Abstract
In this work, we present two generic frameworks for leakage-resilient attribute-based encryption (ABE), which is an improved version of ABE that can be proven secure even when part of the secret key is leaked. Our frameworks rely on the standard assumption (k-Lin) over prime-order groups. The first framework is designed for leakage-resilient ABE with attribute-hiding in the bounded leakage model. Prior to this work, no one had yet derived a generic leakage-resilient ABE framework with attribute-hiding. The second framework provides a generic method to construct leakage-resilient ABE in the continual leakage model. It is compatible with Zhang et al.’s work [DCC 2018] but more generic. Concretely, Zhang et al.’s framework cannot act on some specific ABE schemes while ours manages to do that. Technically, our frameworks are built on the predicate encoding of Chen et al.’s [EUROCRYPT 2015] combined with a method of adding redundancy. At last, several instantiations are derived from our frameworks, which cover the cases of zero inner-product predicate and non-zero inner-product predicate.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Strictly speaking, the Eq. (1) is built on composite-order groups. A general approach to transforming schemes over composite-order groups into ones over prime-order groups has been proposed in [5]. Thus, in this section, we decide to abuse constructions over composite-order groups as ones over prime-order groups for simplicity.
References
Agrawal, D., Archambeault, B., Rao, J.R., Rohatgi, P.: The EM side-channel(s). In: Kaliski, B.S., Kocs, C.K., Paar, C. (eds.) Cryptographic Hardware and Embedded Systems - CHES 2002. Lecture Notes in Computer Science, vol. 2523, pp. 29–45. Springer, Berlin (2002). https://doi.org/10.1007/3-540-36400-5_4
Akavia, A., Goldwasser, S., Vaikuntanathan, V.: Simultaneous hardcore bits and cryptography against memory attacks. In: Reingold, O. (ed.) Theory of Cryptography. Lecture Notes in Computer Science, vol. 5444, pp. 474–495. Springer, Berlin (2009). https://doi.org/10.1007/978-3-642-00457-5_28
Attrapadung, N.: Dual system encryption via doubly selective security: framework, fully secure functional encryption for regular languages, and more. In: Nguyen, P.Q., Oswald, E. (eds.) Advances in Cryptology - EUROCRYPT 2014. Lecture Notes in Computer Science, vol. 8441, pp. 557–577. Springer, Berlin (2014). https://doi.org/10.1007/978-3-642-55220-5_31
Brakerski, Z., Kalai, Y.T., Katz, J., Vaikuntanathan, V.: Overcoming the hole in the bucket: public-key cryptography resilient to continual memory leakage. In: 2010 IEEE 51st Annual Symposium on Foundations of Computer Science, pp. 501–510. IEEE (2010)
Chen, J., Gay, R., Wee, H.: Improved dual system ABE in prime-order groups via predicate encodings. In: Oswald, E., Fischlin, M. (eds.) Advances in Cryptology - EUROCRYPT 2015. Lecture Notes in Computer Science(), vol. 9057, pp. 595–624. Springer, Berlin (2015). https://doi.org/10.1007/978-3-662-46803-6_20
Crescenzo, G.D., Lipton, R., Walfish, S.: Perfectly secure password protocols in the bounded retrieval model. In: Halevi, S., Rabin, T. (eds.) Theory of Cryptography. Lecture Notes in Computer Science, vol. 3876, pp. 225–244. Springer, Berlin (2006). https://doi.org/10.1007/11681878_12
Dodis, Y., Kalai, Y.T., Lovett, S.: On cryptography with auxiliary input. In: Proceedings of the Forty-First Annual ACM Symposium on Theory of Computing, pp. 621–630 (2009)
Dziembowski, S., Pietrzak, K.: Leakage-resilient cryptography. In: 2008 49th Annual IEEE Symposium on Foundations of Computer Science, pp. 293–302. IEEE (2008)
Halderman, J.A., et al.: Lest we remember: cold-boot attacks on encryption keys. Commun. ACM 52(5), 91–98 (2009)
Kalai, Y.T., Reyzin, L.: A survey of leakage-resilient cryptography. IACR Cryptol. ePrint Arch. 2019, 302 (2019)
Kim, I., Hwang, S.O., Park, J.H., Park, C.: An efficient predicate encryption with constant pairing computations and minimum costs. IEEE Trans. Comput. 65(10), 2947–2958 (2016)
Kocher, P., et al.: Spectre attacks: exploiting speculative execution. In: 2019 IEEE Symposium on Security and Privacy (SP), pp. 1–19. IEEE (2019)
Lewko, A., Okamoto, T., Sahai, A., Takashima, K., Waters, B.: Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption. In: Gilbert, H. (ed.) Advances in Cryptology - EUROCRYPT 2010. Lecture Notes in Computer Science, vol. 6110, pp. 62–91. Springer, Berlin (2010). https://doi.org/10.1007/978-3-642-13190-5_4
Lewko, A., Rouselakis, Y., Waters, B.: Achieving leakage resilience through dual system encryption. In: Ishai, Y. (ed.) Theory of Cryptography. Lecture Notes in Computer Science, vol. 6597, pp. 70–88. Springer, Berlin (2011). https://doi.org/10.1007/978-3-642-19571-6_6
Li, J., Yu, Q., Zhang, Y.: Hierarchical attribute based encryption with continuous leakage-resilience. Inf. Sci. 484, 113–134 (2019)
Li, J., Yu, Q., Zhang, Y., Shen, J.: Key-policy attribute-based encryption against continual auxiliary input leakage. Inf. Sci. 470, 175–188 (2019)
Nishimaki, R., Yamakawa, T.: Leakage-resilient identity-based encryption in bounded retrieval model with nearly optimal leakage-ratio. In: Lin, D., Sako, K. (eds.) Public-Key Cryptography - PKC 2019. Lecture Notes in Computer Science(), vol. 11442, pp. 466–495. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-17253-4_16
Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Cramer, R. (ed.) Advances in Cryptology – EUROCRYPT 2005. Lecture Notes in Computer Science, vol. 3494, pp. 457–473. Springer, Berlin (2005). https://doi.org/10.1007/11426639_27
Wee, H.: Dual system encryption via predicate encodings. In: Lindell, Y. (ed.) Theory of Cryptography. Lecture Notes in Computer Science, vol. 8349, pp. 616–637. Springer, Berlin (2014). https://doi.org/10.1007/978-3-642-54242-8_26
Yu, Z., Au, M.H., Xu, Q., Yang, R., Han, J.: Leakage-resilient functional encryption via pair encodings. In: Liu, J., Steinfeld, R. (eds.) Information Security and Privacy. Lecture Notes in Computer Science(), vol. 9722, pp. 443–460. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-40253-6_27
Yuen, T.H., Chow, S.S., Zhang, Y., Yiu, S.M.: Identity-based encryption resilient to continual auxiliary leakage. In: Pointcheval, D., Johansson, T. (eds.) Advances in Cryptology - EUROCRYPT 2012. Lecture Notes in Computer Science, vol. 7237, pp. 117–134. Springer, Berlin (2012). https://doi.org/10.1007/978-3-642-29011-4_9
Zhang, J., Chen, J., Gong, J., Ge, A., Ma, C.: Leakage-resilient attribute based encryption in prime-order groups via predicate encodings. Des. Codes Crypt. 86(6), 1339–1366 (2018)
Zhang, L., Zhang, J., Mu, Y.: Novel leakage-resilient attribute-based encryption from hash proof system. Comput. J. 60(4), 541–554 (2017)
Zhang, M., Mu, Y.: Token-leakage tolerant and vector obfuscated IPE and application in privacy-preserving two-party point/polynomial evaluations. Comput. J. 59(4), 493–507 (2016)
Acknowledgments
This work was supported by National Natural Science Foundation of China (61972156, 62372180), NSFC-ISF Joint Scientific Research Program (61961146004), Innovation Program of ShanghaiMunicipal Education Commission (2021-01-07-00-08-E00101) and the “Digital Silk Road” Shanghai International Joint Lab of Trustworthy Intelligent Software (22510750100), University natural science research project in Jiangsu Province (22KJB520035), Open project of “Jiangsu Key Laboratory for Elevator Intelligent Safety” (JSKLESS202104) and Special teaching project of Jiangsu Computer Society (JSCS2022049).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Zhang, Y., Ling, Y., Chen, J., Wang, L. (2024). Leakage-Resilient Attribute-Based Encryption with Attribute-Hiding. In: Seo, H., Kim, S. (eds) Information Security and Cryptology – ICISC 2023. ICISC 2023. Lecture Notes in Computer Science, vol 14562. Springer, Singapore. https://doi.org/10.1007/978-981-97-1238-0_7
Download citation
DOI: https://doi.org/10.1007/978-981-97-1238-0_7
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-97-1237-3
Online ISBN: 978-981-97-1238-0
eBook Packages: Computer ScienceComputer Science (R0)