Online/offline public-index predicate encryption for fine-grained mobile access control

Conference Paper (2016)
Author(s)

Weiran Liu (Beihang University, Xidian University)

Jianwei Liu (Beihang University)

Qianhong Wu (State Key Laboratory of Cryptology, Chinese Academy of Sciences, Beihang University)

Bo Qin (Renmin University of China)

Kaitai Liang (Aalto University)

Affiliation
External organisation
DOI related publication
https://doi.org/10.1007/978-3-319-45741-3_30 Final published version
More Info
expand_more
Publication Year
2016
Language
English
Affiliation
External organisation
Pages (from-to)
588-605
Publisher
Springer
ISBN (print)
9783319457406
Event
21st European Symposium on Research in Computer Security, ESORICS 2016 (2016-09-26 - 2016-09-30), Heraklion, Greece
Downloads counter
202

Abstract

Public-Index Predicate Encryption (PIPE) allows users to encrypt according to boolean predicates defined on arbitrary attributes. The expensive algebraic operations are the major efficiency obstacle for PIPE to be applied to mobile clouds. This paper proposes a general Online/Offline PIPE (OO-PIPE) framework to address this issue. First, we propose a generic transformation from a Large Universe PIPE (LUPIPE) secure against chosen plaintext attack (CPA) to OO-PIPE in the same security model. The challenge is to generate ciphertext without the knowledge of the associated ciphertext attributes in the offline phase. We address the challenge by identifying an interesting attribute-malleability property in many LU-PIPE schemes. The property allows an encryptor to efficiently malleate a ciphertext associated with one ciphertext attribute to any assigned ciphertext attribute. Second, we design a generic transformation from CPA-secure LU-PIPE to OO-PIPE secure against adaptively chosen ciphertext attack (CCA2), assuming the underlying LUPIPE has attribute-malleability and public-verifiability properties. The main obstacle here is that the online/offline mechanism endogenously implies forgery in the sense that a pre-computed ciphertext must be able to be efficiently malleated to the resulting ciphertext associated with a different ciphertext attribute and a plaintext, while any efficient valid ciphertext forgery is forbidden in CCA2 security. We circumvent this obstacle by employing a universally collision resistant Chameleon hash, namely, only the original encryptor can malleate the ciphertext to associate with different attributes and provide a hash collision of the ciphertext components.