Rad HAZU, Matematičke znanosti, Vol. 25 (2021), 143-159.

FORMAL LANGUAGE IDENTITY-BASED CRYPTOGRAPHY

Ádám Vécsi and Attila Pethő

Department of Computer Science, University of Debrecen, Kassai str. 26, H-4028 Debrecen, Hungary
e-mail: vecsi.adam@inf.unideb.hu
e-mail: Petho.Attila@inf.unideb.hu


Abstract.   The rapid growth of the digital economy makes finegrained access control more and more challenging. One of the most impacted areas is cloud computing, which for security purposes requires cryptographic access control. Currently, the best solution for that is the use of Attribute-based Cryptography, which allows the definition of access policies, based on the attributes of entities. Unfortunately, this family of schemes comes along with a significant drawback, specifically the required user-side computation is growing with the growth of the complexity of the access policy. We provide a concept, called Formal Language Identitybased Cryptography, which gives a solution to this problem, making finegrained cryptographic access control practical.

2020 Mathematics Subject Classification.   94A62, 68P25.

Key words and phrases.   Identity-based Cryptography, Attribute-based Cryptography, access control, proxy signature.


Full text (PDF) (free access)

DOI: https://doi.org/10.21857/y54jofkjdm


References:

  1. M. Abdalla, D. Catalano, A. W. Dent, J. Malone-Lee, G. Neven and N. P. Smart, Identity-based encryption gone wild, in: Automata, Languages and Programming, Lecture Notes in Comput. Sci. 4052, Springer, Berlin, 2006, pp. 300-311.
    MathSciNet     CrossRef

  2. J. Bethencourt, A. Sahai, and B. Waters, Ciphertext-policy Attribute-based encryption, in: 2007 IEEE Symposium on Security and Privacy (SP '07), IEEE, 2007.
    CrossRef

  3. D. Boneh and M. K. Franklin, Identity-based encryption from the Weil pairing, in: Advances in Cryptology - CRYPTO 2001, Lecture Notes in Comput. Sci. 2139, Springer, Berlin, 2001, pp. 213-229.
    MathSciNet     CrossRef

  4. F. Cai, N. Zhu, J. He, P. Mu, W. Li and Y. Yu, Survey of access control models and technologies for cloud computing, Cluster Computing 22 (2018), 6111-6122.
    CrossRef

  5. C. Delerablée, Identity-based broadcast encryption with constant size ciphertexts and private keys, in: Advances in Cryptology – ASIACRYPT 2007, Lecture Notes in Comput. Sci. 4833, Springer, Berlin, 2007, pp. 200–215.
    MathSciNet     CrossRef

  6. Google Benchmark - A microbenchmark support library, 2019.
    https://github.com/google/benchmark.

  7. V. Goyal, O. Pandey, A. Sahai and B. Waters, Attribute-based encryption for fine-grained access control of encrypted data, in: Proceedings of the 13th ACM conference on Computer and communications security - CCS '06, ACM Press, 2006.
    CrossRef

  8. F. Hess, Efficient identity based signature schemes based on pairings, in: Selected Areas in Cryptography, Lecture Notes in Comput. Sci. 2595, Springer, Berlin, 2003, pp. 310-324.
    MathSciNet     CrossRef

  9. A. Huszti and N. Oláh, A simple authentication scheme for clouds, in: 2016 IEEE Conference on Communications and Network Security (CNS), IEEE, 2016.
    CrossRef

  10. A. Huszti and N. Oláh, Security analysis of a cloud authentication protocol using applied pi calculus, International Journal of Internet Protocol Technology 12.1 (2019), pp. 16-25.
    CrossRef

  11. I. Indu, P. R. Anand, and V. Bhaskar, Identity and access management in cloud environment: Mechanisms and challenges, Engineering Science and Technology, an International Journal 21.4 (2018), 574-588.
    CrossRef

  12. S. Kim, S. Park and D. Won, Proxy signatures, revisited, in: Information and Communications Security, Lecture Notes in Comput. Sci. 1334, Springer, Berlin, 1997, pp. 223-232.
    CrossRef

  13. M. Mambo, K. Usuda and E. Okamoto, Proxy signatures: Delegation of the power to sign messages, IEICE Trans. Fundamentals, A 79.9 (1996), 1338-1354.

  14. T. Okamoto and K. Takashima, Fully secure unbounded inner-product and Attribute-based encryption, in: Advances in Cryptology - ASIACRYPT 2012, Lecture Notes in Comput. Sci. 7658, Springer, Heidelberg, 2012, pp. 349-366.
    MathSciNet     CrossRef

  15. R. Ostrovsky, A. Sahai and B. Waters, Attribute-based encryption with non-monotonic access structures, in: Proceedings of the 14th ACM conference on Computer and communications security - CCS '07, ACM Press, 2007.
    CrossRef

  16. R. Pompon, Is the Cloud Safe? Part 2: Breach Highlights for the Past 3 Years, Dec. 2019.
    https://www.f5.com/labs/articles/threat-intelligence/is-the-cloud-safe-- part-2--breach-highlights-for-the-past-3-years.

  17. A. Sahai and B. Waters, Fuzzy Identity-based encryption, in: Advances in Cryptology - EUROCRYPT 2005, Lecture Notes in Comput. Sci. 3494, Springer, Berlin, 2005, pp. 457-473.
    MathSciNet     CrossRef

  18. R. Sakai and J. Furukawa, Identity-based broadcast encryption, IACR Cryptol. ePrint Arch. 2007:217, 2007.

  19. A. Salomaa, Formal languages, Academic Press, New York, 1973.
    MathSciNet

  20. A. Shamir, Identity-based cryptosystems and signature schemes, in: Advances in Cryptology - CRYPTO 84, Lecture Notes in Comput. Sci. 196, Springer, Berlin, 1985, pp. 47-53.
    MathSciNet     CrossRef

  21. C. C. Tan, H. Wang, S. Zhong and Q. Li, IBE-Lite: A lightweight Identity-based cryptography for body sensor networks, IEEE Transactions on Information Technology in Biomedicine 13.6 (2009), 926-932.
    CrossRef

  22. J. Tomida, Y. Kawahara and R. Nishimaki, Fast, compact, and expressive Attribute-based encryption, in: Public-key cryptography - PKC 2020. Part I, Lecture Notes in Comput. Sci. 12110, Springer, Cham, 2020, pp. 3-33.
    MathSciNet     CrossRef

  23. Using MIKEY-SAKKE: Building secure multimedia services,
    https://www.ncsc.gov.uk/whitepaper/using-mikey-sakke--building-securemultimedia-services.

  24. Á. Vécsi, A. Bagossy and A. Pethő, Cross-platform Identity-based cryptography using WebAssembly, Infocommunications journal 11.4 (2019), pp. 31-38.
    CrossRef

  25. L. Zhang, Y. Hu and Q. Wu, Adaptively secure identity-based broadcast encryption with constant size private keys and ciphertexts from the subgroups, Math. Comput. Modelling 55 (2012), pp. 12-18.
    MathSciNet     CrossRef


Rad HAZU Home Page