Multi-Authority Non-Monotonic KP-ABE With Cryptographic Reverse Firewall
The revelations of Snowden show that hardware and software of devices may corrupt users' machine to compromise the security in various ways. To address this concern, Mironov and Stephen-Davidowitz introduce the Cryptographic Reverse Firewall (CRF) concept that is able to resist the ex-filtratio...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2019-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/8887491/ |
id |
doaj-b6d22efc2f69482da1041a488884d450 |
---|---|
record_format |
Article |
spelling |
doaj-b6d22efc2f69482da1041a488884d4502021-03-30T00:41:12ZengIEEEIEEE Access2169-35362019-01-01715900215901210.1109/ACCESS.2019.29503948887491Multi-Authority Non-Monotonic KP-ABE With Cryptographic Reverse FirewallBo Hong0Jie Chen1Kai Zhang2https://orcid.org/0000-0001-9728-4051Haifeng Qian3Department of Computer Science and Technology, East China Normal University, Shanghai, ChinaSchool of Software Engineering, East China Normal University, Shanghai, ChinaSchool of Computer Science and Technology, Shanghai University of Electric Power, Shanghai, ChinaSchool of Software Engineering, East China Normal University, Shanghai, ChinaThe revelations of Snowden show that hardware and software of devices may corrupt users' machine to compromise the security in various ways. To address this concern, Mironov and Stephen-Davidowitz introduce the Cryptographic Reverse Firewall (CRF) concept that is able to resist the ex-filtration of secret information for some compromised machine (Eurocrypt 2015). There are some applications of CRF deployed in many cryptosystems, but less studied and deployed in Attribute-Based Encryption (ABE) field, which attracts a wide range of attention and is employed in real-world scenarios (i.e., data sharing in cloud). In this work, we focus how to give a CRF security protection for a multi-authority ABE scheme and hence propose a multi-authority key-policy ABE scheme with CRF (acronym, MA-KP-ABE-CRF), which supports attribute distribution and non-monotonic access structure. To achieve this, beginning with revisiting a MA-KP-ABE with non-trivial combining non-monotonic formula, we then give the randomness of ciphertexts and secret keys with reverse firewall and give formal security analysis. Finally, we give a simulation on our MA-KP-ABE-CRF system based on Charm library whose the experimental results demonstrate practical efficiency.https://ieeexplore.ieee.org/document/8887491/Attribute-based encryptioncryptographic reverse firewallmulti-authoritynon-monotonic access structure |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Bo Hong Jie Chen Kai Zhang Haifeng Qian |
spellingShingle |
Bo Hong Jie Chen Kai Zhang Haifeng Qian Multi-Authority Non-Monotonic KP-ABE With Cryptographic Reverse Firewall IEEE Access Attribute-based encryption cryptographic reverse firewall multi-authority non-monotonic access structure |
author_facet |
Bo Hong Jie Chen Kai Zhang Haifeng Qian |
author_sort |
Bo Hong |
title |
Multi-Authority Non-Monotonic KP-ABE With Cryptographic Reverse Firewall |
title_short |
Multi-Authority Non-Monotonic KP-ABE With Cryptographic Reverse Firewall |
title_full |
Multi-Authority Non-Monotonic KP-ABE With Cryptographic Reverse Firewall |
title_fullStr |
Multi-Authority Non-Monotonic KP-ABE With Cryptographic Reverse Firewall |
title_full_unstemmed |
Multi-Authority Non-Monotonic KP-ABE With Cryptographic Reverse Firewall |
title_sort |
multi-authority non-monotonic kp-abe with cryptographic reverse firewall |
publisher |
IEEE |
series |
IEEE Access |
issn |
2169-3536 |
publishDate |
2019-01-01 |
description |
The revelations of Snowden show that hardware and software of devices may corrupt users' machine to compromise the security in various ways. To address this concern, Mironov and Stephen-Davidowitz introduce the Cryptographic Reverse Firewall (CRF) concept that is able to resist the ex-filtration of secret information for some compromised machine (Eurocrypt 2015). There are some applications of CRF deployed in many cryptosystems, but less studied and deployed in Attribute-Based Encryption (ABE) field, which attracts a wide range of attention and is employed in real-world scenarios (i.e., data sharing in cloud). In this work, we focus how to give a CRF security protection for a multi-authority ABE scheme and hence propose a multi-authority key-policy ABE scheme with CRF (acronym, MA-KP-ABE-CRF), which supports attribute distribution and non-monotonic access structure. To achieve this, beginning with revisiting a MA-KP-ABE with non-trivial combining non-monotonic formula, we then give the randomness of ciphertexts and secret keys with reverse firewall and give formal security analysis. Finally, we give a simulation on our MA-KP-ABE-CRF system based on Charm library whose the experimental results demonstrate practical efficiency. |
topic |
Attribute-based encryption cryptographic reverse firewall multi-authority non-monotonic access structure |
url |
https://ieeexplore.ieee.org/document/8887491/ |
work_keys_str_mv |
AT bohong multiauthoritynonmonotonickpabewithcryptographicreversefirewall AT jiechen multiauthoritynonmonotonickpabewithcryptographicreversefirewall AT kaizhang multiauthoritynonmonotonickpabewithcryptographicreversefirewall AT haifengqian multiauthoritynonmonotonickpabewithcryptographicreversefirewall |
_version_ |
1724188057124470784 |