Dynamic Credentials and Ciphertext Delegation for ABE Amit Sahai, - - PowerPoint PPT Presentation

dynamic credentials and ciphertext delegation for abe
SMART_READER_LITE
LIVE PREVIEW

Dynamic Credentials and Ciphertext Delegation for ABE Amit Sahai, - - PowerPoint PPT Presentation

Dynamic Credentials and Ciphertext Delegation for ABE Amit Sahai, Hakan Seyalioglu, Brent Waters Attribute-Based Encryption [S-Waters 2005, GPSW06, BSW07] Different users will have credentials (attributes). Top Secret, Forensics 2


slide-1
SLIDE 1

Dynamic Credentials and

Amit Sahai, Hakan Seyalioglu, Brent Waters

Ciphertext Delegation for ABE

slide-2
SLIDE 2

2

Attribute-Based Encryption

[S-Waters 2005, GPSW’06, BSW’07] Different users will have credentials (attributes). Top Secret, Forensics

slide-3
SLIDE 3

3

Attribute-Based Encryption

[S-Waters 2005, GPSW’06, BSW’07] Different users will have credentials (attributes). Top Secret, Forensics Attribute set = Top Secret, Forensics

slide-4
SLIDE 4

4

has a message, wants to send it to everyone authorized to receive it. Encryption takes as input a policy.

POTUS

AND OR

Attribute-Based Encryption

Top Secret Forensics

slide-5
SLIDE 5

5

has a message, wants to send it to everyone authorized to receive it. Encryption takes as input a policy.

POTUS

AND OR

Attribute-Based Encryption

Top Secret Forensics

Top Secret, Forensics

slide-6
SLIDE 6

6

has a message, wants to send it to everyone authorized to receive it. Encryption takes as input a policy.

POTUS

AND OR can decrypt

Attribute-Based Encryption

Top Secret Forensics

Top Secret, Forensics

ü ü

slide-7
SLIDE 7

7

has a message, wants to send it to everyone authorized to receive it. Encryption takes as input a policy.

POTUS

AND OR can decrypt

Attribute-Based Encryption

Top Secret Forensics

Top Secret, Forensics

ü ü

slide-8
SLIDE 8

8

has a message, wants to send it to everyone authorized to receive it. Encryption takes as input a policy.

POTUS

AND OR can decrypt

Attribute-Based Encryption

Top Secret Forensics

Top Secret, Forensics

ü ü

û

ü

slide-9
SLIDE 9

9

has a message, wants to send it to everyone authorized to receive it. Encryption takes as input a policy.

POTUS

AND OR can decrypt

Attribute-Based Encryption

Top Secret Forensics

Top Secret, Forensics

ü ü

û

ü

slide-10
SLIDE 10

10

has a message, wants to send it to everyone authorized to receive it. Encryption takes as input a policy.

POTUS

AND OR can decrypt

Attribute-Based Encryption

Top Secret Forensics

Top Secret, Forensics

ü ü

û

ü ü

slide-11
SLIDE 11

11

has a message, wants to send it to everyone authorized to receive it. Encryption takes as input a policy.

POTUS

AND OR can decrypt

Attribute-Based Encryption

Top Secret Forensics

Top Secret, Forensics

ü ü

û

ü ü

slide-12
SLIDE 12

12

has a message, wants to send it to everyone authorized to receive it. Encryption takes as input a policy.

POTUS

AND OR can decrypt

Attribute-Based Encryption

Top Secret Forensics

Top Secret, Forensics

ü ü

û

ü ü

slide-13
SLIDE 13

13

has a message, wants to send it to everyone authorized to receive it. Encryption takes as input a policy.

POTUS

AND OR can decrypt

Attribute-Based Encryption

Top Secret Forensics

Top Secret, Forensics

ü ü

û

ü ü

slide-14
SLIDE 14

14

This work: Dynamic Credentials

Users’ credentials change over time

If a user’s credentials change, his old key is revoked and he is issued a new key

slide-15
SLIDE 15

15

This work: Dynamic Credentials

Users’ credentials change over time

If a user’s credentials change, his old key is revoked and he is issued a new key

(Usual) Framework to make this possible:

slide-16
SLIDE 16

16

This work: Dynamic Credentials

Users’ credentials change over time

If a user’s credentials change, his old key is revoked and he is issued a new key

(Usual) Framework to make this possible:

  • Periodic broadcasts by key authority
slide-17
SLIDE 17

17

This work: Dynamic Credentials

Users’ credentials change over time

If a user’s credentials change, his old key is revoked and he is issued a new key

(Usual) Framework to make this possible:

  • Periodic broadcasts by key authority
  • Unrevoked keys can be updated and can

decrypt data encrypted at new time

slide-18
SLIDE 18

18

This work: Dynamic Credentials

Users’ credentials change over time

If a user’s credentials change, his old key is revoked and he is issued a new key

(Usual) Framework to make this possible:

  • Periodic broadcasts by key authority
  • Unrevoked keys can be updated and can

decrypt data encrypted at new time

slide-19
SLIDE 19

19

This work: Dynamic Credentials

Users’ credentials change over time

If a user’s credentials change, his old key is revoked and he is issued a new key

(Usual) Framework to make this possible:

  • Periodic broadcasts by key authority
  • Unrevoked keys can be updated and can

decrypt data encrypted at new time

slide-20
SLIDE 20

20

This work: Dynamic Credentials

Users’ credentials change over time

If a user’s credentials change, his old key is revoked and he is issued a new key

(Usual) Framework to make this possible:

  • Periodic broadcasts by key authority
  • Unrevoked keys can be updated and can

decrypt data encrypted at new time Are the security concerns the same as standard revocation? No: standard revocation is for broadcast: you

  • nly care about protecting the future

We illustrate with a motivating example: Inspired by a wonderful conversation with Thomas King and Daniel Manchala (Xerox LA) Our thanks to them for inspiring this work!

slide-21
SLIDE 21

21

Normally, employee only accesses files he needs (enforced by access logs).

Motivation

Setting: Company with ABE based access control

slide-22
SLIDE 22

22

Employee Termination: Employee’s key is revoked. Standard guarantee: he can’t access files added in the future.

Motivation

slide-23
SLIDE 23

23

Employee Termination: Employee’s key is revoked. Standard guarantee: he can’t access files added in the future. Problem: He hacks into server and uses old key to decrypt old files that he didn’t download earlier.

Motivation

slide-24
SLIDE 24

24

Employee Termination: Employee’s key is revoked. Standard guarantee: he can’t access files added in the future.

Motivation

slide-25
SLIDE 25

25

Employee Termination: Employee’s key is revoked. Standard guarantee: he can’t access files added in the future. Problem: He hacks into server and uses old key to decrypt old files that he didn’t download earlier.

Motivation

slide-26
SLIDE 26

26

Employee Termination: Employee’s key is revoked. Standard guarantee: he can’t access files added in the future. Problem: He hacks into server and uses old key to decrypt old files that he didn’t download earlier.

Motivation

Serious problem: balance between strict security and ease of use: Necessitates broader access policies, with countermeasures against misuse of privilege. Preventing access to old files, even if they match

  • ld access policy, is important security concern.
slide-27
SLIDE 27

27

Motivation

What security property do we need?

slide-28
SLIDE 28

28

Motivation

What security property do we need?

After termination, employee should not be able to access anything he doesn’t already have.

slide-29
SLIDE 29

29

Motivation

What security property do we need?

After termination, employee should not be able to access anything he doesn’t already have. This breaks down into two guarantees.

slide-30
SLIDE 30

30

Two Security Guarantees

  • 1. Files encrypted in the past.
slide-31
SLIDE 31

31

Two Security Guarantees

  • 1. Files encrypted in the past.

Looked at only to a limited extent in the past for How can we protect old files that the employee could access with his old key in the past?

slide-32
SLIDE 32

32

Two Security Guarantees

  • 1. Files encrypted in the past.

Looked at only to a limited extent in the past for How can we protect old files that the employee could access with his old key in the past? First time considered to the best of our knowledge

slide-33
SLIDE 33

33

Two Security Guarantees

  • 1. Files encrypted in the past.

Looked at only to a limited extent in the past for How can we protect old files that the employee could access with his old key in the past? First time considered to the best of our knowledge

  • 2. Files added to system in future
slide-34
SLIDE 34

34

Two Security Guarantees

  • 1. Files encrypted in the past.

Looked at only to a limited extent in the past for How can we protect old files that the employee could access with his old key in the past? First time considered to the best of our knowledge

  • 2. Files added to system in future
slide-35
SLIDE 35

35

Two Security Guarantees

  • 1. Files encrypted in the past.

Looked at only to a limited extent in the past for How can we protect old files that the employee could access with his old key in the past? First time considered to the best of our knowledge

  • 2. Files added to system in future

IBE/ABE [Boldyreva-Goyal-Kumar’08] Only weak notions of security achieved.

slide-36
SLIDE 36

36

Two Security Guarantees

  • 1. Files encrypted in the past.

Looked at only to a limited extent in the past for How can we protect old files that the employee could access with his old key in the past? First time considered to the best of our knowledge

  • 2. Files added to system in future

IBE/ABE [Boldyreva-Goyal-Kumar’08] Only weak notions of security achieved. Main Result: First ABE scheme to address both of these problems simultaneously.

slide-37
SLIDE 37

37

  • Assume we have security for new files:

can only be decrypted by users with secret key for time ≥t.

  • How can we get security for old files?

Two Security Guarantees

(e.g., user with credential for time t+2 can decrypt)

slide-38
SLIDE 38

38

Decrypting and Re-encrypting: Every night, re-encrypt all files on server

Solution ideas

slide-39
SLIDE 39

39

Decrypting and Re-encrypting: Every night, re-encrypt all files on server

Solution ideas

slide-40
SLIDE 40

40

Decrypting and Re-encrypting: Every night, re-encrypt all files on server

Solution ideas

Decrypt and re-encrypt for time t+1

slide-41
SLIDE 41

41

Decrypting and Re-encrypting: Every night, re-encrypt all files on server

Solution ideas

Decrypt and re-encrypt for time t+1 Problem: Maintenance requires master secret key. We do not want to trust the server with this.

slide-42
SLIDE 42

42

Decrypting and Re-encrypting: Every night, re-encrypt all files on server

Solution ideas

Decrypt and re-encrypt for time t+1 Problem: Maintenance requires master secret key. We do not want to trust the server with this.

slide-43
SLIDE 43

43

Overwrite Encryption: Every night, re-encrypt all ciphertexts on server

Solution ideas

slide-44
SLIDE 44

44

Overwrite Encryption: Every night, re-encrypt all ciphertexts on server

Solution ideas

Encrypt the ciphertext at time t+1

slide-45
SLIDE 45

45

Overwrite Encryption: Every night, re-encrypt all ciphertexts on server

Solution ideas

Encrypt the ciphertext at time t+1 Problem: Overhead grows every night

slide-46
SLIDE 46

46

Overwrite Encryption: Every night, re-encrypt all ciphertexts on server

Solution ideas

Encrypt the ciphertext at time t+1 Problem: Overhead grows every night

slide-47
SLIDE 47

47

Overwrite Encryption: Every night, re-encrypt all ciphertexts on server

Solution ideas

Encrypt the ciphertext at time t+1 Problem: Overhead grows every night

slide-48
SLIDE 48

48

Overwrite Encryption: Every night, re-encrypt all ciphertexts on server

Solution ideas

Encrypt the ciphertext at time t+1 Problem: Overhead grows every night We ask: Can we allow server to “refresh” the encryption without needing any secret keys, and without growing the ciphertext?

slide-49
SLIDE 49

49

Our Approach

Directly Refreshing Ciphertext: Increment the time component using public data

slide-50
SLIDE 50

50

Our Approach

We say such a scheme has Revocable Storage Directly Refreshing Ciphertext: Increment the time component using public data

slide-51
SLIDE 51

51

Our Approach

We say such a scheme has Revocable Storage Directly Refreshing Ciphertext: Increment the time component using public data

slide-52
SLIDE 52

52

Our Approach

We say such a scheme has Revocable Storage Ciphertext update Directly Refreshing Ciphertext: Increment the time component using public data

slide-53
SLIDE 53

53

Our Approach

We say such a scheme has Revocable Storage Ciphertext update Directly Refreshing Ciphertext: Increment the time component using public data Note: new ciphertext is more restrictive than old ciphertext, so security is maintained.

slide-54
SLIDE 54

54

Our Approach

We say such a scheme has Revocable Storage Ciphertext update Directly Refreshing Ciphertext: Increment the time component using public data Note: new ciphertext is more restrictive than old ciphertext, so security is maintained.

slide-55
SLIDE 55

More generally, for standard ABE:

Our Approach

55

slide-56
SLIDE 56

More generally, for standard ABE: We call this problem Ciphertext Delegation. where P’ is a more restrictive policy than P.

Our Approach

56

slide-57
SLIDE 57

More generally, for standard ABE: We call this problem Ciphertext Delegation. where P’ is a more restrictive policy than P.

Our Approach

57

slide-58
SLIDE 58

An example of ciphertext delegation in ABE [BSW07]:

Delegation

58

Key Generation.

slide-59
SLIDE 59

An example of ciphertext delegation in ABE [BSW07]:

Delegation

59

Key Generation.

slide-60
SLIDE 60

An example of ciphertext delegation in ABE [BSW07]:

Delegation

60

Key Generation.

slide-61
SLIDE 61

An example of ciphertext delegation in ABE [BSW07]:

Delegation

61

Key Generation. (Only used in decryption)

slide-62
SLIDE 62

Encryption.

Delegation

62

Take the ciphertext policy: “Has `top secret (ts.)’ and `accounting (ac.)’ attributes”

slide-63
SLIDE 63

Delegation

63

Can we delegate this to the policy: “Has attributes `top secret (ts.)’ and `accounting (ac.)’ and `director (dir.)’ ” We are given the ciphertext: where: and the public key:

slide-64
SLIDE 64

Delegation

64

Generate: Why is this a good ciphertext? Plus: Use re-randomization to prevent subtle attacks.

slide-65
SLIDE 65

Types of Delegation

65

We show most current ABE schemes support a variety of efficient ciphertext delegation ops:

  • Increasing node thresholds
  • Increasing node thresholds and adding

nodes

  • Deleting subtrees

We also conduct survey of delegation

  • perations on LSSS matrix based schemes

[GPSW06, Waters11, LOSTW10].

slide-66
SLIDE 66

66

Conclusion

  • 1. We define ciphertext delegation and give a number
  • f efficient methods for ciphertext delegation.
  • 2. We use ciphertext delegation to solve the problem
  • f revocable storage.
  • 3. We also construct fully secure ABE schemes that

achieve revocation security vs. future encryptions.

  • 4. We show how to combine these elements to

achieve the first fully secure ABE schemes for dynamic credentials.