Abstract

The revelations of Snowden show that hardware and software of devices may corrupt users' machine to compromise the security in various ways. To address this concern, Mironov and Stephen-Davidowitz introduce the Cryptographic Reverse Firewall (CRF) concept that is able to resist the ex-filtration of secret information for some compromised machine (Eurocrypt 2015). There are some applications of CRF deployed in many cryptosystems, but less studied and deployed in Attribute-Based Encryption (ABE) field, which attracts a wide range of attention and is employed in real-world scenarios (i.e., data sharing in cloud). In this work, we focus how to give a CRF security protection for a multi-authority ABE scheme and hence propose a multi-authority key-policy ABE scheme with CRF (acronym, MA-KP-ABE-CRF), which supports attribute distribution and non-monotonic access structure. To achieve this, beginning with revisiting a MA-KP-ABE with non-trivial combining non-monotonic formula, we then give the randomness of ciphertexts and secret keys with reverse firewall and give formal security analysis. Finally, we give a simulation on our MA-KP-ABE-CRF system based on Charm library whose the experimental results demonstrate practical efficiency.

Highlights

  • The revelations of Snowden show that hardware and software of devices may compromise the users’ information security in different ways

  • Mironov and Stephens-Davidowitz [1] introduce the cryptographic reverse firewall (CRF) concept that is able to resist the ex-filtration of secret information for some compromised machines by modifying the messages sent and received

  • OUR CONTRIBUTION Aimed at overcoming the problems, we propose Multi-Authority KP-Attribute-Based Encryption (ABE) based on non-monotonic access structure with Cryptographic Reverse Firewalls (MA-key policy ABE (KP-ABE)-CRF), which can solve the access problem of non-monotonic structure in multi-authority, and maintains the security and resists the exfiltration of secret messages

Read more

Summary

INTRODUCTION

The revelations of Snowden show that hardware and software of devices may compromise the users’ information security in different ways. In the face of an adversary who is likely to arbitrarily tamper with the victim’s computer, it is a highly concerned problem that how to enable the encryption protocol to be still secure under this circumstance To address this concern, Mironov and Stephens-Davidowitz [1] introduce the cryptographic reverse firewall (CRF) concept that is able to resist the ex-filtration of secret information for some compromised machines by modifying the messages sent and received. Mironov and StephensDavidowitz [1] introduced the reverse firewall (RF) notion Such a machine is located between the user’s computer and the external world, and when the user proceeds the encryption protocol, it may modify the sent and received messages. Ma et al [11] proposed an online/offline ABE scheme with CRF, which motives this work since none of the previous schemes applied reverse firewall to the multiauthority KP-ABE scheme based on a non-monotonic access structure

PRELIMINARY
BILINEAR GROUPS Definition 1
LINEAR SECRET-SHARING SCHEMES Definition 3
SECURITY MODEL
BASIC CONSTRUCTION
CONSTRUCTION OF MA-KP-ABE-CRF
SECURITY ANALYSIS Theorem 1
PERFORMANCE EVALUATIONS
CONCLUSION
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call