Rad HAZU, Matematičke znanosti, Vol. 25 (2021), 143-159.
FORMAL LANGUAGE IDENTITY-BASED CRYPTOGRAPHY
Ádám Vécsi and Attila Pethő
Department of Computer Science, University of Debrecen, Kassai str. 26, H-4028 Debrecen, Hungary
e-mail: vecsi.adam@inf.unideb.hu
e-mail: Petho.Attila@inf.unideb.hu
Abstract. The rapid growth of the digital economy makes finegrained
access control more and more challenging. One of the most impacted
areas is cloud computing, which for security purposes requires cryptographic
access control. Currently, the best solution for that is the use of
Attribute-based Cryptography, which allows the definition of access policies,
based on the attributes of entities. Unfortunately, this family of
schemes comes along with a significant drawback, specifically the required
user-side computation is growing with the growth of the complexity of the
access policy. We provide a concept, called Formal Language Identitybased
Cryptography, which gives a solution to this problem, making finegrained
cryptographic access control practical.
2020 Mathematics Subject Classification.
94A62, 68P25.
Key words and phrases. Identity-based Cryptography, Attribute-based Cryptography,
access control, proxy signature.
Full text (PDF) (free access)
DOI: https://doi.org/10.21857/y54jofkjdm
References:
- M. Abdalla, D. Catalano, A. W. Dent, J. Malone-Lee, G. Neven and N. P. Smart,
Identity-based encryption gone wild, in: Automata, Languages and Programming,
Lecture Notes in Comput. Sci. 4052, Springer, Berlin, 2006, pp. 300-311.
MathSciNet
CrossRef
- J. Bethencourt, A. Sahai, and B. Waters, Ciphertext-policy Attribute-based encryption,
in: 2007 IEEE Symposium on Security and Privacy (SP '07), IEEE, 2007.
CrossRef
- D. Boneh and M. K. Franklin, Identity-based encryption from the Weil pairing, in:
Advances in Cryptology - CRYPTO 2001, Lecture Notes in Comput. Sci. 2139,
Springer, Berlin, 2001, pp. 213-229.
MathSciNet
CrossRef
- F. Cai, N. Zhu, J. He, P. Mu, W. Li and Y. Yu, Survey of access control models and
technologies for cloud computing, Cluster Computing 22 (2018), 6111-6122.
CrossRef
- C. Delerablée, Identity-based broadcast encryption with constant size ciphertexts
and private keys, in: Advances in Cryptology – ASIACRYPT 2007, Lecture Notes in Comput. Sci. 4833,
Springer, Berlin, 2007, pp. 200–215.
MathSciNet
CrossRef
- Google Benchmark - A microbenchmark support library, 2019.
https://github.com/google/benchmark.
- V. Goyal, O. Pandey, A. Sahai and B. Waters, Attribute-based encryption for fine-grained
access control of encrypted data, in: Proceedings of the 13th ACM conference
on Computer and communications security - CCS '06, ACM Press, 2006.
CrossRef
- F. Hess, Efficient identity based signature schemes based on pairings,
in: Selected Areas in Cryptography, Lecture Notes in Comput. Sci. 2595,
Springer, Berlin, 2003, pp. 310-324.
MathSciNet
CrossRef
- A. Huszti and N. Oláh, A simple authentication scheme for clouds, in: 2016 IEEE
Conference on Communications and Network Security (CNS), IEEE, 2016.
CrossRef
- A. Huszti and N. Oláh, Security analysis of a cloud authentication protocol using
applied pi calculus, International Journal of Internet Protocol Technology 12.1 (2019),
pp. 16-25.
CrossRef
- I. Indu, P. R. Anand, and V. Bhaskar, Identity and access management in cloud
environment: Mechanisms and challenges, Engineering Science and Technology, an
International Journal 21.4 (2018), 574-588.
CrossRef
- S. Kim, S. Park and D. Won, Proxy signatures, revisited, in: Information and Communications
Security, Lecture Notes in Comput. Sci. 1334, Springer, Berlin, 1997, pp. 223-232.
CrossRef
- M. Mambo, K. Usuda and E. Okamoto, Proxy signatures: Delegation of the power to
sign messages, IEICE Trans. Fundamentals, A 79.9 (1996), 1338-1354.
- T. Okamoto and K. Takashima, Fully secure unbounded inner-product and
Attribute-based encryption,
in: Advances in Cryptology - ASIACRYPT 2012, Lecture Notes in Comput. Sci. 7658,
Springer, Heidelberg, 2012, pp. 349-366.
MathSciNet
CrossRef
- R. Ostrovsky, A. Sahai and B. Waters, Attribute-based encryption with non-monotonic
access structures, in: Proceedings of the 14th ACM conference on Computer and
communications security - CCS '07, ACM Press, 2007.
CrossRef
- R. Pompon, Is the Cloud Safe? Part 2: Breach Highlights for the Past 3 Years,
Dec. 2019.
https://www.f5.com/labs/articles/threat-intelligence/is-the-cloud-safe--
part-2--breach-highlights-for-the-past-3-years.
- A. Sahai and B. Waters, Fuzzy Identity-based encryption, in:
Advances in Cryptology - EUROCRYPT 2005, Lecture Notes in Comput. Sci. 3494, Springer, Berlin, 2005, pp. 457-473.
MathSciNet
CrossRef
- R. Sakai and J. Furukawa, Identity-based broadcast encryption, IACR Cryptol. ePrint
Arch. 2007:217, 2007.
- A. Salomaa, Formal languages, Academic Press, New York, 1973.
MathSciNet
- A. Shamir, Identity-based cryptosystems and signature schemes,
in: Advances in Cryptology - CRYPTO 84, Lecture Notes in Comput. Sci. 196,
Springer, Berlin, 1985, pp. 47-53.
MathSciNet
CrossRef
- C. C. Tan, H. Wang, S. Zhong and Q. Li, IBE-Lite: A lightweight Identity-based
cryptography for body sensor networks, IEEE Transactions on Information Technology
in Biomedicine 13.6 (2009), 926-932.
CrossRef
- J. Tomida, Y. Kawahara and R. Nishimaki, Fast, compact, and expressive Attribute-based encryption,
in: Public-key cryptography - PKC 2020. Part I, Lecture Notes in Comput. Sci. 12110,
Springer, Cham, 2020, pp. 3-33.
MathSciNet
CrossRef
- Using MIKEY-SAKKE: Building secure multimedia services,
https://www.ncsc.gov.uk/whitepaper/using-mikey-sakke--building-securemultimedia-services.
- Á. Vécsi, A. Bagossy and A. Pethő, Cross-platform Identity-based cryptography using
WebAssembly, Infocommunications journal 11.4 (2019), pp. 31-38.
CrossRef
- L. Zhang, Y. Hu and Q. Wu, Adaptively secure identity-based broadcast encryption
with constant size private keys and ciphertexts from the subgroups, Math. Comput. Modelling 55 (2012), pp. 12-18.
MathSciNet
CrossRef
Rad HAZU Home Page