Title: Attribute-Based Encryption
1Attribute-Based Encryption
Brent Waters SRI International
Joint work with Vipul Goyal, Omkant Pandey, and
Amit Sahai
http//www.csl.sri.com/users/bwaters/
2IBE BF01
- IBE BF01 Public key encryption scheme where
public key is an arbitrary string (ID). - Examples users e-mail address
Is regular PKI good enough?
Alice does not access a PKI
CA/PKG
master-key
Authority is offline
3Generalizing the Framework
CA/PKG
master-key
Authority is offline
4Attributed-Based Encryption(ABE) SW05
- Encrypt Data with descriptive Attributes
- Users Private Keys reflect Decryption Policies
5An Encrypted Filesystem
- Encrypted Files on Untrusted Server
- Label files with attributes
6An Encrypted Filesystem
Authority
OR
AND
bsmith
CS
admissions
7This Talk
- Threshold ABE Biometrics
- More Advanced ABE
- Other Systems
8A Warmup Threshold ABESW05
- Data labeled with attributes
- Keys of form At least k attributes
- Application IBE with Biometric Identities
9Biometric Identities
- Iris Scan
- Voiceprint
- Fingerprint
10Biometric Identities
- Stay with human
- Are unique
- No registration
- Certification is natural
11Biometric Identities
Deviations Environment Difference in
sensors Small change in trait
Cant use previous IBE solutions!
12Error-tolerance in Identity
- k attributes must match
- Example 5 attributes
Public Key
13Error-tolerance in Identity
- k attributes must match
- Example 5 attributes
Public Key
Private Key
CA/PKG
master-key
14Secret Sharing
- Split message M into shares such that need k to
reconstruct - Choose random k-1 degree polynomial, q, s.t.
q(0)M - Need k points to interpolate
15First Method
- Key Pair per Trait
- Encrypt shares of message
- Deg. 4 (need 5 traits) polynomial q(x), such that
q(0)M
q(x) at 5 points ) q(0)M
16Collusion Attack
Private Key
17Our Approach
- Goals
- Threshold
- Collusion Resistance
- Methods
- Secret-share private key
- Bilinear maps
18Bilinear Maps
- G , G1 finite cyclic groups of prime order p.
- Def An admissible bilinear map e G?G ? G1
is - Bilinear e(ga, gb) e(g,g)ab ?a,b?Z,
g?G - Non-degenerate g generates G ?
e(g,g) generates G1 . - Efficiently computable.
19The SW05 Threshold ABE system
Public Parameters
e(g,g)y 2 G1, gt1, gt2,.... gtn 2 G
Interpolate in exponent to get e(g,g)rq(0)e(g,g)r
y
20Intuition
- Threshold
- Need k values of e(g,g)rq(x)
- Collusion resistance
- Cant combine private key components
- ( shares of q(x), q(x) )
- Reduction
- Given ga,gb,gc distinguish e(g,g)ab/c from random
21Moving Beyond Threshold ABE
- Threshold ABE not very expressive
- Grafting has limitations
- Shamir Secret Sharing gt k of n
- Base new ABE off of general
- secret sharing schemes
OR
AND
ksmith
CS
admin
22Access Trees Ben86
- Secret Sharing for tree-structure of AND OR
- Replicate ORs Split ANDs
s
OR
AND
AND
OR
Alice
Bob
Charlie
Doug
Edith
23Key-Policy Attribute-Based Encryption GPSW06
- Encryption similar to Threshold ABE
- Keys reflect a tree access structure
- Randomness to prevent collusion!
- Use Threshold Gates
- Decrypt iff attributes from CT
- satisfy keys policy
OR
AND
ksmith
CS
admin
24Delegation
- Can delegate any key to a more restrictive policy
- Subsumes Hierarchical-IBE
OR
AND
ksmith
CS
admin
25A comparison
- ABE GPSW06
- Arbitrary Attributes
- Expressive Policy
- Attributes in Clear
- Hidden Vector Enc. BW06
- Fields Fixed at Setup
- Conjunctions dont care
- Hidden Attributes
26Ciphertext Policy ABE (opposite)
- Encrypt Data reflect Decryption Policies
- Users Private Keys are descriptive attributes
27Multi-Authority ABE Chase07
- Authorities over different domains
- E.g. DMV and IRS
- Challenge Prevent Collusion Across Domains
- Insight Use globally verifiable ID/attribute
to link
28Open Problems
- Ciphertext Policy ABE
- ABE with hidden attributes
- Policies from Circuits instead of Trees
29Generalizing the Framework
CA/PKG
master-key
Authority is offline
30Health Records
Weight125 Height 54 Age 46 Blood Pressure
125 Partners
If Weight/Height gt30 AND Age gt 45 Output Blood
Pressure
No analogous PKI solution
CA/PKG
master-key
Authority is offline
31THE END
32Related Work
- Secret Sharing Schemes Shamir79, Benaloh86
- Allow Collusion
- Building from IBE Secret Sharing Smart03,
Juels - IBE gives key Compression
- Not Collusion Resistant