309 research outputs found
Contributions to Identity-Based Broadcast Encryption and Its Anonymity
Broadcast encryption was introduced to improve the efficiency of encryption when a message should be sent to or shared with a group of users. Only the legitimate users chosen in the encryption phase are able to retrieve the message. The primary challenge in construction a broadcast encryption scheme is to achieve collusion resistance such that the unchosen users learn nothing about the content of the encrypted message even they collude
Attribute-based encryption for cloud computing access control: A survey
National Research Foundation (NRF) Singapore; AXA Research Fun
Longitude : a privacy-preserving location sharing protocol for mobile applications
Location sharing services are becoming increasingly popular. Although many location sharing services allow users to set up privacy policies to control who can access their location, the use made by service providers remains a source of concern. Ideally, location sharing providers and middleware should not be able to access usersā location data without their consent. In this paper, we propose a new location sharing protocol called Longitude that eases privacy concerns by making it possible to share a userās location data blindly and allowing the user to control who can access her location, when and to what degree of precision. The underlying cryptographic algorithms are designed for GPS-enabled mobile phones. We describe and evaluate our implementation for the Nexus One Android mobile phone
Equivalence-based Security for Querying Encrypted Databases: Theory and Application to Privacy Policy Audits
Motivated by the problem of simultaneously preserving confidentiality and
usability of data outsourced to third-party clouds, we present two different
database encryption schemes that largely hide data but reveal enough
information to support a wide-range of relational queries. We provide a
security definition for database encryption that captures confidentiality based
on a notion of equivalence of databases from the adversary's perspective. As a
specific application, we adapt an existing algorithm for finding violations of
privacy policies to run on logs encrypted under our schemes and observe low to
moderate overheads.Comment: CCS 2015 paper technical report, in progres
Efficient and Secure Data Sharing Using Attribute-based Cryptography
La crescita incontrollata di dati prodotti da molte sorgenti, eterogenee e di-
namiche, spinge molti possessori di tali dati a immagazzinarli su server nel cloud,
anche al fine di condividerli con terze parti. La condivisione di dati su server
(possibilmente) non fidati fonte di importanti e non banali questioni riguardanti
sicurezza, privacy, confidenzialit e controllo degli accessi. Al fine di prevenire
accessi incontrollati ai dati, una tipica soluzione consiste nel cifrare i dati stessi.
Seguendo tale strada, la progettazione e la realizzazione di politiche di accesso
ai dati cifrati da parte di terze parti (che possono avere differenti diritti sui
dati stessi) un compito complesso, che impone la presenza di un controllore
fidato delle politiche. Una possibile soluzione l\u2019impiego di un meccanismo per
il controllo degli accessi basato su schemi di cifratura attribute-base (ABE ),
che permette al possessore dei dati di cifrare i dati in funzione delle politiche
di accesso dei dati stessi. Di contro, l\u2019adozione di tali meccanismi di controllo
degli accessi presentano due problemi (i) privacy debole: le politiche di accesso
sono pubbliche e (ii) inefficienza: le politiche di accesso sono statiche e una loro
modifica richiede la ricifratura (o la cifratura multipla) di tutti i dati. Al fine
di porre rimedio a tali problemi, il lavoro proposto in questa tesi prende in con-
siderazione un particolare schema di cifratura attribute-based, chiamato inner
product encryption (IPE, che gode della propriet attribute-hiding e pertanto
riesce a proteggere la privatezza delle politiche di accesso) e lo combina con
le tecniche di proxy re-encryption, che introducono una maggiore flessibilit ed
efficienza.
La prima parte di questa tesi discute l\u2019adeguatezza dell\u2019introduzione di un
meccanismo di controllo degli accessi fondato su schema basato su inner product
e proxy re-encryption (IPPRE ) al fine di garantire la condivisione sicura di dati
immagazzinati su cloud server non fidati. Pi specificamente, proponiamo due
proponiamo due versioni di IPE : in prima istanza, presentiamo una versione es-
tesa con proxy re-encryption di un noto schema basato su inner product [1]. In
seguito, usiamo tale schema in uno scenario in cui vengono raccolti e gestiti dati
medici. In tale scenario, una volta che i dati sono stati raccolti, le politiche di ac-
cesso possono variare al variare delle necessit dei diversi staff medici. Lo schema
proposto delega il compito della ricifratura dei dati a un server proxy parzial-
mente fidato, che pu trasformare la cifratura dei dati (che dipende da una polit-
ica di accesso) in un\u2019altra cifratura (che dipende da un\u2019altra politica di accesso)
senza per questo avere accesso ai dati in chiaro o alla chiave segreta utilizzata
dal possessore dei dati. In tal modo, il possessore di una chiave di decifratura
corrispondente alla seconda politica di accesso pu accedere ai dati senza intera-
gire con il possessore dei dati (richiedendo cio una chiave di decifratura associata
alla propria politica di accesso). Presentiamo un\u2019analisi relativa alle prestazioni
di tale schema implementato su curve ellittiche appartenenti alle classi SS, MNT
e BN e otteniamo incoraggianti risultati sperimentali. Dimostriamo inoltre che
lo schema proposto sicuro contro attacchi chosen plaintext sotto la nota ipotesi
DLIN. In seconda istanza, presentiamo una versione ottimizzata dello schema
proposto in precedenza (E-IPPRE ), basata su un ben noto schema basato suinner product, proposto da Kim [2]. Lo schema E-IPPRE proposto richiede un
numero costante di operazioni di calcolo di pairing e ci garantisce che gli oggetti
prodotti dall esecuzione dello schema (chiavi di decifratura, chiavi pubbliche
e le cifrature stesse) sono di piccole rispetto ai parametri di sicurezza e sono
efficientemente calcolabili. Testiamo sperimentalmente l\u2019efficienza dello schema
proposto e lo proviamo (selettivamente nei confronti degli attributi) sicuro nei
confronti di attacchi chosen plaintext sotto la nota ipotesi BDH. In altri termini,
lo schema proposto non rivela alcuna informazione riguardante le politiche di
accesso.
La seconda parte di questa tesi presenta uno schema crittografico per la
condivisione sicura dei dati basato su crittografia attribute-based e adatto per
scenari basati su IoT. Come noto, il problema principale in tale ambito riguarda
le limitate risorse computazionali dei device IoT coinvolti. A tal proposito,
proponiamo uno schema che combina la flessibilit di E-IPPRE con l\u2019efficienza
di uno schema di cifratura simmetrico quale AES, ottenendo uno schema di
cifratura basato su inner product, proxy-based leggero (L-IPPRE ). I risultati
sperimentali confermano l\u2019adeguatezza di tale schema in scenari IoT.Riferimenti
[1] Jong Hwan Park. Inner-product encryption under standard assumptions.
Des. Codes Cryptography, 58(3):235\u2013257, March 2011.
[2] Intae Kim, Seong Oun Hwang, Jong Hwan Park, and Chanil Park. An effi-
cient predicate encryption with constant pairing computations and minimum
costs. IEEE Trans. Comput., 65(10):2947\u20132958, October 2016.With the ever-growing production of data coming from multiple, scattered, and
highly dynamical sources, many providers are motivated to upload their data
to the cloud servers and share them with other persons for different purposes.
However, storing data on untrusted cloud servers imposes serious concerns in
terms of security, privacy, data confidentiality, and access control. In order to
prevent privacy and security breaches, it is vital that data is encrypted first
before it is outsourced to the cloud. However, designing access control mod-
els that enable different users to have various access rights to the shared data
is the main challenge. To tackle this issue, a possible solution is to employ
a cryptographic-based data access control mechanism such as attribute-based
encryption (ABE ) scheme, which enables a data owner to take full control over
data access. However, access control mechanisms based on ABE raise two chal-
lenges: (i) weak privacy: they do not conceal the attributes associated with the
ciphertexts, and therefore they do not satisfy attribute-hiding security, and (ii)
inefficiency: they do not support efficient access policy change when data is
required to be shared among multiple users with different access policies. To
address these issues, this thesis studies and enhances inner-product encryption
(IPE ), a type of public-key cryptosystem, which supports the attribute-hiding
property as well as the flexible fine-grained access control based payload-hiding
property, and combines it with an advanced cryptographic technique known as
proxy re-encryption (PRE ).
The first part of this thesis discusses the necessity of applying the inner-
product proxy re-encryption (IPPRE ) scheme to guarantee secure data sharing
on untrusted cloud servers. More specifically, we propose two extended schemes
of IPE : in the first extended scheme, we propose an inner-product proxy re-
encryption (IPPRE ) protocol derived from a well-known inner-product encryp-
tion scheme [1]. We deploy this technique in the healthcare scenario where data,
collected by medical devices according to some access policy, has to be changed
afterwards for sharing with other medical staffs. The proposed scheme delegates
the re-encryption capability to a semi-trusted proxy who can transform a dele-
gator\u2019s ciphertext associated with an attribute vector to a new ciphertext associ-
ated with delegatee\u2019s attribute vector set, without knowing the underlying data
and private key. Our proposed policy updating scheme enables the delegatee to
decrypt the shared data with its own key without requesting a new decryption
key. We analyze the proposed protocol in terms of its performance on three dif-
ferent types of elliptic curves such as the SS curve, the MNT curve, and the BN
curve, respectively. Hereby, we achieve some encouraging experimental results.
We show that our scheme is adaptive attribute-secure against chosen-plaintext
under standard Decisional Linear (D-Linear ) assumption. To improve the per-
formance of this scheme in terms of storage, communication, and computation
costs, we propose an efficient inner-product proxy re-encryption (E-IPPRE )
scheme using the transformation of Kim\u2019s inner-product encryption method [2].
The proposed E-IPPRE scheme requires constant pairing operations for its al-
gorithms and ensures a short size of the public key, private key, and ciphertext,making it the most efficient and practical compared to state of the art schemes
in terms of computation and communication overhead. We experimentally as-
sess the efficiency of our protocol and show that it is selective attribute-secure
against chosen-plaintext attacks in the standard model under Asymmetric De-
cisional Bilinear Diffie-Hellman assumption. Specifically, our proposed schemes
do not reveal any information about the data owner\u2019s access policy to not only
the untrusted servers (e.g, cloud and proxy) but also to the other users.
The second part of this thesis presents a new lightweight secure data sharing
scheme based on attribute-based cryptography for a specific IoT -based health-
care application. To achieve secure data sharing on IoT devices while preserving
data confidentiality, the IoT devices encrypt data before it is outsourced to the
cloud and authorized users, who have corresponding decryption keys, can ac-
cess the data. The main challenge, in this case, is on the one hand that IoT
devices are resource-constrained in terms of energy, CPU, and memory. On the
other hand, the existing public-key encryption mechanisms (e.g., ABE ) require
expensive computation. We address this issue by combining the flexibility and
expressiveness of the proposed E-IPPRE scheme with the efficiency of symmet-
ric key encryption technique (AES ) and propose a light inner-product proxy
re-encryption (L-IPPRE ) scheme to guarantee secure data sharing between dif-
ferent entities in the IoT environment. The experimental results confirm that
the proposed L-IPPRE scheme is suitable for resource-constrained IoT scenar-
ios.References
[1] Jong Hwan Park. Inner-product encryption under standard assumptions.
Des. Codes Cryptography, 58(3):235\u2013257, March 2011.
[2] Intae Kim, Seong Oun Hwang, Jong Hwan Park, and Chanil Park. An effi-
cient predicate encryption with constant pairing computations and minimum
costs. IEEE Trans. Comput., 65(10):2947\u20132958, October 2016
Ciphertext-policy attribute based encryption supporting access policy update
Attribute-based encryption (ABE) allows one-to-many encryption with static access control. In many occasions, the access control policy must be updated and the original encryptor might be required to re-encrypt the message, which is impractical, since the encryptor might be unavailable. Unfortunately, to date the work in ABE does not consider this issue yet, and hence this hinders the adoption of ABE in practice. In this work, we consider how to efficiently update access policies in Ciphertext-policy Attribute-based Encryption (CP-ABE) systems without re-encryption. We introduce a new notion of CP-ABE supporting access policy update that captures the functionalities of attribute addition and revocation to access policies. We formalize the security requirements for this notion, and subsequently construct two provably secure CP-ABE schemes supporting AND-gate access policy with constant-size ciphertext for user decryption. The security of our schemes are proved under the Augmented Multi-sequences of Exponents Decisional Diffie-Hellman assumption
On the Explanation and Implementation of Three Open-Source Fully Homomorphic Encryption Libraries
While fully homomorphic encryption (FHE) is a fairly new realm of cryptography, it has shown to be a promising mode of information protection as it allows arbitrary computations on encrypted data. The development of a practical FHE scheme would enable the development of secure cloud computation over sensitive data, which is a much-needed technology in today\u27s trend of outsourced computation and storage. The first FHE scheme was proposed by Craig Gentry in 2009, and although it was not a practical implementation, his scheme laid the groundwork for many schemes that exist today. One main focus in FHE research is the creation of a library that allows users without much knowledge of the complexities of FHE to use the technology securely. In this paper, we will present the concepts behind FHE, together with the introduction of three open-source FHE libraries, in order to bring better understanding to how the libraries function
Recommended from our members
FlexFHE: A System for Homomorphically Encrypting DNA and Operating on Encrypted Data Securely in Untrusted Environments
DNA data contains sensitive health information and personally identifiable data. Currently, even if DNA data is stored in encrypted databases, it must be decrypted for health professionals and researchers to analyze, which means that DNA data exists in plaintext on unsecured, untrusted servers and machines during analysis. This thesis describes a complete system for homomorphically encrypting DNA data in a trusted context and then running analytic operations on the encrypted DNA data in an untrusted context, thus allowing healthcare professionals and researchers to run both high volume analytics on many individualsā sequenced DNA and run complex analytics on a single individualās sequenced DNA without ever handling plaintext data.
Symmetric encryption is used as a mechanism for controlling which queries are made on the data. The threat model addressed by this system allows an authorized party to run only authorized queries on a genome, while restricting any additional access.
The system implemented achieves substring search, substring search with wildcards representing mutations, and percent match between two nucleotide sequences by converting genomic data into one-hot binary matrixes and encrypting each bit individually using OpenFHEās LWE Encryption implemented using the CGGI scheme. While runtime for each operation is O(nm), each operation is maximally parallelized using OpenMP, thus allowing for accelerated performance on machines with multiple CPUs without the need for batching
- ā¦