two secure anonymous proxy based
play

Two Secure Anonymous Proxy-based Data Storages * Olivier Blazy 1 - PowerPoint PPT Presentation

Two Secure Anonymous Proxy-based Data Storages * Olivier Blazy 1 Xavier Bultel 2 Pascal Lafourcade 2 Universit de Limoges, Xlim, Limoges, France Clermont Universit Auvergne, LIMOS, Clermont-Ferrand, France July 29, 2016 SECRYPT 2016, Lisbon


  1. Two Secure Anonymous Proxy-based Data Storages * Olivier Blazy 1 Xavier Bultel 2 Pascal Lafourcade 2 Université de Limoges, Xlim, Limoges, France Clermont Université Auvergne, LIMOS, Clermont-Ferrand, France July 29, 2016 SECRYPT 2016, Lisbon * This research was conducted with the support of the “Digital Trust” Chair from the University of Auvergne Foundation. Olivier Blazy, Xavier Bultel , Pascal Lafourcade (Université de Limoges, Xlim, Limoges, France, Clermont Université Auvergne, LIMOS, Cler Two Secure Anonymous Proxy-based Data Storages July 29, 2016 1 / 20

  2. Proxy Re-Encryption (PRE) Alice ( pk a , sk a ) Bob ( pk b , sk b ) Proxy Olivier Blazy, Xavier Bultel , Pascal Lafourcade (Université de Limoges, Xlim, Limoges, France, Clermont Université Auvergne, LIMOS, Cler Two Secure Anonymous Proxy-based Data Storages July 29, 2016 2 / 20

  3. Proxy Re-Encryption (PRE) Alice ( pk a , sk a ) Bob ( pk b , sk b ) re-key rk b → a Proxy Olivier Blazy, Xavier Bultel , Pascal Lafourcade (Université de Limoges, Xlim, Limoges, France, Clermont Université Auvergne, LIMOS, Cler Two Secure Anonymous Proxy-based Data Storages July 29, 2016 2 / 20

  4. Proxy Re-Encryption (PRE) Alice ( pk a , sk a ) ( rk b → a ) Bob Offline Proxy Olivier Blazy, Xavier Bultel , Pascal Lafourcade (Université de Limoges, Xlim, Limoges, France, Clermont Université Auvergne, LIMOS, Cler Two Secure Anonymous Proxy-based Data Storages July 29, 2016 2 / 20

  5. Proxy Re-Encryption (PRE) Alice ( pk a , sk a ) ( rk b → a ) Bob Offline c Proxy c = E pk b ( m ) Olivier Blazy, Xavier Bultel , Pascal Lafourcade (Université de Limoges, Xlim, Limoges, France, Clermont Université Auvergne, LIMOS, Cler Two Secure Anonymous Proxy-based Data Storages July 29, 2016 2 / 20

  6. Proxy Re-Encryption (PRE) Alice ( pk a , sk a ) ( rk b → a ) Bob Offline c Proxy c ′ c ′ = RE rk b → a ( c ) c = E pk b ( m ) = E pk a ( m ) Olivier Blazy, Xavier Bultel , Pascal Lafourcade (Université de Limoges, Xlim, Limoges, France, Clermont Université Auvergne, LIMOS, Cler Two Secure Anonymous Proxy-based Data Storages July 29, 2016 2 / 20

  7. Proxy Re-Encryption (PRE) Alice ( pk a , sk a ) ( rk b → a ) Bob Offline c Proxy c ′ c ′ = RE rk b → a ( c ) c = E pk b ( m ) m = D sk a ( c ′ ) = E pk a ( m ) Olivier Blazy, Xavier Bultel , Pascal Lafourcade (Université de Limoges, Xlim, Limoges, France, Clermont Université Auvergne, LIMOS, Cler Two Secure Anonymous Proxy-based Data Storages July 29, 2016 2 / 20

  8. Proxy Re-Encryption (PRE) Alice ( pk a , sk a ) ( rk b → a ) Bob Offline c Proxy c ′ c ′ = RE rk b → a ( c ) c = E pk b ( m ) m = D sk a ( c ′ ) = E pk a ( m ) P learns nothing about m (IND-CPA). Olivier Blazy, Xavier Bultel , Pascal Lafourcade (Université de Limoges, Xlim, Limoges, France, Clermont Université Auvergne, LIMOS, Cler Two Secure Anonymous Proxy-based Data Storages July 29, 2016 2 / 20

  9. PRE History Blaze et al. (1998) First definition of PRE. Ivan et al. (2003) Formal treatment. Ateniese et al. (2006) Unidirectional PRE. Canetti et al. (2007) CCA security. Libert et al. (2007) Unidirectional + CCA. Olivier Blazy, Xavier Bultel , Pascal Lafourcade (Université de Limoges, Xlim, Limoges, France, Clermont Université Auvergne, LIMOS, Cler Two Secure Anonymous Proxy-based Data Storages July 29, 2016 3 / 20

  10. PRE History Blaze et al. (1998) First definition of PRE. Ivan et al. (2003) Formal treatment. Ateniese et al. (2006) Unidirectional PRE. New application: encrypted storage management . Canetti et al. (2007) CCA security. Libert et al. (2007) Unidirectional + CCA. Olivier Blazy, Xavier Bultel , Pascal Lafourcade (Université de Limoges, Xlim, Limoges, France, Clermont Université Auvergne, LIMOS, Cler Two Secure Anonymous Proxy-based Data Storages July 29, 2016 3 / 20

  11. PRE based storage Owner ( pk o , sk o ) User ( pk u , sk u ) Encrypted Proxy storage Olivier Blazy, Xavier Bultel , Pascal Lafourcade (Université de Limoges, Xlim, Limoges, France, Clermont Université Auvergne, LIMOS, Cler Two Secure Anonymous Proxy-based Data Storages July 29, 2016 4 / 20

  12. PRE based storage Owner ( pk o , sk o ) re-key rk o → u User ( pk u , sk u ) Encrypted Proxy storage Olivier Blazy, Xavier Bultel , Pascal Lafourcade (Université de Limoges, Xlim, Limoges, France, Clermont Université Auvergne, LIMOS, Cler Two Secure Anonymous Proxy-based Data Storages July 29, 2016 4 / 20

  13. PRE based storage Owner Offline User ( pk u , sk u ) rk o → u Encrypted Proxy storage Olivier Blazy, Xavier Bultel , Pascal Lafourcade (Université de Limoges, Xlim, Limoges, France, Clermont Université Auvergne, LIMOS, Cler Two Secure Anonymous Proxy-based Data Storages July 29, 2016 4 / 20

  14. PRE based storage Owner Offline User ( pk u , sk u ) rk o → u Encrypted file c ? file c ? Proxy storage Check user rights Olivier Blazy, Xavier Bultel , Pascal Lafourcade (Université de Limoges, Xlim, Limoges, France, Clermont Université Auvergne, LIMOS, Cler Two Secure Anonymous Proxy-based Data Storages July 29, 2016 4 / 20

  15. PRE based storage Owner Offline User ( pk u , sk u ) rk o → u c ′ = E pk u ( m ) c = E pk o ( m ) Encrypted Proxy storage c ′ = RE rk o → u ( c ) m = D sk u ( c ′ ) Olivier Blazy, Xavier Bultel , Pascal Lafourcade (Université de Limoges, Xlim, Limoges, France, Clermont Université Auvergne, LIMOS, Cler Two Secure Anonymous Proxy-based Data Storages July 29, 2016 4 / 20

  16. PRE based storage Semi-trust proxy: -No info about m Owner Offline - P knows U id. - P knows U rights - P knows c User ( pk u , sk u ) rk o → u c ′ = E pk u ( m ) c = E pk o ( m ) Encrypted Proxy storage c ′ = RE rk o → u ( c ) m = D sk u ( c ′ ) Olivier Blazy, Xavier Bultel , Pascal Lafourcade (Université de Limoges, Xlim, Limoges, France, Clermont Université Auvergne, LIMOS, Cler Two Secure Anonymous Proxy-based Data Storages July 29, 2016 4 / 20

  17. PRE based storage Semi-trust proxy: -No info about m Owner Offline - P knows U id. - P knows U rights - P knows c Goal: more privacy! User ( pk u , sk u ) rk o → u c ′ = E pk u ( m ) c = E pk o ( m ) Encrypted Proxy storage c ′ = RE rk o → u ( c ) m = D sk u ( c ′ ) Olivier Blazy, Xavier Bultel , Pascal Lafourcade (Université de Limoges, Xlim, Limoges, France, Clermont Université Auvergne, LIMOS, Cler Two Secure Anonymous Proxy-based Data Storages July 29, 2016 4 / 20

  18. PRE & anonymity? Ateniese et al. (2009) Anonymous re-encryption key. Shao et al. (2012) Anonymity for recipient message. Zheng et al. (2014) Anonymous re-encryption key + CCA. Olivier Blazy, Xavier Bultel , Pascal Lafourcade (Université de Limoges, Xlim, Limoges, France, Clermont Université Auvergne, LIMOS, Cler Two Secure Anonymous Proxy-based Data Storages July 29, 2016 5 / 20

  19. PRE & anonymity? Ateniese et al. (2009) Anonymous re-encryption key. Shao et al. (2012) Anonymity for recipient message. Zheng et al. (2014) Anonymous re-encryption key + CCA. → Only partial anonymity. Olivier Blazy, Xavier Bultel , Pascal Lafourcade (Université de Limoges, Xlim, Limoges, France, Clermont Université Auvergne, LIMOS, Cler Two Secure Anonymous Proxy-based Data Storages July 29, 2016 5 / 20

  20. Our idea Owner ( pkg i , skg i ) User Encrypted Proxy storage member of the group i Olivier Blazy, Xavier Bultel , Pascal Lafourcade (Université de Limoges, Xlim, Limoges, France, Clermont Université Auvergne, LIMOS, Cler Two Secure Anonymous Proxy-based Data Storages July 29, 2016 6 / 20

  21. Our idea Owner ( pkg i , skg i ) Member key MSK i proxy key K User Encrypted Proxy storage member of the group i Olivier Blazy, Xavier Bultel , Pascal Lafourcade (Université de Limoges, Xlim, Limoges, France, Clermont Université Auvergne, LIMOS, Cler Two Secure Anonymous Proxy-based Data Storages July 29, 2016 6 / 20

  22. Our idea Owner Offline User ( MSK i ) K Encrypted Proxy storage Olivier Blazy, Xavier Bultel , Pascal Lafourcade (Université de Limoges, Xlim, Limoges, France, Clermont Université Auvergne, LIMOS, Cler Two Secure Anonymous Proxy-based Data Storages July 29, 2016 6 / 20

  23. Our idea Owner Offline User ( MSK i ) K Encrypted file c ? Proxy storage Olivier Blazy, Xavier Bultel , Pascal Lafourcade (Université de Limoges, Xlim, Limoges, France, Clermont Université Auvergne, LIMOS, Cler Two Secure Anonymous Proxy-based Data Storages July 29, 2016 6 / 20

  24. Our idea Owner Offline User ( MSK i ) K c = E pkg i ( m ) Encrypted Proxy storage Olivier Blazy, Xavier Bultel , Pascal Lafourcade (Université de Limoges, Xlim, Limoges, France, Clermont Université Auvergne, LIMOS, Cler Two Secure Anonymous Proxy-based Data Storages July 29, 2016 6 / 20

  25. Our idea Owner Offline User ( MSK i ) K c = E pkg i ( m ) Encrypted Proxy storage User knows MSK i and c Olivier Blazy, Xavier Bultel , Pascal Lafourcade (Université de Limoges, Xlim, Limoges, France, Clermont Université Auvergne, LIMOS, Cler Two Secure Anonymous Proxy-based Data Storages July 29, 2016 6 / 20

  26. Our idea Owner Offline User ( MSK i ) K Encrypted Proxy storage Randomization with r MSK ′ i and c ′ Olivier Blazy, Xavier Bultel , Pascal Lafourcade (Université de Limoges, Xlim, Limoges, France, Clermont Université Auvergne, LIMOS, Cler Two Secure Anonymous Proxy-based Data Storages July 29, 2016 6 / 20

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend