21
1 Fully Secure Unbounded Inner-Product and Attribute-Based Encryption 2012 / 12 / 4 Tatsuaki Okamoto ( NTT ) Katsuyuki Takashima ( Mitsubishi Electric )

Fully Secure Unbounded Inner-Product and Attribute-Based ...Fully Secure Unbounded Inner-Product and Attribute-Based Encryption 2012 / 12 / 4 ... amplify the randomness of the source

  • Upload
    others

  • View
    5

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Fully Secure Unbounded Inner-Product and Attribute-Based ...Fully Secure Unbounded Inner-Product and Attribute-Based Encryption 2012 / 12 / 4 ... amplify the randomness of the source

1

Fully Secure Unbounded Inner-Product

and Attribute-Based Encryption

2012 / 12 / 4

Tatsuaki Okamoto ( NTT )

Katsuyuki Takashima ( Mitsubishi Electric )

Page 2: Fully Secure Unbounded Inner-Product and Attribute-Based ...Fully Secure Unbounded Inner-Product and Attribute-Based Encryption 2012 / 12 / 4 ... amplify the randomness of the source

2

Functional Encryption

Plain

textEncryption Cipher

text

Public key

pk

Decryption Plain

text

Secret key

with parameter Parameter

sk

Relation

R( , ) holds

• This type is called Predicate Encryption in [BSW11].

Page 3: Fully Secure Unbounded Inner-Product and Attribute-Based ...Fully Secure Unbounded Inner-Product and Attribute-Based Encryption 2012 / 12 / 4 ... amplify the randomness of the source

3

Previously Proposed Special Cases of FE

R

ID-based

enc. (IBE)

ID ID’ ID = ID’

Attribute-

based enc.

(ABE)

Attributes Access

structure

Access

structure

Attributes

Inner-

product enc.

(IPE)

Vector Vector

Key-policy

(KP)-ABE

Ciphertext-

policy

(CP)-ABE

accepts

In ABE, access structures are usually given by span programs.

In IPE, the anonymity of vector ( attribute-hiding security ) is usually

required. Any CNF or DNF formula can be realized by inner-product

predicates.

Page 4: Fully Secure Unbounded Inner-Product and Attribute-Based ...Fully Secure Unbounded Inner-Product and Attribute-Based Encryption 2012 / 12 / 4 ... amplify the randomness of the source

4

Inner-Product Predicates [KSW 08]

Page 5: Fully Secure Unbounded Inner-Product and Attribute-Based ...Fully Secure Unbounded Inner-Product and Attribute-Based Encryption 2012 / 12 / 4 ... amplify the randomness of the source

5

Adaptively Secure & Fully Attribute-Hiding (AH) IPE

Challenger

No additional information on is revealed even to

any person with a matching key , i.e.,

Page 6: Fully Secure Unbounded Inner-Product and Attribute-Based ...Fully Secure Unbounded Inner-Product and Attribute-Based Encryption 2012 / 12 / 4 ... amplify the randomness of the source

6

Unbounded FE

• All previous constructions of IPE and ABE except Lewko-

Waters unbounded ABE are bounded, in the sense that the

public parameters ( pk ) impose additional limitations on the

parameters ( ) for encryption and decryption keys,

e.g., available dimension n in existing IPE is bounded by pk.

• In practice, it is highly desirable that the parameters ( )

should be flexible or unbounded by pk fixed at setup,

since if we set pk for a possible maximum size,

the size of pk should be huge.

• Existing IPE schemes have another restriction on the

parameters (vectors), i.e., dimensions of attributes and

predicates should be equivalent.

Why is it a restriction ?

Page 7: Fully Secure Unbounded Inner-Product and Attribute-Based ...Fully Secure Unbounded Inner-Product and Attribute-Based Encryption 2012 / 12 / 4 ... amplify the randomness of the source

7

Genetic Profile Data Predicate Search(I)

• A large amount of sensitive genetic profile data

of an individual are stored in a remote server

Doctor A

A A G C A T . . .. . .

• Only a part of the profile is examined in many

applications ( for various purposes )

Doctor BPharmaceutical

Company X

Pharmaceutical Company Y

Data Processingand Retrieval

Page 8: Fully Secure Unbounded Inner-Product and Attribute-Based ...Fully Secure Unbounded Inner-Product and Attribute-Based Encryption 2012 / 12 / 4 ... amplify the randomness of the source

8

• Genetic property variables

• Evaluate if for an examination of

whose dimension is around 106

• Predicate for

Polynomial

Effective dimension of is 5, instead of 106 !!

Genetic Profile Data Predicate Search(II)

a degree-3 polynomial

Alice’s values

Page 9: Fully Secure Unbounded Inner-Product and Attribute-Based ...Fully Secure Unbounded Inner-Product and Attribute-Based Encryption 2012 / 12 / 4 ... amplify the randomness of the source

9

Generalized Inner-Product

• Generalized (attribute and predicate) vectors

• Three types of generalized IPE

with respect to the decryption condition

Page 10: Fully Secure Unbounded Inner-Product and Attribute-Based ...Fully Secure Unbounded Inner-Product and Attribute-Based Encryption 2012 / 12 / 4 ... amplify the randomness of the source

10

Our Results

• We introduce a new concept of IPE, generalized IPE

Type 0, Type 1, Type 2

• present the first unbounded IPE schemes

adaptively secure and fully attribute-hiding

under DLIN (in the standard model)

• present the first unbounded KP- and CP-ABE schemes

that are fully secure (adaptively payload-hiding) under DLIN

Previous Work on Unbounded FE [ LW11 ]

• Unbounded KP-ABE that is selectively secure

• Unbounded HIBE that is fully secure in the standard model

Page 11: Fully Secure Unbounded Inner-Product and Attribute-Based ...Fully Secure Unbounded Inner-Product and Attribute-Based Encryption 2012 / 12 / 4 ... amplify the randomness of the source

11

Dual Pairing Vector Space Approach (I)

Vector space using symmetric pairing groups

where is a generator of

( Canonical ) pairing operation:

For and

where

dual orthonormal bases, i.e.,

Dual bases :

basis of

for

for

s.t.

s.t.

where

Page 12: Fully Secure Unbounded Inner-Product and Attribute-Based ...Fully Secure Unbounded Inner-Product and Attribute-Based Encryption 2012 / 12 / 4 ... amplify the randomness of the source

12

DPVS Approach (II)

with ( the canonicalCryptographic Construction using

Dual Pairing Vector Space (DPVS) approach :

pairing and ) random dual bases as a master key pair

DLIN-based security ( from [OT10] machinery )

For and we denote

Notation :

where

Page 13: Fully Secure Unbounded Inner-Product and Attribute-Based ...Fully Secure Unbounded Inner-Product and Attribute-Based Encryption 2012 / 12 / 4 ... amplify the randomness of the source

13

Basic Idea for Constructing IPE using DPVS

where

Page 14: Fully Secure Unbounded Inner-Product and Attribute-Based ...Fully Secure Unbounded Inner-Product and Attribute-Based Encryption 2012 / 12 / 4 ... amplify the randomness of the source

14

Adaptively Fully-Attribute-Hiding IPE [ OT12a ]

where

Page 15: Fully Secure Unbounded Inner-Product and Attribute-Based ...Fully Secure Unbounded Inner-Product and Attribute-Based Encryption 2012 / 12 / 4 ... amplify the randomness of the source

15

Key Techniques for Fully Secure Unbounded FE

indexing:

supply a source of unbounded amount of randomness

consistent randomness amplification:

amplify the randomness of the source and

adjust the distribution consistently with the condition

We develop novel techniques, indexing and

consistent randomness amplification technique

The difficulty of realizing fully secure unbounded IPE (or

ABE) arises from the hardness of supplying an unbounded

amount of randomness consistent with the complicated

key-query condition under a “constant size” pk

Page 16: Fully Secure Unbounded Inner-Product and Attribute-Based ...Fully Secure Unbounded Inner-Product and Attribute-Based Encryption 2012 / 12 / 4 ... amplify the randomness of the source

16

Indexing for Type 1 IPE (I)

… …

CT

CT

[ OT12a ]

Our IPE

Indexing

For simplicity,

Page 17: Fully Secure Unbounded Inner-Product and Attribute-Based ...Fully Secure Unbounded Inner-Product and Attribute-Based Encryption 2012 / 12 / 4 ... amplify the randomness of the source

17

Indexing for Type 1 IPE (II)

Ciphertext

Secret Key

+

Pairing Pairing

Decryption

If is recovered

and the secret is used for correct decryption.

Correctness

Assume

Page 18: Fully Secure Unbounded Inner-Product and Attribute-Based ...Fully Secure Unbounded Inner-Product and Attribute-Based Encryption 2012 / 12 / 4 ... amplify the randomness of the source

18

Indexing for Type 1 IPE (III)

Ciphertext

Secret Key

• Pairing elements for

Pairing

• Correlation from index part, randomizes

( prevention of collusion attack )

Page 19: Fully Secure Unbounded Inner-Product and Attribute-Based ...Fully Secure Unbounded Inner-Product and Attribute-Based Encryption 2012 / 12 / 4 ... amplify the randomness of the source

19

Adaptively Fully-AH Unbounded Type 1 IPE

Page 20: Fully Secure Unbounded Inner-Product and Attribute-Based ...Fully Secure Unbounded Inner-Product and Attribute-Based Encryption 2012 / 12 / 4 ... amplify the randomness of the source

20

Consistent Randomness Amplification

normal

secret key:

normal

ciphertext:

Amplified consistently with the key condition

Computational

&

Information-

Theoretical

Changes

Page 21: Fully Secure Unbounded Inner-Product and Attribute-Based ...Fully Secure Unbounded Inner-Product and Attribute-Based Encryption 2012 / 12 / 4 ... amplify the randomness of the source

21

Comparison of IPE Schemes

dimensions of predicate vector and attribute vector

size of an element of

AH, IP, GSD : attribute-hiding, inner product, general subgroup decision PK, SK, CT : public key, secret key, ciphertext