Multi-Authority Non-Monotonic KP-ABE with Cryptographic Reverse Firewall

  • Bo Hong
  • , Jie Chen*
  • , Kai Zhang
  • , Haifeng Qian
  • *Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

21 Scopus citations

Abstract

The revelations of Snowden show that hardware and software of devices may corrupt users' machine to compromise the security in various ways. To address this concern, Mironov and Stephen-Davidowitz introduce the Cryptographic Reverse Firewall (CRF) concept that is able to resist the ex-filtration of secret information for some compromised machine (Eurocrypt 2015). There are some applications of CRF deployed in many cryptosystems, but less studied and deployed in Attribute-Based Encryption (ABE) field, which attracts a wide range of attention and is employed in real-world scenarios (i.e., data sharing in cloud). In this work, we focus how to give a CRF security protection for a multi-Authority ABE scheme and hence propose a multi-Authority key-policy ABE scheme with CRF (acronym, MA-KP-ABE-CRF), which supports attribute distribution and non-monotonic access structure. To achieve this, beginning with revisiting a MA-KP-ABE with non-Trivial combining non-monotonic formula, we then give the randomness of ciphertexts and secret keys with reverse firewall and give formal security analysis. Finally, we give a simulation on our MA-KP-ABE-CRF system based on Charm library whose the experimental results demonstrate practical efficiency.

Original languageEnglish
Article number8887491
Pages (from-to)159002-159012
Number of pages11
JournalIEEE Access
Volume7
DOIs
StatePublished - 2019

Keywords

  • Attribute-based encryption
  • cryptographic reverse firewall
  • multi-Authority
  • non-monotonic access structure

Fingerprint

Dive into the research topics of 'Multi-Authority Non-Monotonic KP-ABE with Cryptographic Reverse Firewall'. Together they form a unique fingerprint.

Cite this