Multi-Authority Non-Monotonic KP-ABE With Cryptographic Reverse Firewall

The revelations of Snowden show that hardware and software of devices may corrupt users' machine to compromise the security in various ways. To address this concern, Mironov and Stephen-Davidowitz introduce the Cryptographic Reverse Firewall (CRF) concept that is able to resist the ex-filtratio...

Full description

Bibliographic Details
Main Authors: Bo Hong, Jie Chen, Kai Zhang, Haifeng Qian
Format: Article
Language:English
Published: IEEE 2019-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/8887491/
id doaj-b6d22efc2f69482da1041a488884d450
record_format Article
spelling doaj-b6d22efc2f69482da1041a488884d4502021-03-30T00:41:12ZengIEEEIEEE Access2169-35362019-01-01715900215901210.1109/ACCESS.2019.29503948887491Multi-Authority Non-Monotonic KP-ABE With Cryptographic Reverse FirewallBo Hong0Jie Chen1Kai Zhang2https://orcid.org/0000-0001-9728-4051Haifeng Qian3Department of Computer Science and Technology, East China Normal University, Shanghai, ChinaSchool of Software Engineering, East China Normal University, Shanghai, ChinaSchool of Computer Science and Technology, Shanghai University of Electric Power, Shanghai, ChinaSchool of Software Engineering, East China Normal University, Shanghai, ChinaThe revelations of Snowden show that hardware and software of devices may corrupt users' machine to compromise the security in various ways. To address this concern, Mironov and Stephen-Davidowitz introduce the Cryptographic Reverse Firewall (CRF) concept that is able to resist the ex-filtration of secret information for some compromised machine (Eurocrypt 2015). There are some applications of CRF deployed in many cryptosystems, but less studied and deployed in Attribute-Based Encryption (ABE) field, which attracts a wide range of attention and is employed in real-world scenarios (i.e., data sharing in cloud). In this work, we focus how to give a CRF security protection for a multi-authority ABE scheme and hence propose a multi-authority key-policy ABE scheme with CRF (acronym, MA-KP-ABE-CRF), which supports attribute distribution and non-monotonic access structure. To achieve this, beginning with revisiting a MA-KP-ABE with non-trivial combining non-monotonic formula, we then give the randomness of ciphertexts and secret keys with reverse firewall and give formal security analysis. Finally, we give a simulation on our MA-KP-ABE-CRF system based on Charm library whose the experimental results demonstrate practical efficiency.https://ieeexplore.ieee.org/document/8887491/Attribute-based encryptioncryptographic reverse firewallmulti-authoritynon-monotonic access structure
collection DOAJ
language English
format Article
sources DOAJ
author Bo Hong
Jie Chen
Kai Zhang
Haifeng Qian
spellingShingle Bo Hong
Jie Chen
Kai Zhang
Haifeng Qian
Multi-Authority Non-Monotonic KP-ABE With Cryptographic Reverse Firewall
IEEE Access
Attribute-based encryption
cryptographic reverse firewall
multi-authority
non-monotonic access structure
author_facet Bo Hong
Jie Chen
Kai Zhang
Haifeng Qian
author_sort Bo Hong
title Multi-Authority Non-Monotonic KP-ABE With Cryptographic Reverse Firewall
title_short Multi-Authority Non-Monotonic KP-ABE With Cryptographic Reverse Firewall
title_full Multi-Authority Non-Monotonic KP-ABE With Cryptographic Reverse Firewall
title_fullStr Multi-Authority Non-Monotonic KP-ABE With Cryptographic Reverse Firewall
title_full_unstemmed Multi-Authority Non-Monotonic KP-ABE With Cryptographic Reverse Firewall
title_sort multi-authority non-monotonic kp-abe with cryptographic reverse firewall
publisher IEEE
series IEEE Access
issn 2169-3536
publishDate 2019-01-01
description The revelations of Snowden show that hardware and software of devices may corrupt users' machine to compromise the security in various ways. To address this concern, Mironov and Stephen-Davidowitz introduce the Cryptographic Reverse Firewall (CRF) concept that is able to resist the ex-filtration of secret information for some compromised machine (Eurocrypt 2015). There are some applications of CRF deployed in many cryptosystems, but less studied and deployed in Attribute-Based Encryption (ABE) field, which attracts a wide range of attention and is employed in real-world scenarios (i.e., data sharing in cloud). In this work, we focus how to give a CRF security protection for a multi-authority ABE scheme and hence propose a multi-authority key-policy ABE scheme with CRF (acronym, MA-KP-ABE-CRF), which supports attribute distribution and non-monotonic access structure. To achieve this, beginning with revisiting a MA-KP-ABE with non-trivial combining non-monotonic formula, we then give the randomness of ciphertexts and secret keys with reverse firewall and give formal security analysis. Finally, we give a simulation on our MA-KP-ABE-CRF system based on Charm library whose the experimental results demonstrate practical efficiency.
topic Attribute-based encryption
cryptographic reverse firewall
multi-authority
non-monotonic access structure
url https://ieeexplore.ieee.org/document/8887491/
work_keys_str_mv AT bohong multiauthoritynonmonotonickpabewithcryptographicreversefirewall
AT jiechen multiauthoritynonmonotonickpabewithcryptographicreversefirewall
AT kaizhang multiauthoritynonmonotonickpabewithcryptographicreversefirewall
AT haifengqian multiauthoritynonmonotonickpabewithcryptographicreversefirewall
_version_ 1724188057124470784