Anonymous CP-ABE against Side-channel Attacks in Cloud Computing

Anonymous ABE is a promising primitive for enforcing fine-grained access control for the big data as well as preserving privacy of the users in Cloud Computing. However, traditional anonymous ABE schemes may not be secure in the real word due to the side-channel attacks. In addition, the existing anonymous ABE schemes are considered in the leak-free scenario assuming that secret keys are not leaked to the adversary. Thus, it is compelling to study the anonymity of ABE schemes in the context of key leakage attacks. Aiming at tackling the challenge above, an anonymous CP-ABE scheme against side-channel attacks in the bounded-leakage model is constructed. As a main technique tool, the dual system encryption technique is adopted. The proposed scheme uses LSSS as access structures and achieves adaptive security in the standard model. In addition, the results in simulation experiments indicate that the proposed scheme is efficient and practical.

[1]  Sean W. Smith,et al.  Attribute-Based Publishing with Hidden Credentials and Hidden Policies , 2007, NDSS.

[2]  Yevgeniy Dodis,et al.  Leakage-Resilient Pseudorandom Functions and Side-Channel Attacks on Feistel Networks , 2010, CRYPTO.

[3]  Dongdai Lin,et al.  Anonymous Identity-Based Hash Proof System and Its Applications , 2012, ProvSec.

[4]  Anish Mathuria,et al.  On Anonymous Attribute Based Encryption , 2015, ICISS.

[5]  Brent Waters,et al.  Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.

[6]  Vinod Vaikuntanathan,et al.  Protecting Circuits from Leakage: the Computationally-Bounded and Noisy Cases , 2010, EUROCRYPT.

[7]  Yongbin Zhou,et al.  Public-key encryption with keyword search secure against continual memory attacks , 2016, Secur. Commun. Networks.

[8]  Eyal Kushilevitz,et al.  Exposure-Resilient Functions and All-or-Nothing Transforms , 2000, EUROCRYPT.

[9]  Dawu Gu,et al.  Efficient Leakage-Resilient Identity-Based Encryption with CCA Security , 2013, Pairing.

[10]  Kazuki Yoneyama,et al.  Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures , 2008, ACNS.

[11]  Jin Li,et al.  Privacy-Aware Attribute-Based Encryption with User Accountability , 2009, ISC.

[12]  Allison Bishop,et al.  Achieving Leakage Resilience through Dual System Encryption , 2011, TCC.

[13]  Yael Tauman Kalai,et al.  Public-Key Encryption Schemes with Auxiliary Inputs , 2010, TCC.

[14]  Jiankun Hu,et al.  A general transformation from KP-ABE to searchable encryption , 2014, Future Gener. Comput. Syst..

[15]  Siu-Ming Yiu,et al.  Attribute-Based Encryption Resilient to Auxiliary Input , 2015, ProvSec.

[16]  Brent Waters,et al.  Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.

[17]  Dan Boneh,et al.  Evaluating 2-DNF Formulas on Ciphertexts , 2005, TCC.

[18]  Qing Wu,et al.  Leakage-Resilient Anonymous Identity-Based Broadcast Encryption in the Standard Model , 2015, ICA3PP.

[19]  Jonathan Katz,et al.  Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products , 2008, Journal of Cryptology.

[20]  Jin Li,et al.  Anonymous attribute-based encryption supporting efficient decryption test , 2013, ASIA CCS '13.

[21]  Siu-Ming Yiu,et al.  Identity-Based Encryption Resilient to Continual Auxiliary Leakage , 2012, EUROCRYPT.