Paper 2013/247

Leakage-resilient Attribute-based Encryptions with Fast Decryption: Model, Analysis and Construction

Mingwu Zhang, Wei Shi, Chunzhi Wang, Zhenhua Chen, and Yi Mu

Abstract

raditionally, in attribute-based encryption (ABE), an access structure is constructed from a linear secret sharing scheme (LSSS), a boolean formula or an access tree. In this work, we encode the access structure as their minimal sets, which is equivalent to the existence of a smallest monotonic span program for the characteristic function of the same access structure. We present two leakage-resilient attribute-based encryption schemes, ciphertext-policy ABE (LR-CP-ABE) and key-policy ABE (LR-KP-ABE), that can tolerate private key and master key to be partially leaked. By using our encoding mechanism, we obtain short ciphertext in LR-CP-ABE and short key in LR-KP-ABE. Also, our schemes have higher decryption efficiency in that the decryption cost is independent to the depth of access structures. Meanwhile, our proposed schemes provide the tolerance of both master key leakage and continual leakage in the sense that there are many master keys for universal set $\Sigma$ and many private keys per attribute set $\S$. We explicitly employ a refresh algorithm to update a (master) key while the leakage information will beyond the allowable leakage bound. The schemes are proven to be adaptively leakage-resilient secure in the standard model under the static assumptions in composite order bilinear groups.

Metadata
Available format(s)
PDF
Category
Public-key cryptography
Publication info
Published elsewhere. The external abstract is in ISPEC2013. This is the full version.
Contact author(s)
csmwzhang @ gmail com
History
2013-05-03: received
Short URL
https://ia.cr/2013/247
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2013/247,
      author = {Mingwu Zhang and Wei Shi and Chunzhi Wang and Zhenhua Chen and Yi Mu},
      title = {Leakage-resilient Attribute-based Encryptions with Fast Decryption: Model, Analysis and Construction},
      howpublished = {Cryptology ePrint Archive, Paper 2013/247},
      year = {2013},
      note = {\url{https://eprint.iacr.org/2013/247}},
      url = {https://eprint.iacr.org/2013/247}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.