Ciphertext-Policy Attribute-Based Encryption (CP-ABE)
|
|
- Nathaniel Barber
- 6 years ago
- Views:
Transcription
1 Ciphertext-Policy Attribute-Based Encryption (CP-ABE) Presented by Sherley Codio Fall, Privacy&Security - Virginia Tech Computer Science
2 Application Scenario Sharing data on distributed systems Bob sends a sensitive memo People with a set of credentials/attributes receives it Office: Public Corruption City: Knoxville Bob FBI Head Office: Public Corruption City: Denver Access structure for accessing this information: (( Public Corruption Office AND ( Knoxville OR San Francisco )) Office: Public Corruption City: San Francisco Fall, Privacy&Security - Virginia Tech Computer Science 2
3 Application Scenario Advantages of replicating data across several locations: - Performance - Reliability Fall, Privacy&Security - Virginia Tech Computer Science 3
4 Application Scenario Disadvantage: If a server is compromised, data confidentiality is compromised Solution: Store data in encrypted form: Encrypted access control Fall, Privacy&Security - Virginia Tech Computer Science 4
5 Attribute-Based Encryption (ABE) Attribute-based encryption (ABE): New means for encrypted access control. Ciphertexts not necessarily encrypted to one particular user. Users private keys and ciphertexts associated with a set of attributes or a policy over attributes. A match between user s private key and the ciphertext, decryption is possible. Fall, Privacy&Security - Virginia Tech Computer Science 5
6 Ciphertext-Policy Attribute-Based Encryption Bob ciphertext Access Structure over attributes Sends Private Key Set of attributes Y E S Fall, Privacy&Security - Virginia Tech Computer Science 6
7 Ciphertext-Policy Attribute-Based Encryption Access Structure: monotonic access Tree Gate Gate AND Gate OR Attribute Attribute Attribute AND gate: n-of-n threshold gates OR gate: 1-of-n threshold gates Fall, Privacy&Security - Virginia Tech Computer Science 7
8 Ciphertext-Policy Attribute-Based Encryption Access Structure: monotonic access Tree X Kx=1 Kx=1 numx == number of children of X kx == numx => AND gate kx== 1 => OR gate Leaf: k == 1 Threshold gate: Described by children and threshold value Fall, Privacy&Security - Virginia Tech Computer Science 8
9 Ciphertext-Policy Attribute-Based Encryption Satisfying an Access Tree r Tr == T x Tx Kx=1 Kx=1 att(x): denotes the attribute associated with the leaf node x γ set of attributes => Tx(γ) == 1 Tx(γ) == 1 iff at least kx == 1 x is a leaf node => then Tx(γ)== 1 iff att(x) γ Fall, Privacy&Security - Virginia Tech Computer Science 9
10 Difference between KP-ABE and CP-ABE KP-ABE ciphertext Sends Private Key Bob Descriptive attributes Policies CP-ABE ciphertext Private Key Set of attributes Bob Access Structure over attributes Sends Y E S Fall, Privacy&Security - Virginia Tech Computer Science 10
11 CP-ABE: Fundamental Algorithms Setup Encrypt Keygen Decrypt Delegate Fall, Privacy&Security - Virginia Tech Computer Science 11
12 CP-ABE: Fundamental Algorithms Implicit security parameter M Setup PK Encrypt A S MK Keygen PK SK CT Decrypt M Fall, Privacy&Security 12 - Virginia Tech Computer Science
13 Bilinear map G0 and G1: two multiplicative cyclic groups of prime order p. g a generator of G0 and e a bilinear map, e : G0 G0 G1. e has the following properties: 1. Bilinearity: for all u, v G0 and a, b Zp, e(u^a, v^b) = e(u, v)^ab. 2. Non-degeneracy: e(g, g) =/ 1 Fall, Privacy&Security - Virginia Tech Computer Science 13
14 The Setup Algorithm Public Key PK PK = G0, g, h = g^β, f = g^1/β, e(g, g)^α Master key MK (β, g^α) Fall, Privacy&Security - Virginia Tech Computer Science 14
15 The Encryption Algorithm Let, Y be the set of leaf nodes in T. The ciphertext is constructed by giving the tree access structure T and computing CT =T, C = Me(g, g)^αs, C = h^s, y Y : Cy = g^qy (0), C y = H(att(y))^qy (0) Fall, Privacy&Security - Virginia Tech Computer Science 15
16 The Keygen Algorithm Let r Zp, rj Zp, j S. Then it computes the key as SK = (D = g^(α+r)/β, j S : Dj = g^r. H(j)^rj, D j = g^rj) Fall, Privacy&Security - Virginia Tech Computer Science 16
17 The Decryption Algorithm I x is a leaf node, i = att(x), i S CT = (T, C, C, y Y : Cy, C ) DecryptNode(CT, SK, x) =e(di, Cx)/e(D i, C x) =e(g^r. H(i)^ri, g^qx(0))/e(g^ri, H(i)^qx(0) == e(g, g)^rqx(0) If i / S DecryptNode(CT, SK, x) = Fall, Privacy&Security - Virginia Tech Computer Science 17
18 The Decryption Algorithm I x is a non-leaf node Fall, Privacy&Security - Virginia Tech Computer Science 18
19 The Delegate algorithm Delegate( SK, S ), S S SK = (D, j S : Dj, D j) SK = (D = Df^r, k S : D k = Dkg^r H(k)^r k, D k = D kg^r k) Fall, Privacy&Security - Virginia Tech Computer Science 19
20 Security Intuition To decrypt an attacker needs e(g, g)^αs To recover e(g, g)^αs, C must be paired with the D component from some user s private key. Fall, Privacy&Security - Virginia Tech Computer Science 20
21 How is Collusion Prevented? e(g, g)^αs is blinded e(g, g)^rs To blind e(g, g)^αs, correct key components needed blinding value is randomized Fall, Privacy&Security - Virginia Tech Computer Science 21
Key-Policy Attribute-Based Encryption
Key-Policy Attribute-Based Encryption Present by Xiaokui Shu 09/08/2011 Identity-Based Encryption Basic KP-ABE Secret-Sharing Scheme Fine-grained Access Control Application Scenario Advanced Topics Related
More informationCollusion-Resistant Group Key Management Using Attributebased
Collusion-Resistant Group Key Management Using Attributebased Encryption Presented by: Anurodh Joshi Overview of the Paper Presents a ciphertext-policy attribute-based encryption (CP-ABE) scheme to solve
More informationAttribute-Sets: A Practically Motivated Enhancement to Attribute-Based Encryption
Attribute-Sets: A Practically Motivated Enhancement to Attribute-Based Encryption Rakesh Bobba, Himanshu Khurana and Manoj Prabhakaran University of Illinois, Urbana-Champaign IL USA, {rbobba,hkhurana,mmp}@illinois.edu
More informationInsecurity of an Dynamic User Revocation and Key Refreshing for Attribute-Based Encryption Scheme
2014 Tenth 10th International Conference on Computational Intelligence and Security Insecurity of an Dynamic User Revocation and Key Refreshing for Attribute-Based Encryption Scheme Changji Wang, Haitao
More informationAttribute-based encryption with encryption and decryption outsourcing
Edith Cowan University Research Online Australian Information Security Management Conference Conferences, Symposia and Campus Events 2014 Attribute-based encryption with encryption and decryption outsourcing
More informationAttribute-Sets: A Practically Motivated Enhancement to Attribute-Based Encryption
Attribute-Sets: A Practically Motivated Enhancement to Attribute-Based Encryption Rakesh Bobba, Himanshu Khurana and Manoj Prabhakaran University of Illinois at Urbana-Champaign {rbobba,hkhurana,mmp}@illinois.edu
More informationSecurity Weaknesses of an Anonymous Attribute Based Encryption appeared in ASIACCS 13
Security Weaknesses of an Anonymous Attribute Based Encryption appeared in ASIACCS 13 Payal Chaudhari, Manik Lal Das, Anish Mathuria DA-IICT, Gandhinagar, India {payal chaudhari, maniklal das, anish mathuria}@daiict.ac.in
More informationUnbounded Inner Product Functional Encryption from Bilinear Maps ASIACRYPT 2018
Unbounded Inner Product Functional Encryption from Bilinear Maps ASIACRYPT 2018 Junichi Tomida (NTT), Katsuyuki Takashima (Mitsubishi Electric) Functional Encryption[OʼNeill10, BSW11] msk Bob f(x) sk f
More informationA compact Aggregate key Cryptosystem for Data Sharing in Cloud Storage systems.
A compact Aggregate key Cryptosystem for Data Sharing in Cloud Storage systems. G Swetha M.Tech Student Dr.N.Chandra Sekhar Reddy Professor & HoD U V N Rajesh Assistant Professor Abstract Cryptography
More informationBounded Ciphertext Policy Attribute Based Encryption
Bounded Ciphertext Policy Attribute Based Encryption Vipul Goyal, Abhishek Jain, Omkant Pandey, and Amit Sahai Department of Computer Science, UCLA {vipul,abhishek,omkant,sahai}@cs.ucla.edu Abstract. In
More informationVerifiable Outsourced Ciphertext-Policy Attribute-Based Encryption for Mobile Cloud Computing
KSII TRANSACTINS N INTERNET AND INFRMATIN SYSTEMS VL, N 6, Jun 27 3254 Copyright c27 KSII Verifiable utsourced Ciphertext-Policy Attribute-Based Encryption for Mobile Cloud Computing Zhiyuan Zhao, Jianhua
More informationGroup Selection and Key Management Strategies for Ciphertext-Policy Attribute-Based Encryption
Rochester Institute of Technology RIT Scholar Works Theses Thesis/Dissertation Collections 12-2013 Group Selection and Key Management Strategies for Ciphertext-Policy Attribute-Based Encryption Russell
More informationOn the Insecurity of a Method for Providing Secure and Private Fine-Grained Access to Outsourced Data
On the Insecurity of a Method for Providing Secure and Private Fine-Grained Access to Outsourced Data Alfredo Rial Interdisciplinary Centre for Security, Reliability and Trust (SnT) University of Luxembourg
More informationPIRATTE: Proxy-based Immediate Revocation of ATTribute-based Encryption
PIRATTE: Proxy-based Immediate Revocation of ATTribute-based Encryption Sonia Jahid and Nikita Borisov {sjahid2,nikita}@illinois.edu University of Illinois at Urbana-Champaign arxiv:208.4877v [cs.cr] 23
More informationOptimal Multicast Group Communication
Optimal Multicast Group Communication Zhibin Zhou and Dijiang Huang Arizona State University Abstract Many IP multicast based applications, such as Pay- TV, Multiplayer games, require controlling the group
More informationSpatial Encryption. March 17, Adam Barth, Dan Boneh, Mike Hamburg
Adam Barth Dan Boneh Mike Hamburg March 17, 2008 Traditional Public-Key Infrastructure CA Alice Bob Traditional Public-Key Infrastructure CA PK Bob, proof of identity Alice Bob Traditional Public-Key Infrastructure
More informationA Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing
IEEE TRANSACTIONS ON CLOUD COMPUTING, 2016 1 A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing Ruixuan Li, Member, IEEE, Chenglin Shen, Heng He, Zhiyong Xu, and Cheng-Zhong Xu, Member,
More informationPublicly Verifiable Secret Sharing for Cloud-based Key Management
Publicly Verifiable Secret Sharing for Cloud-based Key Management Roy D Souza, David Jao, Ilya Mironov and Omkant Pandey Microsoft Corporation and University of Waterloo December 13, 2011 Overview Motivation:
More informationAttribute-Based Encryption. Allison Lewko, Microsoft Research
Attribute-Based Encryption Allison Lewko, Microsoft Research The Cast of Characters This talk will feature work by: Brent Waters Amit Sahai Vipul Goyal Omkant Pandey With special guest appearances by:
More informationVarious Attribute Based Encryption Algorithms in Clouds-A Survey P. Sivakumar 1 K. Devi 2 M. Navinkumar 3
IJSRD - International Journal for Scientific Research & Development Vol. 3, Issue 03, 2015 ISSN (online): 2321-0613 Various Attribute Based Encryption Algorithms in Clouds-A Survey P. Sivakumar 1 K. Devi
More informationAn Efficient Certificateless Proxy Re-Encryption Scheme without Pairing
An Efficient Certificateless Proxy Re-Encryption Scheme without Pairing Presented By: Arinjita Paul Authors: S. Sharmila Deva Selvi, Arinjita Paul, C. Pandu Rangan TCS Lab, Department of CSE, IIT Madras.
More informationStructure-Preserving Certificateless Encryption and Its Application
SESSION ID: CRYP-T06 Structure-Preserving Certificateless Encryption and Its Application Prof. Sherman S. M. Chow Department of Information Engineering Chinese University of Hong Kong, Hong Kong @ShermanChow
More informationInter-domain Identity-based Proxy Re-encryption
Inter-domain Identity-based Proxy Re-encryption Qiang Tang, Pieter Hartel, Willem Jonker Faculty of EWI, University of Twente, the Netherlands {q.tang, pieter.hartel, jonker}@utwente.nl August 19, 2008
More informationClock-Based Proxy Re-encryption Scheme in Unreliable Clouds
Clock-Based Proxy Re-encryption Scheme in Unreliable Clouds Qin Liu [1][2], Guojun Wang [1], and Jie Wu [2], [1] Central South University, China [2] Temple University, USA 1 Outline 1. 1. Introduction
More informationKey Escrow free Identity-based Cryptosystem
Key Escrow free Manik Lal Das DA-IICT, Gandhinagar, India About DA-IICT and Our Group DA-IICT is a private university, located in capital of Gujarat state in India. DA-IICT offers undergraduate and postgraduate
More informationAttribute-Based Authenticated Key Exchange
1 / 22 Attribute-Based Authenticated Key Exchange Choudary Gorantla, Colin Boyd and Juan González Nieto ACISP 2010 2 / 22 Outline Introduction 1 Introduction 2 3 4 3 / 22 Outline Introduction 1 Introduction
More informationCollusion-Resistant Identity-based Proxy Re-encryption
Collusion-Resistant Identity-based Proxy Re-encryption Woo Kwon Koo 1, Jung Yeon Hwang 2, and Dong Hoon Lee 1,* 1 Graduate School of Information Security, Korea University, Seoul, Korea 2 Electronics and
More informationCryptography III. Public-Key Cryptography Digital Signatures. 2/1/18 Cryptography III
Cryptography III Public-Key Cryptography Digital Signatures 2/1/18 Cryptography III 1 Public Key Cryptography 2/1/18 Cryptography III 2 Key pair Public key: shared with everyone Secret key: kept secret,
More informationSession Based Ciphertext Policy Attribute Based Encryption Method for Access Control in Cloud Storage
IOSR Journal of Engineering (IOSRJEN) ISSN (e): 2250-3021, ISSN (p): 2278-8719 Vol. 04, Issue 09 (September. 2014), V3 PP 21-25 www.iosrjen.org Session Based Ciphertext Policy Attribute Based Encryption
More informationDr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010
CS 494/594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010 1 Public Key Cryptography Modular Arithmetic RSA
More informationAttribute-based encryption scheme supporting decryption outsourcing and attribute revocation in cloud storage
Attribute-based encryption scheme supporting decryption outsourcing and attribute reocation in cloud storage Hongwei Liu 1, a 1 College of Information Engineering Shenhen Uniersity Shenhen, China a liuhw@sueducn
More informationRelaxing IND-CCA: Indistinguishability Against Chosen. Chosen Ciphertext Verification Attack
Relaxing IND-CCA: Indistinguishability Against Chosen Ciphertext Verification Attack Indian Statistical Institute Kolkata January 14, 2012 Outline 1 Definitions Encryption Scheme IND-CPA IND-CCA IND-CCVA
More informationInter-Domain Identity-based Authenticated Key Agreement Protocol from the Weil Pairing
Inter-Domain Identity-based Authenticated Key Agreement Protocol from the Weil Pairing Tsai, Hong-Bin Chiu, Yun-Peng Lei, Chin-Laung Dept. of Electrical Engineering National Taiwan University July 10,
More informationOn the Security of Group-based Proxy Re-encryption Scheme
On the Security of Group-based Proxy Re-encryption Scheme Purushothama B R 1, B B Amberker Department of Computer Science and Engineering National Institute of Technology Warangal Warangal, Andhra Pradesh-506004,
More informationEfficient Routing In Delay Tolerant Network Based On Secure Fuzzy Spray Decision Algorithm
INTERNATIONAL JOURNAL OF TECHNOLOGY ENHANCEMENTS AND EMERGING ENGINEERING RESEARCH, VOL 2, ISSUE 10 37 Efficient Routing In Delay Tolerant Network Based On Secure Fuzzy Spray Decision Algorithm Kumar Kombaiya.A,
More informationMediated Ciphertext-Policy Attribute-Based Encryption and its Application
Mediated Ciphertext-Policy Attribute-Based Encryption and its Application Luan Ibraimi 1,2, Milan Petkovic 2, Svetla Nikova 1, Pieter Hartel 1, Willem Jonker 1,2 1 Faculty of EEMCS, University of Twente,
More informationEfficient Generation of Linear Secret Sharing. Scheme Matrices from Threshold Access Trees
Efficient Generation of Linear Secret Sharing 1 Scheme Matrices from Threshold Access Trees Zhen Liu, Zhenfu Cao, and Duncan S. Wong Abstract Linear Secret Sharing Scheme (LSSS) matrices are commonly used
More informationOn the Security of an Efficient Group Key Agreement Scheme for MANETs
On the Security of an Efficient Group Key Agreement Scheme for MANETs Purushothama B R 1,, Nishat Koti Department of Computer Science and Engineering National Institute of Technology Goa Farmagudi, Ponda-403401,
More informationOutsourcing Encryption of Attribute-based Encryption with MapReduce
Outsourcing Encryption of Attribute-based Encryption with MapReduce Jingwei Li 1, Chunfu Jia 1, Jin Li 2, and Xiaofeng Chen 3 1 College of Information Technical Science, Nankai University lijw@mail.nankai.edu.cn;
More informationThird-Party Authentication in the Institutional File System
CITI Technical Report 92-1 Third-Party Authentication in the Institutional File System Bill Doster Bill.Doster@umich.edu Jim Rees Jim.Rees@umich.edu Institutional File System Project Center for Information
More informationHiding software components using functional encryption. Janek Jochheim
Hiding software components using functional encryption by Janek Jochheim Fakultät für Elektrotechnik, Informatik und Mathematik Heinz Nixdorf Institut und Institut für Informatik Fachgebiet Softwaretechnik
More informationISSN: (Online) Volume 3, Issue 5, May 2015 International Journal of Advance Research in Computer Science and Management Studies
ISSN: 2321-7782 (Online) Volume 3, Issue 5, May 2015 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online at:
More informationA Key-Policy Attribute-based Encryption Scheme for General Circuit from Bilinear Maps
International Journal of Network Security, Vol.19, No.5, PP.704-710, Sept. 2017 (DOI: 10.6633/IJNS.201709.19(5).07) 704 A Key-Policy Attribute-based Encryption Scheme for General Circuit from Bilinear
More informationA Procedural Based Encryption Technique for Accessing Data on Cloud
A Procedural Based Encryption Technique for Accessing Data on Cloud Avinash N 1, Divya C 2 P.G. Student, Department of Computer Science and Engineering, SVIT, Bangalore, Karnataka, India 1 Assistant Professor,
More informationDABKS: Dynamic Attribute-based Keyword Search in Cloud Computing
DABKS: Dynamic Attribute-based Keyword Search in Cloud Computing Baishuang Hu, Qin Liu, Xuhui Liu, Tao Peng, Guojun Wang, and Jie Wu College of Computer Science and Electronic Engineering, Hunan University,
More informationTO satisfy requirements of data storage and high
1484 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 27, NO. 5, MAY 2016 TMACS A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud Storage Wei Li, Kaiping
More informationWIRELESS sensor networks (WSNs) have been an area of
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 22, NO. 4, APRIL 2011 673 FDAC: Toward Fine-Grained Distributed Data Access Control in Wireless Sensor Networks Shucheng Yu, Member, IEEE, Kui
More informationAn Encryption Scheme for a Secure Policy Updating
An Encryption Scheme for a Secure Policy Updating Luan Ibraimi Faculty of Electrical Engineering, Mathematics and Computer Science, University of Twente, The Netherlands ibraimi@ewi.utwente.nl Muhammad
More informationSecure Multiparty Computation
Secure Multiparty Computation Li Xiong CS573 Data Privacy and Security Outline Secure multiparty computation Problem and security definitions Basic cryptographic tools and general constructions Yao s Millionnare
More informationOblivious Signature-Based Envelope
Oblivious Signature-Based Envelope Ninghui Li Department of Computer Sciences and CERIAS Purdue University 656 Oval Dr, West Lafayette, IN 47907-2086 ninghui@cs.purdue.edu Wenliang Du Department of Electrical
More informationCSCI 454/554 Computer and Network Security. Topic 5.2 Public Key Cryptography
CSCI 454/554 Computer and Network Security Topic 5.2 Public Key Cryptography Outline 1. Introduction 2. RSA 3. Diffie-Hellman Key Exchange 4. Digital Signature Standard 2 Introduction Public Key Cryptography
More informationPolicy-Sealed Data: A New Abstraction for Building Trusted Cloud Services
Max Planck Institute for Software Systems Policy-Sealed Data: A New Abstraction for Building Trusted Cloud Services 1, Rodrigo Rodrigues 2, Krishna P. Gummadi 1, Stefan Saroiu 3 MPI-SWS 1, CITI / Universidade
More informationCS 161 Computer Security
Popa & Wagner Spring 2016 CS 161 Computer Security Discussion 5 Week of February 19, 2017 Question 1 Diffie Hellman key exchange (15 min) Recall that in a Diffie-Hellman key exchange, there are values
More informationAttribute Based Group Key Management
1 Attribute Based Group Key Management Mohamed Nabeel, Elisa Bertino Purdue University, West Lafayette, Indiana, USA {nabeel, bertino}@cs.purdue.edu 2 Abstract Attribute based systems enable fine-grained
More informationOutline. CSCI 454/554 Computer and Network Security. Introduction. Topic 5.2 Public Key Cryptography. 1. Introduction 2. RSA
CSCI 454/554 Computer and Network Security Topic 5.2 Public Key Cryptography 1. Introduction 2. RSA Outline 3. Diffie-Hellman Key Exchange 4. Digital Signature Standard 2 Introduction Public Key Cryptography
More informationAn IBE Scheme to Exchange Authenticated Secret Keys
An IBE Scheme to Exchange Authenticated Secret Keys Waldyr Dias Benits Júnior 1, Routo Terada (Advisor) 1 1 Instituto de Matemática e Estatística Universidade de São Paulo R. do Matão, 1010 Cidade Universitária
More informationUpdating attribute in CP-ABE: A New Approach
Updating attribute in CP-ABE: A New Approach Nishant Doshi and Devesh Jinwala National Institute of Technology, Surat, India {doshinikki2004,dcjinwala}@gmail.com Abstract. In Ciphertext-Policy Attribute
More informationSecret Sharing With Trusted Third Parties Using Piggy Bank Protocol
Secret Sharing With Trusted Third Parties Using Piggy Bank Protocol Adnan Memon Abstract This paper presents a new scheme to distribute secret shares using two trusted third parties to increase security
More informationCountry
Total EU-12 31,2 26,6 21,1 22,5 25,9 29,2 29,6 29,7 30,5 29,9 25,3 25,1 EU-15 28,1 28,6 28,6 29,4 28,8 24,3 24,2 EU-25 25,0 25,0 A 15,0 13,4 14,3 15,6 14,9 16,6 13,6 5,3 10,9 10,8 B 41,9 44,7 51,6 53,5
More informationTwo-Dimensional Representation of Cover Free Families and its Applications: Short Signatures and More Shota Yamada The University of Tokyo
Two-Dimensional Representation of Cover Free Families and its Applications: Short Signatures and More Shota Yamada The University of Tokyo Session ID: CRYP-303 Session Classification: Advanced Our Results
More informationOutline. Public Key Cryptography. Applications of Public Key Crypto. Applications (Cont d)
Outline AIT 682: Network and Systems Security 1. Introduction 2. RSA 3. Diffie-Hellman Key Exchange 4. Digital Signature Standard Topic 5.2 Public Key Cryptography Instructor: Dr. Kun Sun 2 Public Key
More informationDefining Encryption. Lecture 2. Simulation & Indistinguishability
Defining Encryption Lecture 2 Simulation & Indistinguishability Roadmap First, Symmetric Key Encryption Defining the problem We ll do it elaborately, so that it will be easy to see different levels of
More informationSecure Data Storage and Data Retrieval in Cloud Storage using Cipher Policy Attribute based Encryption
Indian Journal of Science and Technology, Vol 8(S9), 318 325, May 2015 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 DOI: 10.17485/ijst/2015/v8iS9/65600 Secure Data Storage and Data Retrieval in Cloud
More informationOn the security of a certificateless signature scheme in the standard model
On the security of a certificateless signature scheme in the standard model Lin Cheng, Qiaoyan Wen, Zhengping Jin, Hua Zhang State Key Laboratory of Networking and Switch Technology, Beijing University
More informationBrief Introduction to Provable Security
Brief Introduction to Provable Security Michel Abdalla Département d Informatique, École normale supérieure michel.abdalla@ens.fr http://www.di.ens.fr/users/mabdalla 1 Introduction The primary goal of
More informationSecure Multiparty Computation
CS573 Data Privacy and Security Secure Multiparty Computation Problem and security definitions Li Xiong Outline Cryptographic primitives Symmetric Encryption Public Key Encryption Secure Multiparty Computation
More informationTuesday, January 17, 17. Crypto - mini lecture 1
Crypto - mini lecture 1 Cryptography Symmetric key cryptography (secret key crypto): sender and receiver keys identical Asymmetric key cryptography (public key crypto): encryption key public, decryption
More informationSecure Data Sharing in Cloud Computing: Challenges and Research Directions
Cyber Summer School Melbourne, 12-13 Feb 2018 Secure Data Sharing in Cloud Computing: Challenges and Research Directions Willy Susilo Institute of Cybersecurity and Cryptology School of Computing and Information
More informationSecurity. Alessandro Margara Slides based on previous work by Matteo Migliavacca and Alessandro Sivieri
Security Alessandro Margara alessandro.margara@polimi.it Slides based on previous work by Matteo Migliavacca and Alessandro Sivieri Why security in a DS course? Sharing of resources is the motivating factor
More informationA practical application of CP ABE for mobile PHR system: a study on the user accountability
DOI 10.1186/s40064-016-3002-y SHORT REPORT Open Access A practical application of CP ABE for mobile PHR system: a study on the user accountability Hanshu Hong 1, Di Chen 2 and Zhixin Sun 1* *Correspondence:
More informationBlum-Blum-Shub cryptosystem and generator. Blum-Blum-Shub cryptosystem and generator
BBS encryption scheme A prime p is called a Blum prime if p mod 4 = 3. ALGORITHM Alice, the recipient, makes her BBS key as follows: BBS encryption scheme A prime p is called a Blum prime if p mod 4 =
More informationTime-Based Proxy Re-encryption Review
Time-Based Proxy Re-encryption Review Meghatai Maruti Bhoite 1, I Govardhan Rao 2 CSE, University College of Engineering Osmania University, Hyderabad, India Abstract :- Fundamentals approach for secure
More informationCS573 Data Privacy and Security. Cryptographic Primitives and Secure Multiparty Computation. Li Xiong
CS573 Data Privacy and Security Cryptographic Primitives and Secure Multiparty Computation Li Xiong Outline Cryptographic primitives Symmetric Encryption Public Key Encryption Secure Multiparty Computation
More informationPublic-Key Cryptography. Professor Yanmin Gong Week 3: Sep. 7
Public-Key Cryptography Professor Yanmin Gong Week 3: Sep. 7 Outline Key exchange and Diffie-Hellman protocol Mathematical backgrounds for modular arithmetic RSA Digital Signatures Key management Problem:
More informationAttribute Based Encryption with Privacy Protection in Clouds
Attribute Based Encryption with Privacy Protection in Clouds Geetanjali. M 1, Saravanan. N 2 PG Student, Department of Information Technology, K.S.R College of Engineering, Tiruchengode, Tamilnadu, India
More informationA Review: Data Security in Cloud via Decentralized Access Control Technique
A Review: Data Security in Cloud via Decentralized Access Control Technique Ashwini.S. Kale mone.ashwini@gmail.com Niraj N. Kasliwal kasliwaln@gmail.com Deepika A. Kadale deepikakadale@gmail.com Vaibhav
More informationVerifiably Encrypted Signature Scheme with Threshold Adjudication
Verifiably Encrypted Signature Scheme with Threshold Adjudication M. Choudary Gorantla and Ashutosh Saxena Institute for Development and Research in Banking Technology Road No. 1, Castle Hills, Masab Tank,
More informationAn Efficient Verifiable Multi-Authority Secret Access control scheme in Cloud Storage M.Sreelakshmi & P.Gangadhara
An Efficient Verifiable Multi-Authority Secret Access control scheme in Cloud Storage M.Sreelakshmi & P.Gangadhara 1 M.Tech, Dept of CSE,Shri Shirdi Sai Institute of Science and Engineering, Affiliated
More informationP2P Social Networks With Broadcast Encryption Protected Privacy
P2P Social Networks With Broadcast Encryption Protected Privacy Oleksandr Bodriagov, Sonja Buchegger School of Computer Science and Communication KTH - The Royal Institute of Technology Stockholm, Sweden
More informationUniversally Composable Attribute-based Group Key Exchange
, pp.179-190 http://dx.doi.org/10.14257/ijsia.2015.9.1.19 Universally Composable Attribute-based Group Key Exchange Hui Xie, Yongjie Yan and Sihui Shu School of Mathematics & Computer Science, Jiangxi
More informationFDAC: Toward Fine-grained Distributed Data Access Control in Wireless Sensor Networks
FDAC: Toward Fine-grained Distributed Data Access Control in Wireless Sensor Networks Shucheng Yu Department of ECE Worcester Polytechnic Institute Email: yscheng@wpi.edu Kui Ren Department of ECE Illinois
More informationAdvanced Topics in Cryptography
Advanced Topics in Cryptography Lecture 9: Identity based encryption (IBE), Cocks scheme. Benny Pinkas page 1 1 Related papers Lecture notes from MIT http://crypto.csail.mit.edu/classes/6.876/lecture-notes.html
More informationOn Efficient Ciphertext-Policy Attribute Based Encryption and Broadcast Encryption
On Efficient Ciphertext-Policy Attribute Based Encryption and Broadcast Encryption Zhibin Zhou and Dijiang Huang Arizona State University Abstract. Ciphertext Policy Attribute Based Encryption (CP-ABE)
More informationKeywords: Multi-authority attribute based encryption, key policy, ciphertext policy, central authority free
Computing and Informatics, Vol. 35, 2016, 128 142 SIMPLE MULTI-AUTHORITY ATTRIBUTE-BASED ENCRYPTION FOR SHORT MESSAGES Viktória I. Villányi Department of Operations Research ELTECRYPT Research Group Eötvös
More informationFlexible CP-ABE Based Access Control on Encrypted Data for Mobile Users in Hybrid Cloud System
Li WM, Li XL, Wen QY et al. Flexible CP-ABE based access control on encrypted data for mobile users in hybrid cloud system. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY 32(5): 974 990 Sept. 2017. DOI 10.1007/s11390-017-1776-1
More informationID-Based Encryption for Complex Hierarchies with Applications to Forward Security and Broadcast Encryption
ID-Based Encryption for Complex Hierarchies with Applications to Forward Security and Broadcast Encryption Danfeng Yao Nelly Fazio Yevgeniy Dodis Anna Lysyanskaya Abstract A forward-secure encryption scheme
More informationFine-Grained Data Sharing Supporting Attribute Extension in Cloud Computing
wwwijcsiorg 10 Fine-Grained Data Sharing Supporting Attribute Extension in Cloud Computing Yinghui Zhang 12 1 National Engineering Laboratory for Wireless Security Xi'an University of Posts and Telecommunications
More informationCSE 3461/5461: Introduction to Computer Networking and Internet Technologies. Network Security. Presentation L
CS 3461/5461: Introduction to Computer Networking and Internet Technologies Network Security Study: 21.1 21.5 Kannan Srinivasan 11-27-2012 Security Attacks, Services and Mechanisms Security Attack: Any
More informationBlock Ciphers Tutorial. c Eli Biham - May 3, Block Ciphers Tutorial (5)
Block Ciphers Tutorial c Eli Biham - May 3, 2005 146 Block Ciphers Tutorial (5) A Known Plaintext Attack on 1-Round DES After removing the permutations IP and FP we get: L R 48 K=? F L R c Eli Biham -
More informationDecentralized Access Control Based Crime Analysis
International Journal of Computer Systems (ISSN: 2394-1065), Volume 03 Issue 02, February, 2016 Available at http://www.ijcsonline.com/ a Badhusha S, a Chippy Raju, a Dhanya V.S, a Nazila A.N, a Syamini
More informationImprovement of Camenisch-Neven-Shelat Oblivious Transfer Scheme
Improvement of Camenisch-Neven-Shelat Oblivious Transfer Scheme Zhengjun Cao and Hanyue Cao Department of Mathematics, Shanghai University, Shanghai, China caozhj@shu.edu.cn Abstract. In 2007, Camenisch,
More informationInference Attack-Resistant E-Healthcare Cloud System with Fine-Grained Access Control
JOURNAL OF L A T E X CLASS FILES, VOL., NO., JANUARY 2017 1 Inference Attack-Resistant E-Healthcare Cloud System with Fine-Grained Access Control Wei Zhang, Yaping Lin, Member, IEEE, Jie Wu, Fellow, IEEE,
More informationCloudSky: A Controllable Data Self-Destruction System for Untrusted Cloud Storage Networks
CloudSky: A Controllable Data Self-Destruction System for Untrusted Cloud Storage Networks The material in these slides mainly comes from the paper CloudSky: A Controllable Data Self-Destruction System
More informationDefinitions and Notations
Chapter 2 Definitions and Notations In this chapter, we present definitions and notation. We start with the definition of public key encryption schemes and their security models. This forms the basis of
More informationFoundations of Cryptography CS Shweta Agrawal
Foundations of Cryptography CS 6111 Shweta Agrawal Course Information 4-5 homeworks (20% total) A midsem (25%) A major (35%) A project (20%) Attendance required as per institute policy Challenge questions
More informationEncrypted Data Deduplication in Cloud Storage
Encrypted Data Deduplication in Cloud Storage Chun- I Fan, Shi- Yuan Huang, Wen- Che Hsu Department of Computer Science and Engineering Na>onal Sun Yat- sen University Kaohsiung, Taiwan AsiaJCIS 2015 Outline
More informationOne-Way Signature Chaining - A New Paradigm For Group Cryptosystems
One-Way Signature Chaining - A New Paradigm For Group Cryptosystems Amitabh Saxena and Ben Soh Dept. of Computer Science and Computer Engineering La Trobe University, Bundoora, VIC, Australia 3086 Abstract
More informationID-Based Encryption for Complex Hierarchies with Applications to Forward Security and Broadcast Encryption
ID-Based Encryption for Complex Hierarchies with Applications to Forward Security and Broadcast Encryption ABSTRACT Danfeng Yao Dept. of Computer Science Brown University Providence, RI 02912 dyao@cs.brown.edu
More informationAbstract Keywords 1. INTRODUCTION
Safe & Secure Ciphertext Policy Attribute Based Encryption To Avoid Suicidal Games nn Entering Whatsapp or Mobile Like Bluewhale Game or Momo Challenge S.Porkodi, ME Final Year Department of Computer Science
More informationFORMALIZING GROUP BLIND SIGNATURES... PRACTICAL CONSTRUCTIONS WITHOUT RANDOM ORACLES. Essam Ghadafi ACISP 2013
FORMALIZING GROUP BLIND SIGNATURES AND PRACTICAL CONSTRUCTIONS WITHOUT RANDOM ORACLES Essam Ghadafi ghadafi@cs.bris.ac.uk University of Bristol ACISP 2013 FORMALIZING GROUP BLIND SIGNATURES... OUTLINE
More information