SACfe: Secure Access Control in Functional Encryption with Unbounded Data

被引:2
|
作者
Dowerah, Uddipana [1 ]
Dutta, Subhranil [2 ]
Hartmann, Frank [1 ]
Mitrokotsa, Aikaterini [1 ]
Mukherjee, Sayantan [3 ]
Pal, Tapas [4 ]
机构
[1] Univ St Gallen, St Gallen, Switzerland
[2] Indian Inst Technol Kharagpur, Kharagpur, W Bengal, India
[3] Indian Inst Technol Jammu, Jammu, India
[4] Karlsruhe Inst Technol, Karlsruhe, Germany
关键词
INDISTINGUISHABILITY OBFUSCATION; PREDICATE ENCRYPTION;
D O I
10.1109/EuroSP60621.2024.00053
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Privacy is a major concern in large-scale digital applications, such as cloud-computing, machine learning services, and access control. Users want to protect not only their plain data but also their associated attributes (e.g., age, location, etc). Functional encryption (FE) is a cryptographic tool that allows fine-grained access control over encrypted data. However, existing FE fall short as they are either inefficient and far from reality or they leak sensitive user-specific information. We propose SACfe, a novel attribute-based FE scheme that provides secure, fine-grained access control and hides both the user's attributes and the function applied to the data, while preserving the data's confidentiality. Moreover, it enables users to encrypt unbounded-length messages along with an arbitrary number of hidden attributes into ciphertexts. We design SACfe, a protocol for performing linear computation on encrypted data while enforcing access control based on inner product predicates. We show how SACfe can be used for online biometric authentication for privacy-preserving access control. As an additional contribution, we introduce an attribute-based linear FE for unbounded length of messages and functions where access control is realized by monotone span programs. We implement our protocols using the CiFEr cryptographic library and show its efficiency for practical settings.
引用
收藏
页码:860 / 882
页数:23
相关论文
共 50 条
  • [1] Secure Attribute-Based Encryption With Access Control to Data Medical Records
    Fitri, Novi Aryani
    Al Rasyid, M. Udin Harun
    Sudarsono, Amang
    2018 INTERNATIONAL ELECTRONICS SYMPOSIUM ON KNOWLEDGE CREATION AND INTELLIGENT COMPUTING (IES-KCIC), 2018, : 105 - 111
  • [2] Balancing Access Control and Privacy for Data Deduplication via Functional Encryption
    Mi, Bo
    Long, Ping
    Liu, Yang
    Kuang, Fengtian
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2020, 2020
  • [3] Encryption-Based Secure Sharing of Data with Fine-Grained Access Control in Public Clouds
    Selvam, L.
    Kumar, P. Mohan
    Renjith, J. Arokia
    JOURNAL OF APPLIED SECURITY RESEARCH, 2014, 9 (02) : 172 - 184
  • [4] A Secure Cloud Computing System by Using Encryption and Access Control Model
    Mahmood, Ghassan Sabeeh
    Huang, Dong Jun
    Jaleel, Baidaa Abdulrahman
    JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2019, 15 (03): : 538 - 549
  • [5] A Provably Secure Re-encryption-Based Access Control in Hierarchy
    Pareek, Gaurav
    Purushothama, B. R.
    RECENT FINDINGS IN INTELLIGENT COMPUTING TECHNIQUES, VOL 1, 2019, 707 : 97 - 104
  • [6] Secure data access control with perception reasoning
    Rauf, Abdul
    Abdullah, Abdul Hanan
    Mateen, Abdul
    Ashraf, Mahmood
    ADCAIJ-ADVANCES IN DISTRIBUTED COMPUTING AND ARTIFICIAL INTELLIGENCE JOURNAL, 2018, 7 (01): : 13 - 28
  • [7] Adaptively Secure Anonymous Identity-based Broadcast Encryption for Data Access Control in Cloud Storage Service
    Chen, Liqing
    Li, Jiguo
    Zhang, Yichen
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2019, 13 (03): : 1523 - 1545
  • [8] Secure Access Control for eHealth Data in Emergency Rescue Case based on Traceable Attribute-Based Encryption
    Shen, Yuan
    Song, Wei
    Zhao, Changsheng
    Peng, Zhiyong
    2022 IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, 2022, : 201 - 208
  • [9] HeSUN: Homomorphic Encryption for Secure Unbounded Neural Network Inference
    Duy Tung Khanh Nguyen
    Dung Hoang Duong
    Susilo, Willy
    Chow, Yang-Wai
    SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, PT I, SECURECOMM 2023, 2025, 567 : 413 - 438
  • [10] Secure Cloud Data Encryption
    Shiraishi, Momoko
    2023 2ND ASIA-PACIFIC COMPUTER TECHNOLOGIES CONFERENCE, APCT, 2023, : 34 - 37