skip to main content
10.1145/2517881.2517883acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

Universally composable adaptive oblivious transfer (with access control) from standard assumptions

Published:08 November 2013Publication History

ABSTRACT

In this paper, we provide the first scheme that realises an attribute-based access control system for static resources that offers maximal privacy and is secure in the universal composability framework (UC). More precisely, we offer a protocol for adaptive oblivious transfer, where the sender can enforce an attribute-based access control policy for each record and nevertheless learns neither which record a user retrieves nor which attributes a user has. As additional results we provide a new structure-preserving signature scheme from the SXDH assumption and a new universally composable adaptive oblivious transfer protocol that is secure under two DDH-like assumptions and is the most efficient one secure under ``non $q$-type'' assumptions. We believe the new signature scheme to be of independent interest as a building block that is compatible with Groth-Sahai non-interactive zero-knowledge proofs.

References

  1. M.Gerbush, A.Lewko, A.O'Neill, B. Waters. Dual Form Signatures: An Approach for ProvingSecurity from Static Assumptions. In ASIACRYPT 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. M.Abe, M.Chase, B.David, M.Kohlweiss, R.Nishimaki, and M.Ohkubo. Constant-size structure-preserving signatures: Generic constructions and simple assumptions. In ASIACRYPT 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. M.Belenkiy, M.Chase, M.Kohlweiss, and A.Lysyanskaya. P-signatures and noninteractive anonymous credentials. In TCC 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. D.Boneh, X.Boyen, and H.Shacham. Short group signatures. In CRYPTO 2004.Google ScholarGoogle ScholarCross RefCross Ref
  5. J.Camenisch, M.Dubovitskaya, and G.Neven. Oblivious transfer with access control. In ACM CCS 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. J.Camenisch, S.Krenn, and V.Shoup. A framework for practical universally composable zero-knowledge protocols. In ASIACRYPT 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. J.Camenisch and A.Lysyanskaya. An efficient system for non-transferable anonymous credentials with optional anonymity revocation. In EUROCRYPT 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. J.Camenisch, G.Neven, and A.Shelat. Simulatable adaptive oblivious transfer. In EUROCRYPT 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. R.Canetti. A unified framework for analyzing security of protocols. In Electronic Colloquium on Computational Complexity (ECCC), 8(16), 2001.Google ScholarGoogle Scholar
  10. R.Canetti. Universally composable security: A new paradigm for cryptographic protocols. In 42nd FOCS, pages 136--145, 2001. IEEE Computer Society Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. R.Canetti. Universally composable security: A new paradigm for cryptograpic protocols. Cryptology ePrint Archive, Report 2000/067, 2005.Google ScholarGoogle Scholar
  12. R.Canetti and M.Fischlin. Universally composable commitments. In CRYPTO 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. R.Canetti, E.Kushilevitz, and Y.Lindell. On the limitations of universally composable two-party computation without set-up assumptions. In J. Cryptology, 19(2):135--167, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. R.Canetti, Y.Lindell, R.Ostrovsky, and A.Sahai. Universally composable two-party and multi-party secure computation. In 34th ACM STOC 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. M.Chase and M.Kohlweiss. A domain transformation for structure-preserving signatures on group elements, 2011. http://eprint.iacr.org/2011/342.Google ScholarGoogle Scholar
  16. S. E.Coull, M.Green, and S.Hohenberger. Controlling access to an oblivious database using stateful anonymous credentials. In PKC 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. I.Damgård, J. B.Nielsen, and C.Orlandi. Essentially optimal universally composable oblivious transfer. In ICISC 2008.Google ScholarGoogle Scholar
  18. J. A.Garay, P. MacKenzie, and K. Yang. Efficient and universally composable committed oblivious transfer and applications. In TCC 2004.Google ScholarGoogle Scholar
  19. Juan A.Garay, Philip D.MacKenzie, and K.Yang. Strengthening zero-knowledge protocols using signatures. In EUROCRYPT 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. M.Green and S.Hohenberger. Universally composable adaptive oblivious transfer. In ASIACRYPT 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. M.Green and S.Hohenberger. Practical adaptive oblivious transfer from a simple assumption. In TCC 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. J.Groth and A.Sahai. Efficient non-interactive proof systems for bilinear groups. In EUROCRYPT 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. C.Peikert, V.Vaikuntanathan, and B.Waters. A framework for efficient and composable oblivious transfer. In CRYPTO 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. M. O. Rabin. How to exchange secrets by oblivious transfer. Technical report, Harvard University, 1981. TR-81.Google ScholarGoogle Scholar
  25. A.Rial, M.Kohlweiss, and B.Preneel. Universally composable adaptive priced oblivious transfer. In Pairing 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. B.Waters. Efficient identity-based encryption without random oracles. In EUROCRYPT 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. B.Zhang. Simulatable adaptive oblivious transfer with statistical receiver's privacy. In ProvSec. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. A.B.Lewko. Tools for simulating features of composite order bilinear groups in the prime order setting. In EUROCRYPT 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. T.Okamoto and K.Takashima. Hierarchical predicate encryption for inner-products. In ASIACRYPT 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. J.Chen, H.Huang, H.W.Lim, S.Ling, H.Wang and H.Wee Compact IBE and Signatures via Asymmetric Pairings In PAIRING 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. J.Camenisch, M.Dubovitskaya, G.Neven, and G.M.Zaverucha. Oblivious transfer with hidden access control policies. In PKC 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. M.Abe, G.Fuchsbauer, J.Groth, K.Haralambiev, and M.Ohkubo. Structure-preserving signatures and commitments to group elements. In CRYPTO 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. Ivan Damgård. Efficient concurrent zero-knowledge in the auxiliary string model. In EUROCRYPT 2000.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Universally composable adaptive oblivious transfer (with access control) from standard assumptions

              Recommendations

              Comments

              Login options

              Check if you have access through your login credentials or your institution to get full access on this article.

              Sign in
              • Published in

                cover image ACM Conferences
                DIM '13: Proceedings of the 2013 ACM workshop on Digital identity management
                November 2013
                114 pages
                ISBN:9781450324939
                DOI:10.1145/2517881
                • General Chairs:
                • Thomas Groß,
                • Marit Hansen

                Copyright © 2013 ACM

                Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                Publisher

                Association for Computing Machinery

                New York, NY, United States

                Publication History

                • Published: 8 November 2013

                Permissions

                Request permissions about this article.

                Request Permissions

                Check for updates

                Qualifiers

                • research-article

                Acceptance Rates

                DIM '13 Paper Acceptance Rate8of18submissions,44%Overall Acceptance Rate16of34submissions,47%

                Upcoming Conference

                CCS '24
                ACM SIGSAC Conference on Computer and Communications Security
                October 14 - 18, 2024
                Salt Lake City , UT , USA

              PDF Format

              View or Download as a PDF file.

              PDF

              eReader

              View online with eReader.

              eReader