SACfe: Secure Access Control in Functional Encryption with Unbounded Data

被引:2
|
作者
Dowerah, Uddipana [1 ]
Dutta, Subhranil [2 ]
Hartmann, Frank [1 ]
Mitrokotsa, Aikaterini [1 ]
Mukherjee, Sayantan [3 ]
Pal, Tapas [4 ]
机构
[1] Univ St Gallen, St Gallen, Switzerland
[2] Indian Inst Technol Kharagpur, Kharagpur, W Bengal, India
[3] Indian Inst Technol Jammu, Jammu, India
[4] Karlsruhe Inst Technol, Karlsruhe, Germany
关键词
INDISTINGUISHABILITY OBFUSCATION; PREDICATE ENCRYPTION;
D O I
10.1109/EuroSP60621.2024.00053
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Privacy is a major concern in large-scale digital applications, such as cloud-computing, machine learning services, and access control. Users want to protect not only their plain data but also their associated attributes (e.g., age, location, etc). Functional encryption (FE) is a cryptographic tool that allows fine-grained access control over encrypted data. However, existing FE fall short as they are either inefficient and far from reality or they leak sensitive user-specific information. We propose SACfe, a novel attribute-based FE scheme that provides secure, fine-grained access control and hides both the user's attributes and the function applied to the data, while preserving the data's confidentiality. Moreover, it enables users to encrypt unbounded-length messages along with an arbitrary number of hidden attributes into ciphertexts. We design SACfe, a protocol for performing linear computation on encrypted data while enforcing access control based on inner product predicates. We show how SACfe can be used for online biometric authentication for privacy-preserving access control. As an additional contribution, we introduce an attribute-based linear FE for unbounded length of messages and functions where access control is realized by monotone span programs. We implement our protocols using the CiFEr cryptographic library and show its efficiency for practical settings.
引用
收藏
页码:860 / 882
页数:23
相关论文
共 50 条
  • [21] Improved unbounded inner-product functional encryption
    Yang, Minghao
    Gong, Junqing
    Qian, Haifeng
    THEORETICAL COMPUTER SCIENCE, 2024, 1014
  • [22] SanIdea: Exploiting Secure Blockchain-Based Access Control via Sanitizable Encryption
    Jiang, Peng
    Liu, Qi
    Zhu, Liehuang
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 1589 - 1600
  • [23] Secure Access Control of E-Health System with Attribute-Based Encryption
    Yan, Hongyang
    Li, Jin
    Li, Xuan
    Zhao, Gansen
    Lee, Sun-Young
    Shen, Jian
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2016, 22 (03): : 345 - 352
  • [24] Controlled Multi-client Functional Encryption for Flexible Access Control
    Zhang, Mingwu
    Zhong, Yulu
    Wang, Yifei
    Wang, Yuntao
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2024, 2025, 15053 : 329 - 346
  • [25] Secure data aggregation with multiple encryption
    Onen, Melek
    Molva, Refik
    WIRELESS SENSOR NETWORKS, PROCEEDINGS, 2007, 4373 : 117 - +
  • [26] Access Control Encryption from Group Encryption
    Wang, Xiuhua
    Wong, Harry W. H.
    Chow, Sherman S. M.
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY (ACNS 2021), PT I, 2021, 12726 : 417 - 441
  • [27] Access control based on entity matching for secure data sharing
    Agoun, Juba
    Hacid, Mohand-Said
    SERVICE ORIENTED COMPUTING AND APPLICATIONS, 2022, 16 (01) : 31 - 44
  • [28] Policy Management for Secure Data Access Control in Vehicular Networks
    Dijiang Huang
    Wei-Tek Tsai
    Yi-hsin Tseng
    Journal of Network and Systems Management, 2011, 19 : 448 - 471
  • [29] Provably Secure Data Access Control Protocol for Cloud Computing
    Zhang, Ji
    Chen, Anmin
    Zhang, Ping
    SYMMETRY-BASEL, 2023, 15 (12):
  • [30] An Adaptively Secure Functional Encryption for Randomized Functions
    Liu, Muhua
    Zhang, Ping
    COMPUTER JOURNAL, 2020, 63 (08): : 1247 - 1258