Paper 2008/309

Revocation Systems with Very Small Private Keys

Allison Lewko, Amit Sahai, and Brent Waters

Abstract

In this work, we design a method for creating public key broadcast encryption systems. Our main technical innovation is based on a new ``two equation'' technique for revoking users. This technique results in two key contributions: First, our new scheme has ciphertext size overhead $O(r)$, where $r$ is the number of revoked users, and the size of public and private keys is only a \emph{constant} number of group elements from an elliptic-curve group of prime order. In addition, the public key allows us to encrypt to an unbounded number of users. Our system is the first to achieve such parameters. We give two versions of our scheme: a simpler version which we prove to be selectively secure in the standard model under a new, but non-interactive assumption, and another version that employs the new dual system encryption technique of Waters to obtain adaptive security under the d-BDH and decisional Linear assumptions. Second, we show that our techniques can be used to realize Attribute-Based Encryption (ABE) systems with non-monotonic access formulas, where our key storage is significantly more efficient than previous solutions. This result is also proven selectively secure in the standard model under our new non-interactive assumption. We believe that our new technique will be of use elsewhere as well.

Note: Newer version

Metadata
Available format(s)
PDF
Publication info
Published elsewhere. Unknown where it was published
Contact author(s)
alewko @ cs utexas edu
History
2009-11-18: last of 2 revisions
2008-07-14: received
See all versions
Short URL
https://ia.cr/2008/309
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2008/309,
      author = {Allison Lewko and Amit Sahai and Brent Waters},
      title = {Revocation Systems with Very Small Private Keys},
      howpublished = {Cryptology {ePrint} Archive, Paper 2008/309},
      year = {2008},
      url = {https://eprint.iacr.org/2008/309}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.