Open AccessPosted Content
Fuzzy Identity Based Encryption.
Amit Sahai,Brent Waters +1 more
Reads0
Chats0
TLDR
In this paper, a new type of identity-based encryption called Fuzzy Identity-Based Encryption (IBE) was introduced, where an identity is viewed as set of descriptive attributes, and a private key for an identity can decrypt a ciphertext encrypted with an identity if and only if the identities are close to each other as measured by the set overlap distance metric.Abstract:
We introduce a new type of Identity-Based Encryption (IBE) scheme that we call Fuzzy Identity-Based Encryption. In Fuzzy IBE we view an identity as set of descriptive attributes. A Fuzzy IBE scheme allows for a private key for an identity, ω, to decrypt a ciphertext encrypted with an identity, ω ′, if and only if the identities ω and ω ′ are close to each other as measured by the “set overlap” distance metric. A Fuzzy IBE scheme can be applied to enable encryption using biometric inputs as identities; the error-tolerance property of a Fuzzy IBE scheme is precisely what allows for the use of biometric identities, which inherently will have some noise each time they are sampled. Additionally, we show that Fuzzy-IBE can be used for a type of application that we term “attribute-based encryption”.
In this paper we present two constructions of Fuzzy IBE schemes. Our constructions can be viewed as an Identity-Based Encryption of a message under several attributes that compose a (fuzzy) identity. Our IBE schemes are both error-tolerant and secure against collusion attacks. Additionally, our basic construction does not use random oracles. We prove the security of our schemes under the Selective-ID security model.read more
Citations
More filters
Journal ArticleDOI
An efficient and outsourcing-supported attribute-based access control scheme for edge-enabled smart healthcare
TL;DR: An efficient ABE scheme is proposed that outsources part of the encryption and decryption to the edge nodes as well as supports attribute updates, enabling flexible right control, and experimental results demonstrate that the scheme is more efficient for resource-constrained devices than the traditional ABE.
Journal ArticleDOI
Wildcarded Identity-Based Encryption
Michel Abdalla,James Birkett,Dario Catalano,Alexander W. Dent,John Malone-Lee,Gregory Neven,Jacob C. N. Schuldt,Nigel P. Smart +7 more
TL;DR: A new primitive called identity-based encryption with wildcards, or WIBE for short, is introduced that allows a sender to encrypt messages to a whole range of receivers whose identities match a certain pattern.
Posted Content
Better Security for Functional Encryption for Inner Product Evaluations.
TL;DR: In this paper, the authors analyze the different security notions for functional encryption for inner product evaluation and propose a new generic construction that achieves security against adaptive adversaries based on the ElGamal encryption (plain DDH assumption), Paillier/BCP encryption (DCR assumption), and Regev encryption (LWE assumption).
Proceedings ArticleDOI
A Framework of Multi-Authority Attribute-Based Encryption with Outsourcing and Revocation
TL;DR: This paper proposes a framework for constructing multi-authority ABE schemes with attribute revocation and outsourced decryption, from any pairing-based single-authorities ABE scheme which satisfies a set of properties the authors identified.
Journal ArticleDOI
Preserving Privacy in Mobile Health Systems Using Non-Interactive Zero-Knowledge Proof and Blockchain
Antonio Emerson Barros Tomaz,José Cláudio do Nascimento,Abdelhakim Hafid,José Neuman de Souza +3 more
TL;DR: A scheme in which the health data transmitted, stored, or shared are protected by Attribute-Based Encryption is presented, which is a system with fine-grained access control, entirely managed by the patient, and an end-to-end privacy guarantee.
References
More filters
Journal ArticleDOI
How to share a secret
TL;DR: This technique enables the construction of robust key management schemes for cryptographic systems that can function securely and reliably even when misfortunes destroy half the pieces and security breaches expose all but one of the remaining pieces.
Book ChapterDOI
Identity-based cryptosystems and signature schemes
TL;DR: In this article, the authors introduce a novel type of cryptographic scheme, which enables any pair of users to communicate securely and to verify each other's signatures without exchanging private or public keys, without keeping key directories, and without using the services of a third party.
Journal ArticleDOI
Identity-Based Encryption from the Weil Pairing
Dan Boneh,Matthew K. Franklin +1 more
TL;DR: This work proposes a fully functional identity-based encryption (IBE) scheme based on bilinear maps between groups and gives precise definitions for secure IBE schemes and gives several applications for such systems.
Book ChapterDOI
Efficient identity-based encryption without random oracles
TL;DR: This work first presents their IBE construction and reduces the security of the scheme to the decisional Bilinear Diffie-Hellman (BDH) problem, and shows that their techniques can be used to build a new signature scheme that is secure under the computational Diffie -Hellman assumption without random oracles.
Book ChapterDOI
Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles
Dan Boneh,Xavier Boyen +1 more
TL;DR: The first secure IBE scheme without random oracles was presented in this article, where the adversary must commit ahead of time to the identity that it intends to attack, whereas in the standard model the adversary is allowed to choose this identity adaptively.