Visible to the public Multi-Authority Non-Monotonic KP-ABE With Cryptographic Reverse Firewall

TitleMulti-Authority Non-Monotonic KP-ABE With Cryptographic Reverse Firewall
Publication TypeJournal Article
Year of Publication2019
AuthorsHong, Bo, Chen, Jie, Zhang, Kai, Qian, Haifeng
JournalIEEE Access
Volume7
Pagination159002–159012
ISSN2169-3536
KeywordsAccess Control, attribute-based encryption, attribute-based encryption field, Charm library, compromised machine, CRF security protection, cryptographic reverse firewall, cryptographic reverse firewall concept, cryptography, Encryption, ex-filtration, firewalls, Firewalls (computing), formal security analysis, Key Policy Attribute Based Encryption (KP-ABE), KP-ABE, MA-KP-ABE-CRF system, Multi-authority, multiauthority ABE scheme, multiauthority key-policy ABE scheme, multiauthority nonmonotonic KP-ABE scheme, non-monotonic access structure, nonmonotonic access structure, nontrivial combining nonmonotonic formula, Protocols, pubcrawl, Resiliency, Resists, Scalability, secret keys, Stephen-Davidowitz
AbstractThe revelations of Snowden show that hardware and software of devices may corrupt users' machine to compromise the security in various ways. To address this concern, Mironov and Stephen-Davidowitz introduce the Cryptographic Reverse Firewall (CRF) concept that is able to resist the ex-filtration of secret information for some compromised machine (Eurocrypt 2015). There are some applications of CRF deployed in many cryptosystems, but less studied and deployed in Attribute-Based Encryption (ABE) field, which attracts a wide range of attention and is employed in real-world scenarios (i.e., data sharing in cloud). In this work, we focus how to give a CRF security protection for a multi-authority ABE scheme and hence propose a multi-authority key-policy ABE scheme with CRF (acronym, MA-KP-ABE-CRF), which supports attribute distribution and non-monotonic access structure. To achieve this, beginning with revisiting a MA-KP-ABE with non-trivial combining non-monotonic formula, we then give the randomness of ciphertexts and secret keys with reverse firewall and give formal security analysis. Finally, we give a simulation on our MA-KP-ABE-CRF system based on Charm library whose the experimental results demonstrate practical efficiency.
DOI10.1109/ACCESS.2019.2950394
Citation Keyhong_multi-authority_2019