Skip to main content

Leakage-Resilient Attribute-Based Encryption with Attribute-Hiding

  • Conference paper
  • First Online:
Information Security and Cryptology – ICISC 2023 (ICISC 2023)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 14562))

Included in the following conference series:

  • 51 Accesses

Abstract

In this work, we present two generic frameworks for leakage-resilient attribute-based encryption (ABE), which is an improved version of ABE that can be proven secure even when part of the secret key is leaked. Our frameworks rely on the standard assumption (k-Lin) over prime-order groups. The first framework is designed for leakage-resilient ABE with attribute-hiding in the bounded leakage model. Prior to this work, no one had yet derived a generic leakage-resilient ABE framework with attribute-hiding. The second framework provides a generic method to construct leakage-resilient ABE in the continual leakage model. It is compatible with Zhang et al.’s work [DCC 2018] but more generic. Concretely, Zhang et al.’s framework cannot act on some specific ABE schemes while ours manages to do that. Technically, our frameworks are built on the predicate encoding of Chen et al.’s [EUROCRYPT 2015] combined with a method of adding redundancy. At last, several instantiations are derived from our frameworks, which cover the cases of zero inner-product predicate and non-zero inner-product predicate.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 49.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 64.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Strictly speaking, the Eq. (1) is built on composite-order groups. A general approach to transforming schemes over composite-order groups into ones over prime-order groups has been proposed in [5]. Thus, in this section, we decide to abuse constructions over composite-order groups as ones over prime-order groups for simplicity.

References

  1. Agrawal, D., Archambeault, B., Rao, J.R., Rohatgi, P.: The EM side-channel(s). In: Kaliski, B.S., Kocs, C.K., Paar, C. (eds.) Cryptographic Hardware and Embedded Systems - CHES 2002. Lecture Notes in Computer Science, vol. 2523, pp. 29–45. Springer, Berlin (2002). https://doi.org/10.1007/3-540-36400-5_4

    Chapter  Google Scholar 

  2. Akavia, A., Goldwasser, S., Vaikuntanathan, V.: Simultaneous hardcore bits and cryptography against memory attacks. In: Reingold, O. (ed.) Theory of Cryptography. Lecture Notes in Computer Science, vol. 5444, pp. 474–495. Springer, Berlin (2009). https://doi.org/10.1007/978-3-642-00457-5_28

    Chapter  Google Scholar 

  3. Attrapadung, N.: Dual system encryption via doubly selective security: framework, fully secure functional encryption for regular languages, and more. In: Nguyen, P.Q., Oswald, E. (eds.) Advances in Cryptology - EUROCRYPT 2014. Lecture Notes in Computer Science, vol. 8441, pp. 557–577. Springer, Berlin (2014). https://doi.org/10.1007/978-3-642-55220-5_31

    Chapter  Google Scholar 

  4. Brakerski, Z., Kalai, Y.T., Katz, J., Vaikuntanathan, V.: Overcoming the hole in the bucket: public-key cryptography resilient to continual memory leakage. In: 2010 IEEE 51st Annual Symposium on Foundations of Computer Science, pp. 501–510. IEEE (2010)

    Google Scholar 

  5. Chen, J., Gay, R., Wee, H.: Improved dual system ABE in prime-order groups via predicate encodings. In: Oswald, E., Fischlin, M. (eds.) Advances in Cryptology - EUROCRYPT 2015. Lecture Notes in Computer Science(), vol. 9057, pp. 595–624. Springer, Berlin (2015). https://doi.org/10.1007/978-3-662-46803-6_20

    Chapter  Google Scholar 

  6. Crescenzo, G.D., Lipton, R., Walfish, S.: Perfectly secure password protocols in the bounded retrieval model. In: Halevi, S., Rabin, T. (eds.) Theory of Cryptography. Lecture Notes in Computer Science, vol. 3876, pp. 225–244. Springer, Berlin (2006). https://doi.org/10.1007/11681878_12

    Chapter  Google Scholar 

  7. Dodis, Y., Kalai, Y.T., Lovett, S.: On cryptography with auxiliary input. In: Proceedings of the Forty-First Annual ACM Symposium on Theory of Computing, pp. 621–630 (2009)

    Google Scholar 

  8. Dziembowski, S., Pietrzak, K.: Leakage-resilient cryptography. In: 2008 49th Annual IEEE Symposium on Foundations of Computer Science, pp. 293–302. IEEE (2008)

    Google Scholar 

  9. Halderman, J.A., et al.: Lest we remember: cold-boot attacks on encryption keys. Commun. ACM 52(5), 91–98 (2009)

    Article  Google Scholar 

  10. Kalai, Y.T., Reyzin, L.: A survey of leakage-resilient cryptography. IACR Cryptol. ePrint Arch. 2019, 302 (2019)

    Google Scholar 

  11. Kim, I., Hwang, S.O., Park, J.H., Park, C.: An efficient predicate encryption with constant pairing computations and minimum costs. IEEE Trans. Comput. 65(10), 2947–2958 (2016)

    Article  MathSciNet  Google Scholar 

  12. Kocher, P., et al.: Spectre attacks: exploiting speculative execution. In: 2019 IEEE Symposium on Security and Privacy (SP), pp. 1–19. IEEE (2019)

    Google Scholar 

  13. Lewko, A., Okamoto, T., Sahai, A., Takashima, K., Waters, B.: Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption. In: Gilbert, H. (ed.) Advances in Cryptology - EUROCRYPT 2010. Lecture Notes in Computer Science, vol. 6110, pp. 62–91. Springer, Berlin (2010). https://doi.org/10.1007/978-3-642-13190-5_4

    Chapter  Google Scholar 

  14. Lewko, A., Rouselakis, Y., Waters, B.: Achieving leakage resilience through dual system encryption. In: Ishai, Y. (ed.) Theory of Cryptography. Lecture Notes in Computer Science, vol. 6597, pp. 70–88. Springer, Berlin (2011). https://doi.org/10.1007/978-3-642-19571-6_6

    Chapter  Google Scholar 

  15. Li, J., Yu, Q., Zhang, Y.: Hierarchical attribute based encryption with continuous leakage-resilience. Inf. Sci. 484, 113–134 (2019)

    Article  Google Scholar 

  16. Li, J., Yu, Q., Zhang, Y., Shen, J.: Key-policy attribute-based encryption against continual auxiliary input leakage. Inf. Sci. 470, 175–188 (2019)

    Article  MathSciNet  Google Scholar 

  17. Nishimaki, R., Yamakawa, T.: Leakage-resilient identity-based encryption in bounded retrieval model with nearly optimal leakage-ratio. In: Lin, D., Sako, K. (eds.) Public-Key Cryptography - PKC 2019. Lecture Notes in Computer Science(), vol. 11442, pp. 466–495. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-17253-4_16

    Chapter  Google Scholar 

  18. Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Cramer, R. (ed.) Advances in Cryptology – EUROCRYPT 2005. Lecture Notes in Computer Science, vol. 3494, pp. 457–473. Springer, Berlin (2005). https://doi.org/10.1007/11426639_27

    Chapter  Google Scholar 

  19. Wee, H.: Dual system encryption via predicate encodings. In: Lindell, Y. (ed.) Theory of Cryptography. Lecture Notes in Computer Science, vol. 8349, pp. 616–637. Springer, Berlin (2014). https://doi.org/10.1007/978-3-642-54242-8_26

    Chapter  Google Scholar 

  20. Yu, Z., Au, M.H., Xu, Q., Yang, R., Han, J.: Leakage-resilient functional encryption via pair encodings. In: Liu, J., Steinfeld, R. (eds.) Information Security and Privacy. Lecture Notes in Computer Science(), vol. 9722, pp. 443–460. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-40253-6_27

    Chapter  Google Scholar 

  21. Yuen, T.H., Chow, S.S., Zhang, Y., Yiu, S.M.: Identity-based encryption resilient to continual auxiliary leakage. In: Pointcheval, D., Johansson, T. (eds.) Advances in Cryptology - EUROCRYPT 2012. Lecture Notes in Computer Science, vol. 7237, pp. 117–134. Springer, Berlin (2012). https://doi.org/10.1007/978-3-642-29011-4_9

    Chapter  Google Scholar 

  22. Zhang, J., Chen, J., Gong, J., Ge, A., Ma, C.: Leakage-resilient attribute based encryption in prime-order groups via predicate encodings. Des. Codes Crypt. 86(6), 1339–1366 (2018)

    Article  MathSciNet  Google Scholar 

  23. Zhang, L., Zhang, J., Mu, Y.: Novel leakage-resilient attribute-based encryption from hash proof system. Comput. J. 60(4), 541–554 (2017)

    Google Scholar 

  24. Zhang, M., Mu, Y.: Token-leakage tolerant and vector obfuscated IPE and application in privacy-preserving two-party point/polynomial evaluations. Comput. J. 59(4), 493–507 (2016)

    Article  MathSciNet  Google Scholar 

Download references

Acknowledgments

This work was supported by National Natural Science Foundation of China (61972156, 62372180), NSFC-ISF Joint Scientific Research Program (61961146004), Innovation Program of ShanghaiMunicipal Education Commission (2021-01-07-00-08-E00101) and the “Digital Silk Road” Shanghai International Joint Lab of Trustworthy Intelligent Software (22510750100), University natural science research project in Jiangsu Province (22KJB520035), Open project of “Jiangsu Key Laboratory for Elevator Intelligent Safety” (JSKLESS202104) and Special teaching project of Jiangsu Computer Society (JSCS2022049).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jie Chen .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Zhang, Y., Ling, Y., Chen, J., Wang, L. (2024). Leakage-Resilient Attribute-Based Encryption with Attribute-Hiding. In: Seo, H., Kim, S. (eds) Information Security and Cryptology – ICISC 2023. ICISC 2023. Lecture Notes in Computer Science, vol 14562. Springer, Singapore. https://doi.org/10.1007/978-981-97-1238-0_7

Download citation

  • DOI: https://doi.org/10.1007/978-981-97-1238-0_7

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-97-1237-3

  • Online ISBN: 978-981-97-1238-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics