2 QApp, Skolkovo, Moscow 143025, Russia
3Bauman Moscow State Technical University, Moscow 105005, Russia
4 Moscow Institute of Physics and Technology, Dolgoprudny, Moscow Region 141700, Russia
11email: [email protected]; [email protected]; [email protected]; [email protected]
Advanced attribute-based protocol based on the modified secret sharing scheme
Abstract
We construct a new protocol for attribute-based encryption with the use of the modification of the standard secret sharing scheme. In the suggested modification of the secret sharing scheme, only one master key for each user is required that is achieved by linearly enlarging public parameters in the access formula. We then use this scheme for designing an attribute-based encryption protocol related to some access structure in terms of attributes. We demonstrate that the universe of possible attributes does not affect the resulting efficiency of the scheme. The security proofs for both constructions are provided.
Abstract
We construct a new protocol for attribute-based encryption with the use of the modification of the standard secret sharing scheme. In the suggested modification of the secret sharing scheme, only one master key for each user is required that is achieved by linearly enlarging public parameters in access formula. We then use this scheme for designing an attribute-based encryption protocol related to some access structure in terms of attributes. We demonstrate that the universe of possible attributes does not affect the resulting efficiency of the scheme. The security proofs for both constructions are provided.
Keywords:
secret sharing attribute-based encryption monotone access structuresKeywords:
Secret sharing Attribute-based encryption Monotone access structures1 Introduction
In the view of the significant increase in the amount of digital communications, the problem of efficient protection of data becomes crucial. An important task is to construct a secured protocol for controlled access to data. In standard protocols for solving this problem, which are mostly based on public-key cryptography, a secret key is required for access to whole encrypted data. A straightforward modifications of such protocols for providing partial access to data lead to a significant increase of the complexity since multiple encryptions of the same data are needed.
Attribute-based encryption (ABE) is a relatively new approach for solving the data access control problem [1, 2, 3]. In the ABE schemes, the access to the parts of an encrypted data is determined by a set of attributes, which are inherent to various participants. Thus, if attributes of a participant belonging to a particular subset of possible attributes, then he is able to obtain access to a corresponding particular part of the encrypted data. The ABE conception appears to be very promising in a framework of cloud technologies and distributed ledgers. Over the past decade, a number of modifications and improvements have been presented [1, 4, 5]. However, some of the proposed approaches still suffer from implementation complexity, which increases with the number of attributes.
We note that the concept of ABE has much in common with the secret sharing (SS) problem. However, one of the most common SS schemes [6] has a problem related to a large number of shares per trustee.
In this work, we propose an advanced ABE protocol with a sufficiently low computational complexity. One of the main techniques of our work is a modification of the standard SS scheme, which allows one to use a single key for generating the whole set of required shares. This modification is then used for the construction of the ABE protocol, which is independent to the size of the set of possible attributes.
The paper is organized as follows. In Sec. 2 we provide basic definitions. In Sec. 3 we briefly describe the standard construction of the general SS scheme. In Sec. 4 we present our modification of the SS scheme, which is then used for constructing the ABE protocol in Sec. 5. In Sec. 6 we estimate the required resources for encryption and decryption for the suggested protocol. We summarize our results and conclude in Sec. 7.
2 Preliminaries
Let us introduce basic definitions and notations.
Let , where is a random value and is a probability distribution, denote a sampling of from the distribution . Let , where is an algorithm, denote the output of processed on the input . Let , where is a set, denote an element , which is chosen uniformly at random from the set . Let and stand for and , correspondingly.
Now we define a pseudorandom function (PRF) family. Given the oracle , we denote as the execution of the oracle machine with an access to .
Definition 1 (pseudorandom function (PRF) family)
We define , where to be a function family. We define the advantage of an adversary against PRF as
where is a family of all functions from (). We define the PRF insecurity of a function family against time- adversaries as the maximum advantage of any classical adversary that runs in time :
Definition 2 (-PRF family game)
We say that an oracle is initialized with a function if , and denote it as . The following procedure is called -PRF family game
- Init:
-
Given , where , flip a fair coin . If then . Otherwise , where is a family of all functions from .
- Game:
-
Given a set of oracles , the challenge is to distinguish whether is initialized with functions from or from
We define the advantage of an adversary against -PRF as
We define the -PRF insecurity of a function family against time- adversaries as the maximum advantage of any classical adversary that runs in time :
Definition 3 (Decisional Diffie–Hellman (DDH) challenge [10, 11])
Consider a (multiplicative) cyclic group of the order with the generator . We define the advantage of an adversary against DDH as
(1) |
where are chosen randomly and independently from . We define the DDH insecurity of a group against time- adversaries as the maximum advantage of any classical adversary that runs in time :
Definition 4 (-DDH challenge)
Consider a (multiplicative) cyclic group of the order with the generator , and following two distibutions:
-
•
, where and are chosen randomly and independently from for ,
-
•
, where are chosen randomly and independently from for ,
We define the advantage of an adversary against -DDH as
(2) |
We define the DDH insecurity of a group against time- adversaries as the maximum advantage of any classical adversary that runs in time :
Definition 5
Let be a set. An access structure is a collection of non-empty subsets of , i.e., .
Definition 6
Given a set , a monotone access structure on is a collection of subsets such that
Definition 7
A Boolean function is called monotone, if , whenever for every .
Definition 8
Given an access structure , define a Boolean function on -bit strings, where each bit is indexed by an element from , such that iff .
One can look at the Boolean function as an indicator of the set . It is easy to check that the defined is a monotone Boolean function for a proper monotone access structure .
Definition 9
For a given set and a monotone access structure on , define to be the set of all Boolean formulae (expressions consisted of logical operations) on variables, such that for every formula the output of is true iff the true variables in correspond exactly to a set (here we assume that each Boolean variable in the formula is indexed with an element form ).
We note that , implies that and correspond to the same function . They may, however, represent entirely different formula to express this function.
Definition 10 (Random oracle [12])
Random oracle is an oracle (a theoretical black box) that responds to every unique query with a value chosen uniformly at random from its output domain. If a query is repeated, it responds the same way every time that query is submitted. We refer a set of independent Random Oracles, , as a family of Random Oracles.
3 Standard construction of the general SS scheme
We begin our consideration with a SS scheme, which is proposed by J. Benaloh and J. Leichter [6], that we refer to as a standard SS scheme. For this purpose we first introduce a definition of the secure generalized SS scheme. It is known that for certain access structures every secure generalized SS scheme must be able to assign multiple shares to each trustee (see Theorem 3.2 below). In this case, we use to denote the share given to trustee .
We define the scheme with the use of the following roles. We call the dealer, a user who shares a secret according to some access structure. The trustees are users among which the secret is shared. A party is a group of trustees. We denote the set of all trustees as .
Definition 11 (Secure generalized SS scheme)
Given a monotone access structure on a set of trusties and a set of possible secrets , a secure generalized SS scheme for is a method of dividing a secret into shares such that
-
•
for every , there is an algorithm for reconstructing the secret from the subset of shares ;
-
•
for every the subset of shares provides no information (in an information theoretic sense) about the value of .
In what is presented below, we define the secret domain , for some positive integer . We then are able to construct the secure generalized SS scheme.
It is known that every monotone function can represented with a formula consisted only of and operations (without NOT operation). It is then sufficient to demonstrate how to divide a secret “across” these two operators. We use to denote the appearance of variable in a formula . We refer it as -notation. For example, a formula transforms to
Let be a random function, which declares shares for each trustee for and a monotone formula , that is defined as follows (we assume that is represented in -notation):
-
•
assigns the share to trustee , such that ;
-
•
;
-
•
, where the are chosen uniformly from , such that .
It is then possible to show that for every monotone access structure , the SS scheme defined by satisfies the definition of a secure generalized SS scheme.
Theorem 3.1
Let be a monotone access structure on a set , such that it is represented in -notaition and contains only operators and , and let be a secret from . The SS scheme determined by is a secure generalized SS scheme for .
Finally, we note that it is shown in [6] that there are access structures, which cannot be realized without giving multiple (or extra large) shares to some trustee.
Theorem 3.2
There exist access structures for which any generalized SS scheme must give some trustee shares which are from a domain larger than that of the secret.
4 Advanced SS scheme
4.1 General idea
As it is noted in [6], that we are unable to realize most monotone access structures with a standard SS scheme. However, one can modify the structures that can be realized efficiently, such that each trustee holds only one secret value, which we refer as a master key. With the use of the master key, a trustee is able to calculate all required shares.
We define the scheme with the use of the roles as defined above.
Let us begin with an illustrative example. Assume that a dealer wants to share a secret between trustees Alice (), Bob (), Charlie (), and David () according to the following access formula:
(3) |
where is a Boolean variable that represents a trustee and appeared time in the formula. Let us introduce an address for each variable as its position in the formula as follows:
(4) |
Thus, , , , and so on.
To share a secret, the dealer first gives each trustee a value , which is chosen uniformly at random from some domain . Next we refer to as a master key belonging to a trustee .
Let us then assume that the dealer and trustees have access to independent random oracles family with an output domain in . In order to generate a share that corresponds to a variable , a trustee has to query the random oracle with . For example, the shares for the defined access formula are computed in this way:
(5) | |||
Since each random oracle is independent, every share is a random value from . As a result, a sum of shares, e.g. , is also a uniformly random variable from . To make it possible to reconstruct a secret by trustees and , we add a publicly known value to this bracket, such that .
Consequently, we modify our access formula into the following form:
(6) |
where are Boolean variables that correspond to fictitious trustees, whose shares are considered to be publicly known to every actual trustee. The value of is computed in such a way that a reconstruction of secret becomes possible. We note that is computed by the dealer, since he knows all the master keys.
Below we present our scheme in a more formal and efficient way.
4.2 Formal Construction
Let be a security parameter, be a PRF family, where and with . Here we chose with , but one can choose another domain. Note that , so we are able to sum the shares in . Let be a family of all functions . Let be the maximum size of monotone formula that we can use efficiently and let . Hereby the size of the monotone formula is the number of times that variables occur in the formula.
The roles for the scheme (dealer, trustees, and party) are defined in the previous subsection.
First, we define a modifying function , where is an access formula, whose size is less than and it is written in -notation, and . Let be a variable, which represents a trustee and it is appeared time in the formula. Let represents the position of the variable in . Let be the value of ’s master key. We denote as a variable that corresponds to a fictitious trustee and as the value of his share. We use as subformula. Since every formula can be written in the following form:
(7) |
where stands for either or .
Let is introduce a global counter , which is initialized with . There are three separate cases to look at:
-
•
,
where and , and the counter is incremented . -
•
, where , with at least one operator, for and .
-
•
.
Let us clarify that the address of a variable is the number of the position of that variable in the formula (conventionally, we count from left to right).
Now we can describe our advanced SS scheme. To share a secret the dealer should follow these steps:
-
1.
Choose a secret .
-
2.
Choose a master key for each trustee in the union uniformly at random from (for each ).
-
3.
Choose a monotone formula of size less or equal to , which represents an access structure.
-
4.
Evaluate .
-
5.
Publish , so that the values are available for everyone.
To reconstruct a secret a party should follow these steps:
-
1.
Each trustee in the party has to evaluate their shares:
. -
2.
Using the corresponding shares and public values , a verified party can calculate the secret according to the way it is shared.
Definition 12
Given a set and a monotone access structure on , an advanced SS scheme for is a method of dividing a secret into shares such that the following statements hold true:
-
•
When , the secret can be reconstructed from the shares and public values .
-
•
When , the secret can be reconstructed only with a negligible probability from the shares and public values .
4.3 Security proof
Here we introduce a notion of the security model that is used for our scheme, which is similar to the Selective-Id model [7, 8, 9].
Definition 13 (Selective-Id model for advanced SS scheme)
The following procedure is called Selective-Id model for advanced SS scheme.
- Init:
-
The adversary chooses an access structure with a corresponding formula and gives it to the challenger.
- Phase 1:
-
The adversary declares the set of trustees , which does not satisfy the formula and obtains master keys of trustees from from the challenger.
- Challenge:
-
The adversary submits two secrets and . The challenger flips a fair coin and shares the secret .
- Phase 2:
-
The challenger gives to the adversary and corresponding values .
- Guess:
-
The adversary outputs a guess of .
The advantage of an adversary in this game is defined as .
Theorem 4.1
Consider the advanced SS scheme for a set of parties based on PRF family with . The advantage in the Selective-Id model of any classical adversary that runs in time satisfies the inequality , where assuming that time needed for sampling no more than random variables is negligible, where is the maximum size of the formula which can be efficiently processed by the advanced SS scheme.
Proof
First of all, one can easily notice that the reconstruction of the secret happens the same way as in the standard SS scheme. We also note that if (i.e. does not satisfy the formula ), then does not satisfy the access structure defined by as .
Consider, a modification of the advanced SS scheme (modified advanced SS scheme), where PRF family is replaced with a set of random oracles. One can see that this scheme is exactly the standard SS scheme based on formula . So there is no chance for an adversary to compute the secret, which possesses the shares from .
Now suppose that there exists a probabilistic polynomial time adversary , which has an advantage in Selective-Id model for advanced SS scheme. Without loss of generality, we assume that it’s probability of guessing a correct value is . Then we show that it is possible to distinguish the PRF family from truly random function family with a probability at least . To show this we construct an oracle machine that has an advantage in -pseudorandom function family game (see Algorithm 1). Let us calculate the probabilities to obtain and ( is defined in Algorithm 1).
Suppose that the challenge is initialised with functions from the family . In this case, the situation for the adversary is completely the same as in the case of the (non-modified) advanced SS scheme. Therefore, the adversary correctly guesses the value with an advantage or what is the same with probability .
If the challenge is initialized with functions from the family , then the shares of the trustees from are chosen uniformly at random. And the situation is the same as in the standard SS scheme. Since does not satisfy the formula, it is required to obtain at least one more share to get the secret, but all the remaining shares are chosen uniformly at random. Therefore, according to the Theorem 3.1 the adversary has no information about the secret in this situation. Thus, in this case the adversary can only randomly guess the value , so is correctly guessed with a probability .
Let corresponds to the challenge initialized with functions from the family and to the challenge initialized with functions from the pseudorandom function family. Then the overall advantage in the -pseudorandom game is .
By the hybrid argument [13] we can distinguish a pseudorandom function family with probability . In order to apply the hybrid argument consider two distributions,
(8) |
and
(9) |
Define a sequence of hybrid distributions , where So we have . Let us remind that
(10) |
By the triangle inequality, it is clear that
Thus, there exists some , such that and
(11) |
Suppose that we have a sample or . Let us construct a distribution . If then is distributed the same as , otherwise it is distributed as . Thus, we can distinguish samples from and with probability .
Finally, we obtain: , where is a total time of running plus initialization of an appropriate hybrid. Neglegting the time needed for preparing data for and the hybrid we obtain .
5 Advanced ABE Scheme
5.1 Formal Construction
Consider a group of users, where each user posses a list of attributes. Let be a set of all existing attributes. Let us call a community a subgroup of users, who possess a particular attribute . In what follows, we refer to the community as a subgroup of users that possess an attribute . We note that a user can belong to several communities if he has more than one attribute.
Let be a security parameter, be a multiplicative group of a prime order , where in which DDH assumption is considered to be true, is a generator of that group, is a family of all functions , and is a PRF family. We construct the advanced ABE scheme based on the advanced SS scheme in the following form.
- Setup:
-
Each community in the universe generates their secret key and a correspong public key . Then the public key is shared among the whole group of users. So that the set of public keys is assumed to be known to every user in the group.
- Encryption :
-
To encrypt a message under public keys and formula , which represents some monotone access structure, one generates and computes the ciphertext in the following form , where come from the advanced SS scheme based on PRF family and the corresponding master keys are calculated as .
- Decryption :
-
, where is a set of all secret keys known to a concrete user and is a set of attributes he posseses. For each , a user calculates the master key . Then if satisfies the access structure, then the secret can be reconstructed using , and . The message is obtained from as .
5.2 Security proof
In order to provide a formal security analysis of the advanced ABE scheme, we introduce the following definition.
Definition 14 (Attribute-based Selective-Set model)
The following
procedure is called attribute-based Selective-Set model:
- Init:
-
The adversary chooses an access structure and a corresponding formula and sends to the challenger.
- Phase 1:
-
The adversary declares the set of communities , which does not satisfy the formula and obtains secret keys of communities from from the challenger.
- Challenge:
-
The adversary submits two secrets and . The challenger flips a fair coin and encrypts : .
- Phase 2:
-
The challenger gives to the adversary public keys of all communities and , which is a ciphertext of generated according to the advanced ABE scheme.
- Guess:
-
The adversary outputs a guess of .
The advantage of an adversary in this game is defined as .
Below we prove that the security of our scheme in the attribute-based Selective-Set model reduces to the hardness of the DDH challenge and pseudorandomness of the function family.
Theorem 5.1
Consider the advanced ABE scheme based on an PRF family and set of communities . The advantage in the the Attribute-based Selective-Set model game of any classical adversary that runs in time satisfies the following inequality: . With assuming that time required for sampling no more than random variables is negligible, where is the maximum size of the formula which can be efficiently processed by the advanced ABE scheme.
Proof
First, suppose that the master keys are replaced with uniformly random keys. In this case, let us denote the advantage in breaking the modified advanced ABE protocol in the attribute-based Selective-Set model as . If is not negligible, then we can construct a machine that breaks -DDH challenge with an advantage of at least .
We assume that , since we limit the value of by the pseudoradnomnes property and if is less than then we can limit them both.
Let us denote a -DDH challenge , where, and is a tuple either or . We use to denote the element of the tuple. To prove the theorem, consider the following algorithm.
If is sampled uniformly at random (), then the master keys are chosen uniformly at random. Hence the adversary has no information about the master keys he did not query. Remind that we denote the advantage of the adversary in this situation as . Otherwise the situation is the same as in the original ABE protocol. Thus, we have the overall advantage in the -DDH game as follows:
(12) |
where is a running time of Algorithm 2. Neglegting the time for preparing data for we obtain .
In analogy to the proof of Theorem 4.1, one can see that due to the hybrid argument
where neglegting the time, needed to prepare an appropriate hybrid.
Finally, we limit the value of . Due to the fact the master keys are chosen uniformly at random, the security of such a scheme reduces to the security of the advanced SS scheme straightforwardly. Therefore, according to Theorem 4.1: , with .
Thus, we arrive to the final result:
with .
6 Efficiency estimation for advanced ABE scheme
Here we analyze the efficiency of the proposed advanced ABE scheme in terms of sizes of ciphertext, public parameters, and private key, and the computation time for decryption and encryption.
Consider a ciphertext and a plaintext . We note that it is required to publish the rules of the access structure, hence we assume that the plaintext is accomplished by the formula . One can see that is no more than twice bigger than . This is due to the fact that the number of additional Boolean variables corresponded to fictitious trustees (communities) can not exceed the number of Boolean variables corresponded to the actual trustees (communities). We then note that and make a major contribution into the size of and . Hence, the overhead of the ciphertext compared to plaintext is of the size linear in the size of the formula .
The public parameters of the system are of size linear in the number of existing attributes. The private key of the community consists of a single value from .
The encryption procedure generates two random values, performs one addition in and one exponentiation in the group , calls to functions from , where denotes the size of the formula . The modification of the formula into is performed in the linear time with the usage of syntax tree.
Thus, the amount of the communities in the scheme is . The decryption procedure needs to perform at most exponentiations, sums and pseudorandom function calls, where is the size of formula . Finally, one subtraction is required.
7 Conclusion
Here we summarize the main results of our work. First, we have presented the modification of the SS scheme, which allows a user to store only one value to calculate the corresponding shares. Based on this modification, we have proposed the advanced ABE protocol. We have provided the security and efficiency analysis of the proposed scheme.
One of the most significant impacts of this paper is rejection of bilinear mappings, which evidently increases the efficiency of the proposed scheme and allows to dinamicaly add new attributes.
One can see that the proposed ABE scheme is not collusion resistant as well as some other ABE schemes (e.g. see [14]). We note, that all known collusion resistant schemes are based on using of trusted centers which are absent in our scheme.
There are several ways to improve the proposed scheme. The first one is based on adding new logical elements, e.g. threshold, so that the formula can be constructed more efficiently. The second question is related to modification of this protocol with respect to the use of other key exchange schemes.
Acknowledgments
This work is supported by Russian Foundation for Basic Research (18-37-20033). A.A.C. is supported by Russian Science Foundation (17-11-01377).
References
- [1] Goyal, V., Pandey, O., Sahai, A., Waters B.R.: Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data. In: Proceedings of the ACM Conference on Computer and Communications Security, pp. 89-98 (2006)
- [2] Boneh, D., Franklin, M.K.: Identity-based encryption from the Weil pairing. In: Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology, pp. 213–229 (2001)
- [3] Boneh, D., Gentry, C., Waters, B.: Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys. In: Advances in Cryptology - CRYPTO, Lecture Notes in Computer Science 3621, pp. 258-275 (2005)
- [4] Sahai, A., Waters, B.: Fuzzy Identity-Based Encryption. In: Advances in Cryptology – EUROCRYPT 2005, pp. 457-473 (2005)
- [5] Abdalla, M., Catalano, D., Dent, A.W., Malone-Lee, J., Neven, G., Smart, N.P.: Identity-based encryption gone wild. In: Bugliesi M., Preneel B., Sassone V., Wegener I, (eds) ICALP (2), Lecture Notes in Computer Science 4052, pp. 300-311 (2006)
- [6] Benaloh, J., Leichter J.: Generalized secret sharing and monotone functions. In: Goldwasser S. (ed.) Advances in Cryptology – CRYPTO ’88, Lecture Notes in Computer Science 403, pp. 27–35 (1990)
- [7] Canetti, R., Halevi, S., Katz, J.: A Forward-Secure Public-Key Encryption Scheme. In: Advances in Cryptology – Eurocrypt, Lecture Notes in Computer Science 2656, pp. 255-271 (2003)
- [8] Canetti, R., Halevi, S., Katz J.: Chosen Ciphertext Security from Identity Based Encryption. In: Advances in Cryptology – Eurocrypt, Lecture Notes in Computer Science 3027, pp. 207–222 (2004).
- [9] Boneh, D., Boyen X.: Efficient Selective-ID Secure Identity Based Encryption Without Random Oracles. In: Cachin C., Camenisch J.L. (eds) Advances in Cryptology - EUROCRYPT 2004. EUROCRYPT 2004. Lecture Notes in Computer Science, 3027. Springer, Berlin, Heidelberg, pp. 223-238 (2004)
- [10] Boneh, D.: The decision Diffie–Hellman problem. In: Proceedings of the Third Algorithmic Number Theory Symposium, Lecture Notes in Computer Science 1423, ed. J.P. Buhler. Springer-Verlag, Berlin, pp. 48–63 (1998)
- [11] Cramer, R., Damgård, I., Kiltz, E., Zakarias, S., Zottarel, A.: DDH-like Assumptions Based on Extension Rings. In: Public Key Cryptography – PKC 2012, Lecture Notes in Computer Science 7293, pp. 644-661 (2012)
- [12] Bellare, M., Rogaway, P.: Random oracles are practical: A paradigm for designing efficient protocols. In: ACM conference on Computer and Communications Security (ACM CCS), pp. 62-73 (1993)
- [13] Goldreich, O. Foundations of Cryptography: Cambridge University Press, Cambridge (2001).
- [14] Kapadia, Apu and Tsang, Patrick and Smith, Sean: Attribute-Based Publishing with Hidden Credentials and Hidden Policies. (2007)