Attribute-Based Encryption with Key Cloning Protection

In this work, we consider the problem of key cloning in attribute-based encryption schemes. We introduce a new type of attribute-based encryption scheme, called token-based attributebased encryption, that provides strong deterrence for key cloning, in the sense that delegation of keys reveals some personal information about the user. We formalize the security requirements for such a scheme in terms of indistinguishability of the ciphertexts and two new security requirements which we call uncloneability and privacy-preserving. We construct a privacy-preserving uncloneable token-based attribute-based encryption scheme based on Cheung and Newport’s ciphertext-policy attribute-based encryption scheme and prove the scheme satisfies the above three security requirements. We discuss our results and show directions for future research.

[1]  Joonsang Baek,et al.  Token-Controlled Public Key Encryption , 2005, ISPEC.

[2]  Carl Pomerance,et al.  Advances in Cryptology — CRYPTO ’87 , 2000, Lecture Notes in Computer Science.

[3]  Feng Bao,et al.  Designated Verifier Signature Schemes: Attacks, New Security Notions and a New Construction , 2005, ICALP.

[4]  Michael Wiener,et al.  Advances in Cryptology — CRYPTO’ 99 , 1999 .

[5]  Yevgeniy Dodis,et al.  ID-based encryption for complex hierarchies with applications to forward security and broadcast encryption , 2004, CCS '04.

[6]  Rafail Ostrovsky,et al.  Attribute-based encryption with non-monotonic access structures , 2007, CCS '07.

[7]  Moni Naor,et al.  Efficient trace and revoke schemes , 2000, International Journal of Information Security.

[8]  Moni Naor,et al.  Digital signets: self-enforcing protection of digital information (preliminary version) , 1996, STOC '96.

[9]  Brent Waters,et al.  Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).

[10]  Brent Waters,et al.  Secure attribute-based systems , 2006, CCS '06.

[11]  Dalit Naor,et al.  Broadcast Encryption , 1993, Encyclopedia of Multimedia.

[12]  Joonsang Baek,et al.  New constructions of fuzzy identity-based encryption , 2007, ASIACCS '07.

[13]  Hong Chen,et al.  On the Security of Delegation in Access Control Systems , 2008, ESORICS.

[14]  Dalia Khader,et al.  Attribute Based Group Signature with Revocation , 2007, IACR Cryptol. ePrint Arch..

[15]  Brent Waters,et al.  Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.

[16]  Brent Waters,et al.  Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.

[17]  Jessica Staddon,et al.  A content-driven access control system , 2008, IDtrust '08.

[18]  Melissa Chase,et al.  Multi-authority Attribute Based Encryption , 2007, TCC.

[19]  Amos Fiat,et al.  Tracing Traitors , 1994, CRYPTO.

[20]  Ali Miri,et al.  Using Threshold Attribute-based Encryption for Practical Biometric-based Access Control , 2005, Int. J. Netw. Secur..