-BASED ENCRYPTION FOR SHORT MESSAGES Viktória I. Villányi Department of Operations Research ELTECRYPT Research Group Eötvös

More information

Flexible CP-ABE Based Access Control on Encrypted Data for Mobile Users in Hybrid Cloud System

Flexible CP-ABE Based Access Control on Encrypted Data for Mobile Users in Hybrid Cloud System Li WM, Li XL, Wen QY et al. Flexible CP-ABE based access control on encrypted data for mobile users in hybrid cloud system. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY 32(5): 974 990 Sept. 2017. DOI 10.1007/s11390-017-1776-1

More information

ID-Based Encryption for Complex Hierarchies with Applications to Forward Security and Broadcast Encryption

ID-Based Encryption for Complex Hierarchies with Applications to Forward Security and Broadcast Encryption ID-Based Encryption for Complex Hierarchies with Applications to Forward Security and Broadcast Encryption Danfeng Yao Nelly Fazio Yevgeniy Dodis Anna Lysyanskaya Abstract A forward-secure encryption scheme

More information

Fine-Grained Data Sharing Supporting Attribute Extension in Cloud Computing

Fine-Grained Data Sharing Supporting Attribute Extension in Cloud Computing wwwijcsiorg 10 Fine-Grained Data Sharing Supporting Attribute Extension in Cloud Computing Yinghui Zhang 12 1 National Engineering Laboratory for Wireless Security Xi'an University of Posts and Telecommunications

More information

CSE 3461/5461: Introduction to Computer Networking and Internet Technologies. Network Security. Presentation L

CSE 3461/5461: Introduction to Computer Networking and Internet Technologies. Network Security. Presentation L CS 3461/5461: Introduction to Computer Networking and Internet Technologies Network Security Study: 21.1 21.5 Kannan Srinivasan 11-27-2012 Security Attacks, Services and Mechanisms Security Attack: Any

More information

Block Ciphers Tutorial. c Eli Biham - May 3, Block Ciphers Tutorial (5)

Block Ciphers Tutorial. c Eli Biham - May 3, Block Ciphers Tutorial (5) Block Ciphers Tutorial c Eli Biham - May 3, 2005 146 Block Ciphers Tutorial (5) A Known Plaintext Attack on 1-Round DES After removing the permutations IP and FP we get: L R 48 K=? F L R c Eli Biham -

More information

Decentralized Access Control Based Crime Analysis

Decentralized Access Control Based Crime Analysis International Journal of Computer Systems (ISSN: 2394-1065), Volume 03 Issue 02, February, 2016 Available at http://www.ijcsonline.com/ a Badhusha S, a Chippy Raju, a Dhanya V.S, a Nazila A.N, a Syamini

More information

Improvement of Camenisch-Neven-Shelat Oblivious Transfer Scheme

Improvement of Camenisch-Neven-Shelat Oblivious Transfer Scheme Improvement of Camenisch-Neven-Shelat Oblivious Transfer Scheme Zhengjun Cao and Hanyue Cao Department of Mathematics, Shanghai University, Shanghai, China caozhj@shu.edu.cn Abstract. In 2007, Camenisch,

More information

Inference Attack-Resistant E-Healthcare Cloud System with Fine-Grained Access Control

Inference Attack-Resistant E-Healthcare Cloud System with Fine-Grained Access Control JOURNAL OF L A T E X CLASS FILES, VOL., NO., JANUARY 2017 1 Inference Attack-Resistant E-Healthcare Cloud System with Fine-Grained Access Control Wei Zhang, Yaping Lin, Member, IEEE, Jie Wu, Fellow, IEEE,

More information

CloudSky: A Controllable Data Self-Destruction System for Untrusted Cloud Storage Networks

CloudSky: A Controllable Data Self-Destruction System for Untrusted Cloud Storage Networks CloudSky: A Controllable Data Self-Destruction System for Untrusted Cloud Storage Networks The material in these slides mainly comes from the paper CloudSky: A Controllable Data Self-Destruction System

More information

Definitions and Notations

Definitions and Notations Chapter 2 Definitions and Notations In this chapter, we present definitions and notation. We start with the definition of public key encryption schemes and their security models. This forms the basis of

More information

Foundations of Cryptography CS Shweta Agrawal

Foundations of Cryptography CS Shweta Agrawal Foundations of Cryptography CS 6111 Shweta Agrawal Course Information 4-5 homeworks (20% total) A midsem (25%) A major (35%) A project (20%) Attendance required as per institute policy Challenge questions

More information

Encrypted Data Deduplication in Cloud Storage

Encrypted Data Deduplication in Cloud Storage Encrypted Data Deduplication in Cloud Storage Chun- I Fan, Shi- Yuan Huang, Wen- Che Hsu Department of Computer Science and Engineering Na>onal Sun Yat- sen University Kaohsiung, Taiwan AsiaJCIS 2015 Outline

More information

One-Way Signature Chaining - A New Paradigm For Group Cryptosystems

One-Way Signature Chaining - A New Paradigm For Group Cryptosystems One-Way Signature Chaining - A New Paradigm For Group Cryptosystems Amitabh Saxena and Ben Soh Dept. of Computer Science and Computer Engineering La Trobe University, Bundoora, VIC, Australia 3086 Abstract

More information

ID-Based Encryption for Complex Hierarchies with Applications to Forward Security and Broadcast Encryption

ID-Based Encryption for Complex Hierarchies with Applications to Forward Security and Broadcast Encryption ID-Based Encryption for Complex Hierarchies with Applications to Forward Security and Broadcast Encryption ABSTRACT Danfeng Yao Dept. of Computer Science Brown University Providence, RI 02912 dyao@cs.brown.edu

More information

Abstract Keywords 1. INTRODUCTION

Abstract Keywords 1. INTRODUCTION Safe & Secure Ciphertext Policy Attribute Based Encryption To Avoid Suicidal Games nn Entering Whatsapp or Mobile Like Bluewhale Game or Momo Challenge S.Porkodi, ME Final Year Department of Computer Science

More information

FORMALIZING GROUP BLIND SIGNATURES... PRACTICAL CONSTRUCTIONS WITHOUT RANDOM ORACLES. Essam Ghadafi ACISP 2013

FORMALIZING GROUP BLIND SIGNATURES... PRACTICAL CONSTRUCTIONS WITHOUT RANDOM ORACLES. Essam Ghadafi ACISP 2013 FORMALIZING GROUP BLIND SIGNATURES AND PRACTICAL CONSTRUCTIONS WITHOUT RANDOM ORACLES Essam Ghadafi ghadafi@cs.bris.ac.uk University of Bristol ACISP 2013 FORMALIZING GROUP BLIND SIGNATURES... OUTLINE

More information