Skip to main content
Top
Published in: Soft Computing 18/2017

30-06-2016 | Foundations

Succinct multi-authority attribute-based access control for circuits with authenticated outsourcing

Authors: Jie Xu, Qiaoyan Wen, Wenmin Li, Jian Shen, Debiao He

Published in: Soft Computing | Issue 18/2017

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Multi-authority attribute-based access control (MABAC), which allows different independent authorities to distribute secret keys, could be adopted to control access and keep data confidential. To circumvent efficiency drawbacks during the decryption, the notion of MABAC with outsourcing is applied. However, untrusted cloud server may respond a forged transformation or deceive a permissioned user with a terminator altogether. In addressing the above issue, a construction of circuit MABAC with authenticated outsourcing is considered, which enjoys succinct ciphertext and realizes the most flexible form of expression up to now. In such a scheme, combined MABAC with two types of authenticated messages (a publicly verifiable message and a privately verifiable one), both the fine-grained data access and the authenticity of the outsourcing are well guaranteed. Furthermore, the security and authentication of the proposed scheme are intensively proved. For the sake of completeness, we then simulate the scheme and show that it is appropriate for cloud computing.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literature
go back to reference Agrawal S, Boneh D, Boyen X (2010) Efficient lattice (h)ibe in the standard model. In: Proceedings EUROCRYPT 2010, Springer, Berlin, vol 6110, pp 553–572 Agrawal S, Boneh D, Boyen X (2010) Efficient lattice (h)ibe in the standard model. In: Proceedings EUROCRYPT 2010, Springer, Berlin, vol 6110, pp 553–572
go back to reference Applebaum B, Ishai Y, Kushilevitz E, Waters B (2015) Encoding functions with constant online rate, or how to compress garbled circuit keys. SIAM J Comput 44(2):433–466MathSciNetCrossRefMATH Applebaum B, Ishai Y, Kushilevitz E, Waters B (2015) Encoding functions with constant online rate, or how to compress garbled circuit keys. SIAM J Comput 44(2):433–466MathSciNetCrossRefMATH
go back to reference Attrapadung N, Herranz J, Laguillaumie F, Libert B, de Panafieu E, Rfols C (2012) Attribute-based encryption schemes with constant-size ciphertexts. Theor Comput Sci 422:15–38MathSciNetCrossRefMATH Attrapadung N, Herranz J, Laguillaumie F, Libert B, de Panafieu E, Rfols C (2012) Attribute-based encryption schemes with constant-size ciphertexts. Theor Comput Sci 422:15–38MathSciNetCrossRefMATH
go back to reference Bellare, Mihir, Namprempre C (2000) Authenticated encryption: Relations among notions and analysis of the generic composition paradigm. In: Proceedings ASIACRYPT 2000, vol 1976, pp 553–572 Bellare, Mihir, Namprempre C (2000) Authenticated encryption: Relations among notions and analysis of the generic composition paradigm. In: Proceedings ASIACRYPT 2000, vol 1976, pp 553–572
go back to reference Boneh D, Gentry C, Gorbunov S, Halevi S, Nikolaenko V, Segev G, Vaikuntanathan V, Vinayagamurthy D (2014) Fully key-homomorphic encryption, arithmetic circuit abe and compact garbled circuits. In: Proceedings EUROCRYPT 2014, vol 8441, pp 553–572 Boneh D, Gentry C, Gorbunov S, Halevi S, Nikolaenko V, Segev G, Vaikuntanathan V, Vinayagamurthy D (2014) Fully key-homomorphic encryption, arithmetic circuit abe and compact garbled circuits. In: Proceedings EUROCRYPT 2014, vol 8441, pp 553–572
go back to reference Boyen X (2013) Attribute-based functional encryption on lattices. In: Proceedings TCC 2013, vol 7785, pp 122–142 Boyen X (2013) Attribute-based functional encryption on lattices. In: Proceedings TCC 2013, vol 7785, pp 122–142
go back to reference Castiglione A, Cattaneo G, De Santis A, Petagna F, Ferraro Petrillo U (2006) SPEECH: Secure personal end-to-end communication with handheld, Vieweg, chap ISSE 2006 — Securing electronic business processes, pp 287–297. doi:10.1007/978-3-8348-9195-2_31 Castiglione A, Cattaneo G, De Santis A, Petagna F, Ferraro Petrillo U (2006) SPEECH: Secure personal end-to-end communication with handheld, Vieweg, chap ISSE 2006 — Securing electronic business processes, pp 287–297. doi:10.​1007/​978-3-8348-9195-2_​31
go back to reference Castiglione A, Cattaneo G, Maio GD, Petagna F (2011) Secr3t: Secure end-to-end communication over 3g telecommunication networks. In: Innovative mobile and internet services in ubiquitous computing (IMIS), 2011 5th international conference on, pp 520–526, doi:10.1109/IMIS.2011.65 Castiglione A, Cattaneo G, Maio GD, Petagna F (2011) Secr3t: Secure end-to-end communication over 3g telecommunication networks. In: Innovative mobile and internet services in ubiquitous computing (IMIS), 2011 5th international conference on, pp 520–526, doi:10.​1109/​IMIS.​2011.​65
go back to reference Chase M (2007) Multi-authority attribute based encryption. In: Proceedings TCC 2007, vol 4392, pp 515–534 Chase M (2007) Multi-authority attribute based encryption. In: Proceedings TCC 2007, vol 4392, pp 515–534
go back to reference Chen X, Li J, Ma J, Tang Q, Lou W (2014) New algorithms for secure outsourcing of modular exponentiations. IEEE Transact Parallel Distribut Syst 25(9):2386–2396CrossRef Chen X, Li J, Ma J, Tang Q, Lou W (2014) New algorithms for secure outsourcing of modular exponentiations. IEEE Transact Parallel Distribut Syst 25(9):2386–2396CrossRef
go back to reference Chen X, Huang X, Li J, Ma J, Lou W, Wong DS (2015) New algorithms for secure outsourcing of large-scale systems of linear equations. IEEE Transact Informat Forens Sec 10(1):69–78CrossRef Chen X, Huang X, Li J, Ma J, Lou W, Wong DS (2015) New algorithms for secure outsourcing of large-scale systems of linear equations. IEEE Transact Informat Forens Sec 10(1):69–78CrossRef
go back to reference Coron JS, Lepoint T, Tibouchi M (2013) Practical multilinear maps over the integers. In: Proceedings CRYPTO 2013, vol 8042, pp 476–493 Coron JS, Lepoint T, Tibouchi M (2013) Practical multilinear maps over the integers. In: Proceedings CRYPTO 2013, vol 8042, pp 476–493
go back to reference Coron JS, Lepoint T, Tibouchi M (2015) New multilinear maps over the integers. In: Proceedings CRYPTO 2015, vol 9215, pp 267–286 Coron JS, Lepoint T, Tibouchi M (2015) New multilinear maps over the integers. In: Proceedings CRYPTO 2015, vol 9215, pp 267–286
go back to reference Fu Z, Ren K, Shu J, Sun X, Huang F (2015a) Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEICE TRANSACT Commun E98–B(1):190–200CrossRef Fu Z, Ren K, Shu J, Sun X, Huang F (2015a) Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEICE TRANSACT Commun E98–B(1):190–200CrossRef
go back to reference Fu Z, Ren K, Shu J, Sun X, Huang F (2015b) Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Transactions on Parallel and Distributed Systems. doi:10.1109/TPDS.2015.2506573 Fu Z, Ren K, Shu J, Sun X, Huang F (2015b) Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Transactions on Parallel and Distributed Systems. doi:10.​1109/​TPDS.​2015.​2506573
go back to reference Garg S, Gentry C, Halevi S, Sahai A, Waters B (2013) Attribute-based encryption for circuits from multilinear maps. In: Canetti R, Garay JA (eds) Proceedings CRYPTO 2013, vol 8043, pp 479–499 Garg S, Gentry C, Halevi S, Sahai A, Waters B (2013) Attribute-based encryption for circuits from multilinear maps. In: Canetti R, Garay JA (eds) Proceedings CRYPTO 2013, vol 8043, pp 479–499
go back to reference Goldwasser S, Kalai Y, Popa RA, Vaikuntanathan V, Zeldovich N (2013) Reusable garbled circuits and succinct functional encryption. In: Proceedings ACM, STOC ’13, pp 555–564 Goldwasser S, Kalai Y, Popa RA, Vaikuntanathan V, Zeldovich N (2013) Reusable garbled circuits and succinct functional encryption. In: Proceedings ACM, STOC ’13, pp 555–564
go back to reference Goyal V, Pandey O, Sahai A, Waters B (2006) Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings ACM, CCS ’06, pp 89–98, doi:10.1145/1180405.1180418 Goyal V, Pandey O, Sahai A, Waters B (2006) Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings ACM, CCS ’06, pp 89–98, doi:10.​1145/​1180405.​1180418
go back to reference He D, Kumar N, Shen H, Lee JH (2016a) One-to-many authentication for access control in mobile pay-tv systems. Science China Information Sciences pp 1–14, doi:10.1007/s11432-015-5469-5 He D, Kumar N, Shen H, Lee JH (2016a) One-to-many authentication for access control in mobile pay-tv systems. Science China Information Sciences pp 1–14, doi:10.​1007/​s11432-015-5469-5
go back to reference Herranz J, Laguillaumie F, Ràfols C (2010) Constant size ciphertexts in threshold attribute-based encryption. In: Nguyen PQ, Pointcheval D (eds) Proc. PKC 2010, vol 6056, pp 19–34 Herranz J, Laguillaumie F, Ràfols C (2010) Constant size ciphertexts in threshold attribute-based encryption. In: Nguyen PQ, Pointcheval D (eds) Proc. PKC 2010, vol 6056, pp 19–34
go back to reference Huang X, Xiang Y, Bertino E, Zhou J, Xu L (2014) Robust multi-factor authentication for fragile communications. IEEE Transactions on Dependable and Secure Computing 11(6):568–581CrossRef Huang X, Xiang Y, Bertino E, Zhou J, Xu L (2014) Robust multi-factor authentication for fragile communications. IEEE Transactions on Dependable and Secure Computing 11(6):568–581CrossRef
go back to reference Huang X, Liu JK, Tang S, Xiang Y, Liang K, Xu L, Zhou J (2015) Cost-effective authentic and anonymous data sharing with forward security. IEEE Transactions on Computers 64(4):971–983MathSciNetCrossRefMATH Huang X, Liu JK, Tang S, Xiang Y, Liang K, Xu L, Zhou J (2015) Cost-effective authentic and anonymous data sharing with forward security. IEEE Transactions on Computers 64(4):971–983MathSciNetCrossRefMATH
go back to reference Jiang Q, Ma J, Lu X, Tian Y (2015a) An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks. Peer-to-Peer Networking and Applications 8(6):1070–1081CrossRef Jiang Q, Ma J, Lu X, Tian Y (2015a) An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks. Peer-to-Peer Networking and Applications 8(6):1070–1081CrossRef
go back to reference Jiang Q, Ma J, Li G, Li X (2015b) Improvement of robust smart-card-based password authentication scheme. Int J Commun Syst 28(2):383–393CrossRef Jiang Q, Ma J, Li G, Li X (2015b) Improvement of robust smart-card-based password authentication scheme. Int J Commun Syst 28(2):383–393CrossRef
go back to reference Jiang Q, Khan MK, Lu X, Ma J, He D (2016) A privacy preserving three-factor authentication protocol for e-health clouds. The Journal of Supercomputing pp 1–24, doi:10.1007/s11227-015-1610-x Jiang Q, Khan MK, Lu X, Ma J, He D (2016) A privacy preserving three-factor authentication protocol for e-health clouds. The Journal of Supercomputing pp 1–24, doi:10.​1007/​s11227-015-1610-x
go back to reference Lewko A, Waters B (2010) New techniques for dual system encryption and fully secure hibe with short ciphertexts. In: Proc. TCC 2010, vol 5978, pp 455–479 Lewko A, Waters B (2010) New techniques for dual system encryption and fully secure hibe with short ciphertexts. In: Proc. TCC 2010, vol 5978, pp 455–479
go back to reference Lewko A, Waters B (2011) Decentralizing attribute-based encryption. In: Proc. EUROCRYPT 2011, vol 6632, pp 568–588 Lewko A, Waters B (2011) Decentralizing attribute-based encryption. In: Proc. EUROCRYPT 2011, vol 6632, pp 568–588
go back to reference Lewko A, Okamoto T, Sahai A, Takashima K, Waters B (2010) Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption. In: Proc. EUROCRYPT 2010, vol 6110, pp 62–91 Lewko A, Okamoto T, Sahai A, Takashima K, Waters B (2010) Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption. In: Proc. EUROCRYPT 2010, vol 6110, pp 62–91
go back to reference Li J, Huang X, Li J, Chen X, Xiang Y (2014) Securely outsourcing attribute-based encryption with checkability. IEEE Transactions on Parallel and Distributed Systems 25(8):2201–2210CrossRef Li J, Huang X, Li J, Chen X, Xiang Y (2014) Securely outsourcing attribute-based encryption with checkability. IEEE Transactions on Parallel and Distributed Systems 25(8):2201–2210CrossRef
go back to reference Li K, Ma H (2014) Outsourcing decryption of multi-authority abe ciphertexts. International Journal of Network Security 16:252–260 Li K, Ma H (2014) Outsourcing decryption of multi-authority abe ciphertexts. International Journal of Network Security 16:252–260
go back to reference Lin H, Cao Z, Liang X, Shao J (2008) Secure threshold multi authority attribute based encryption without a central authority. In: Proc. INDOCRYPT 2008, vol 5365, pp 426–436 Lin H, Cao Z, Liang X, Shao J (2008) Secure threshold multi authority attribute based encryption without a central authority. In: Proc. INDOCRYPT 2008, vol 5365, pp 426–436
go back to reference Müller S, Katzenbeisser S, Eckert C (2008) Distributed attribute-based encryption. In: Proc. ICISC 2008, vol 5461, pp 20–36 Müller S, Katzenbeisser S, Eckert C (2008) Distributed attribute-based encryption. In: Proc. ICISC 2008, vol 5461, pp 20–36
go back to reference Parno B, Raykova M, Vaikuntanathan V (2012) How to delegate and verify in public: Verifiable computation from attribute-based encryption. In: Proc. TCC 2012, pp 422–439 Parno B, Raykova M, Vaikuntanathan V (2012) How to delegate and verify in public: Verifiable computation from attribute-based encryption. In: Proc. TCC 2012, pp 422–439
go back to reference Qin B, Deng RH, Liu S, Ma S (2015) Attribute-based encryption with efficient verifiable outsourced decryption. IEEE Transactions on Information Forensics and Security 10(7):1384–1393CrossRef Qin B, Deng RH, Liu S, Ma S (2015) Attribute-based encryption with efficient verifiable outsourced decryption. IEEE Transactions on Information Forensics and Security 10(7):1384–1393CrossRef
go back to reference Sahai A, Waters B (2005) Fuzzy identity-based encryption. In: Proc. EUROCRYPT 2005, vol 3494, pp 457–473 Sahai A, Waters B (2005) Fuzzy identity-based encryption. In: Proc. EUROCRYPT 2005, vol 3494, pp 457–473
go back to reference Shamir A (1984) Identity-based cryptosystems and signature schemes. In: Proc. CRYPTO 1984, vol 196, pp 47–53 Shamir A (1984) Identity-based cryptosystems and signature schemes. In: Proc. CRYPTO 1984, vol 196, pp 47–53
go back to reference Stinson DR (2005) Cryptography: Theory and Practice, Third Edition, Chapman and Hall/CRC, chap Secret sharing schemes, pp 481–514 Stinson DR (2005) Cryptography: Theory and Practice, Third Edition, Chapman and Hall/CRC, chap Secret sharing schemes, pp 481–514
go back to reference Waters B (2009) Dual system encryption: Realizing fully secure ibe and hibe under simple assumptions. In: Proc. CRYPTO 2009, vol 5677, pp 619–636 Waters B (2009) Dual system encryption: Realizing fully secure ibe and hibe under simple assumptions. In: Proc. CRYPTO 2009, vol 5677, pp 619–636
go back to reference Xu J, Wen Q, Li W, Jin Z (2016) Circuit ciphertext-policy attribute-based hybrid encryption with verifiable delegation in cloud computing. IEEE Transactions on Parallel and Distributed Systems 27(1):119–129CrossRef Xu J, Wen Q, Li W, Jin Z (2016) Circuit ciphertext-policy attribute-based hybrid encryption with verifiable delegation in cloud computing. IEEE Transactions on Parallel and Distributed Systems 27(1):119–129CrossRef
Metadata
Title
Succinct multi-authority attribute-based access control for circuits with authenticated outsourcing
Authors
Jie Xu
Qiaoyan Wen
Wenmin Li
Jian Shen
Debiao He
Publication date
30-06-2016
Publisher
Springer Berlin Heidelberg
Published in
Soft Computing / Issue 18/2017
Print ISSN: 1432-7643
Electronic ISSN: 1433-7479
DOI
https://doi.org/10.1007/s00500-016-2244-5

Other articles of this Issue 18/2017

Soft Computing 18/2017 Go to the issue

Premium Partner