A privacy-preserving approach to policy-based content dissemination

We propose a novel scheme for selective distribution of content, encoded as documents, that preserves the privacy of the users to whom the documents are delivered and is based on an efficient and novel group key management scheme. Our document broadcasting approach is based on access control policies specifying which users can access which documents, or subdocuments. Based on such policies, a broadcast document is segmented into multiple subdocuments, each encrypted with a different key. In line with modern attribute-based access control, policies are specified against identity attributes of users. However our broadcasting approach is privacy-preserving in that users are granted access to a specific document, or subdocument, according to the policies without the need of providing in clear information about their identity attributes to the document publisher. Under our approach, not only does the document publisher not learn the values of the identity attributes of users, but it also does not learn which policy conditions are verified by which users, thus inferences about the values of identity attributes are prevented. Moreover, our key management scheme on which the proposed broadcasting approach is based is efficient in that it does not require to send the decryption keys to the users along with the encrypted document. Users are able to reconstruct the keys to decrypt the authorized portions of a document based on subscription information they have received from the document publisher. The scheme also efficiently handles new subscription of users and revocation of subscriptions.

[1]  Yacine Challal,et al.  Group Key Management Protocols: A Novel Taxonomy , 2008 .

[2]  Dan Suciu,et al.  Controlling Access to Published Data Using Cryptography , 2003, VLDB.

[3]  Elisa Bertino,et al.  A Practical and Flexible Key Management Mechanism For Trusted Collaborative Computing , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[4]  Brent Waters,et al.  Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.

[5]  Torben P. Pedersen Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing , 1991, CRYPTO.

[6]  Hugh Harney,et al.  Group Key Management Protocol (GKMP) Specification , 1997, RFC.

[7]  Ninghui Li,et al.  OACerts: Oblivious Attribute Certificates , 2005, IEEE Transactions on Dependable and Secure Computing.

[8]  Tim Moses,et al.  EXtensible Access Control Markup Language (XACML) version 1 , 2003 .

[9]  Brent Waters,et al.  Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.

[10]  T ShermanAlan,et al.  Key Establishment in Large Dynamic Groups Using One-Way Function Trees , 2003 .

[11]  Hua Wang,et al.  A secure multicast protocol with copyright protection , 2002, CCRV.

[12]  Wen-Tsuen Chen,et al.  Secure Broadcasting Using the Secure Lock , 1989, IEEE Trans. Software Eng..

[13]  OpenSSL OpenSSL : The open source toolkit for SSL/TSL , 2002 .

[14]  Éric Schost,et al.  Construction of Secure Random Curves of Genus 2 over Prime Fields , 2004, EUROCRYPT.

[15]  Elisa Bertino,et al.  Secure and selective dissemination of XML documents , 2002, TSEC.

[16]  ChuHao-hua,et al.  A secure multicast protocol with copyright protection , 2002 .

[17]  Malibu Canyon RdMalibu Keystone: a Group Key Management Service , 2000 .

[18]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[19]  Joachim Posegga,et al.  On Structural Signatures for Tree Data Structures , 2012, ACNS.

[20]  Alan T. Sherman,et al.  Key Establishment in Large Dynamic Groups Using One-Way Function Trees , 2003, IEEE Trans. Software Eng..