Designs, Codes and Cryptography

, Volume 79, Issue 1, pp 121–161 | Cite as

Self-updatable encryption with short public parameters and its extensions

Article

Abstract

Cloud storage is very popular since it has many advantages, but there is a new threat to cloud storage that was not considered before. Self-updatable encryption that updates a past ciphertext to a future ciphertext by using a public key is a new cryptographic primitive introduced by Lee et al. (in: Sako K, Sarkar P (eds) Advances in cryptology—ASIACRYPT 2013, 2013) to defeat this threat, in which an adversary who obtained a past private key can still decrypt a (previously unread) past ciphertext stored in cloud storage. Additionally, an SUE scheme can be combined with an attribute-based encryption (ABE) scheme to construct a powerful revocable-storage ABE (RS-ABE) scheme introduced by Sahai et al. (in: Safavi-Naini R, Canetti R (eds) Advances in cryptology—CRYPTO 2012, 2012) that provides the key revocation and ciphertext updating functionality for cloud storage. In this paper, we propose an efficient SUE scheme and its extended schemes. First, we propose an SUE scheme with short public parameters in prime-order bilinear groups and prove its security under a \(q\)-type assumption. Next, we extend our SUE scheme to a time-interval SUE (TI-SUE) scheme that supports a time interval in ciphertexts. Our TI-SUE scheme has short public parameters and it is also secure under the \(q\)-type assumption. Finally, we propose the first large universe RS-ABE scheme with short public parameters in prime-order bilinear groups and prove its security in the selective revocation list model under a \(q\)-type assumption.

Keywords

Public-key encryption Self-updatable encryption Ciphertext delegation Cloud storage Bilinear maps 

Mathematics Subject Classification

94A60 

Notes

Acknowledgments

This work was supported by Basic Science Research Program through NRF funded by the Ministry of Education (2013R1A1A2008394) and Mid-career Researcher Program through NRF grant funded by the MEST (2010-0029121).

References

  1. 1.
    Boldyreva A., Goyal V., Kumar V.: Identity-based encryption with efficient revocation. In: Ning P., Syverson P.F., Jha S. (eds.) ACM Conference on Computer and Communications Security, pp. 417–426. ACM, New York (2008).Google Scholar
  2. 2.
    Boneh D., Boyen X.: Efficient selective-ID secure identity-based encryption without random oracles. In: Cachin C., Camenisch J. (eds.) Advances in Cryptology—EUROCRYPT 2004. Lecture Notes in Computer Science, vol. 3027, pp. 223–238. Springer, Heidelberg (2004)Google Scholar
  3. 3.
    Boneh D., Franklin M.K.: Identity-based encryption from the weil pairing. In: Kilian J. (ed.) Advances in Cryptology—CRYPTO 2001. Lecture Notes in Computer Science, vol. 2139, pp. 213–229. Springer, Heidelberg (2001).Google Scholar
  4. 4.
    Boneh D., Waters B.: Conjunctive, subset, and range queries on encrypted data. In: Vadhan S.P. (ed.) Theory of Cryptography—TCC 2007. Lecture Notes in Computer Science, vol. 4392, pp. 535–554. Springer, Heidelberg (2007).Google Scholar
  5. 5.
    Boneh D., Boyen X., Goh E.J.: Hierarchical identity based encryption with constant size ciphertext. In: Cramer R. (ed.) Advances in Cryptology—EUROCRYPT 2005. Lecture Notes in Computer Science, vol. 3494, pp. 440–456. Springer, Heidelberg (2005).Google Scholar
  6. 6.
    Boneh D., Sahai A., Waters B.: Functional encryption: definitions and challenges. In: Ishai Y. (ed.) Theory of Cryptography—TCC 2011. Lecture Notes in Computer Science, vol. 6597, pp. 253–273. Springer, Heidelberg (2011).Google Scholar
  7. 7.
    Canetti R., Halevi S., Katz J.: A forward-secure public-key encryption scheme. In: Biham E. (ed.) Advances in Cryptology—EUROCRYPT 2003. Lecture Notes in Computer Science, vol. 2656, pp. 255–271. Springer, Heidelberg (2003).Google Scholar
  8. 8.
    Datta P., Dutta R., Mukhopadhyay S.: Fully secure self-updatable encryption in prime order bilinear groups. In: Chow S.S.M., Camenisch J., Hui L.C.K., Yiu S. (eds.) Information Security—ISC 2014. Lecture Notes in Computer Science, vol. 8783, pp. 1–18. Springer, Heildelberg (2014).Google Scholar
  9. 9.
    Dodis Y., Katz J., Xu S., Yung M.: Key-insulated public key cryptosystems. In: Knudsen L.R. (ed.) Advances in Cryptology—EUROCRYPT 2002. Lecture Notes in Computer Science, vol. 2332, pp. 65–82. Springer, Heidelberg (2002).Google Scholar
  10. 10.
    Dodis Y., Franklin M.K., Katz J., Miyaji A., Yung M.: Intrusion-resilient public-key encryption. In: Joye M. (ed.) Topics in Cryptology—CT-RSA 2003. Lecture Notes in Computer Science, vol. 2612, pp. 19–32. Springer, Heidelberg (2003).Google Scholar
  11. 11.
    Gentry C., Silverberg A.: Hierarchical id-based cryptography. In: Zheng Y. (ed.) Advances in Cryptology—ASIACRYPT 2002. Lecture Notes in Computer Science, vol. 2501, pp. 548–566. Springer, Heidelberg (2002).Google Scholar
  12. 12.
    Goyal V., Pandey O., Sahai A., Waters B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Juels A., Wright R.N., di Vimercati S.D.C. (eds.) ACM Conference on Computer and Communications Security, pp. 89–98. ACM, New York (2006).Google Scholar
  13. 13.
    Kasamatsu K., Matsuda T., Emura K., Attrapadung N., Hanaoka G., Imai H.: Time-specific encryption from forward-secure encryption. In: Visconti I., Prisco R.D. (eds.) Security and Cryptography for Networks—SCN 2012. Lecture Notes in Computer Science, vol. 7485, pp. 184–204. Springer, Heidelberg (2012).Google Scholar
  14. 14.
    Lee K., Choi S.G., Lee D.H., Park J.H., Yung M.: Self-updatable encryption: Time constrained access control with hidden attributes and better efficiency. In: Sako K., Sarkar P. (eds.) Advances in Cryptology—ASIACRYPT 2013. Lecture Notes in Computer Science, vol. 8269, pp. 235–254. Springer, Heidelberg (2013).Google Scholar
  15. 15.
    Lee K., Lee D.H., Park J.H.: Efficient revocable identity-based encryption via subset difference methods. Cryptology ePrint Archive, Report 2014/132 (2014). http://eprint.iacr.org/2014/132. Accessed 31 May 2014.
  16. 16.
    Lewko A.B., Sahai A., Waters B.: Revocation systems with very small private keys. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 273–285. IEEE Computer Society, Washington (2010).Google Scholar
  17. 17.
    Libert B., Vergnaud D.: Adaptive-ID secure revocable identity-based encryption. In: Fischlin M. (ed.) Topics in Cryptology—CT-RSA 2009. Lecture Notes in Computer Science, vol. 5473, pp. 1–15. Springer, Heidelberg (2009).Google Scholar
  18. 18.
    Naor D., Naor M., Lotspiech J.: Revocation and tracing schemes for stateless receivers. In: Kilian J. (ed.) Advances in Cryptology—CRYPTO 2001. Lecture Notes in Computer Science, vol. 2139, pp. 41–62. Springer, Heidelberg (2001).Google Scholar
  19. 19.
    Park S., Lee K., Lee D.H.: New constructions of revocable identity-based encryption from multilinear maps. Cryptology ePrint Archive, Report 2013/880 (2013). http://eprint.iacr.org/2013/880. Accessed 31 May 2014.
  20. 20.
    Paterson K.G., Quaglia E.A.: Time-specific encryption. In: Garay J.A., Prisco R.D. (eds.) Security and Cryptography for Networks—SCN 2010. Lecture Notes in Computer Science, vol. 6280, pp. 1–16. Springer, Heidelberg (2010).Google Scholar
  21. 21.
    Rivest R.L., Shamir A., Wagner D.A.: Time-lock puzzles and timed-release crypto. Technical Report MIT/LCS/TR-684 (1996).Google Scholar
  22. 22.
    Rouselakis Y., Waters B.: Practical constructions and new proof methods for large universe attribute-based encryption. In: Sadeghi A.R., Gligor V.D., Yung M. (eds.) ACM Conference on Computer and Communications Security, pp. 463–474, ACM, New York (2013).Google Scholar
  23. 23.
    Sahai A., Seyalioglu H., Waters B.: Dynamic credentials and ciphertext delegation for attribute-based encryption. In: Safavi-Naini R., Canetti R. (eds.) Advances in Cryptology—CRYPTO 2012. Lecture Notes in Computer Science, vol. 7417, pp. 199–217. Springer, Heidelberg (2012).Google Scholar
  24. 24.
    Seo J.H., Emura K.: Efficient delegation of key generation and revocation functionalities in identity-based encryption. In: Dawson E. (ed.) Topics in Cryptology—CT-RSA 2013. Lecture Notes in Computer Science, vol. 7779, pp. 343–358. Springer, Heidelberg (2013).Google Scholar
  25. 25.
    Seo J.H., Emura K.: Revocable identity-based encryption revisited: security model and construction. In: Kurosawa K., Hanaoka G. (eds.) PKC 2013. Lecture Notes in Computer Science, vol. 7778, pp. 216–234. Springer, Heidelberg (2013)Google Scholar
  26. 26.
    Waters B.: Efficient identity-based encryption without random oracles. In: Cramer R. (ed.) Advances in Cryptology—EUROCRYPT 2005. Lecture Notes in Computer Science, vol. 3494, pp. 114–127. Springer, Heidelberg (2005).Google Scholar
  27. 27.
    Waters B.: Dual system encryption: realizing fully secure IBE and HIBE under simple assumptions. In: Halevi S. (ed.) Advances in Cryptology—CRYPTO 2009. Lecture Notes in Computer Science, vol. 5677, pp. 619–636. Springer, Heidelberg (2009)Google Scholar
  28. 28.
    Waters B.: Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In: Catalano D., Fazio N., Gennaro R., Nicolosi A. (eds.) Public Key Cryptography—PKC 2011. Lecture Notes in Computer Science, vol. 6571, pp. 53–70. Springer, Heidelberg (2011).Google Scholar

Copyright information

© Springer Science+Business Media New York 2015

Authors and Affiliations

  1. 1.Korea UniversitySeoulKorea

Personalised recommendations