Publications-Theses
Article View/Open
Publication Export
-
Google ScholarTM
NCCU Library
Citation Infomation
Related Publications in TAIR
題名 具有寬鬆黑盒追蹤性的子集謂詞加密
Subset predicate encryption with relaxed black-box traceability作者 楊之岑
Yang, Chih-Tsen貢獻者 曾一凡
楊之岑
Yang, Chih-Tsen關鍵詞 屬性加密
叛徒追蹤
子集謂詞加密
Attribute-Based Encryption
Traitor Tracing
Subset Predicate Encryption日期 2024 上傳時間 5-Aug-2024 12:46:14 (UTC+8) 摘要 在當今網路技術高度發達的時代,資料安全至關重要,對加密資料實現細粒度訪問控制是一項挑戰。基於屬性加密是常用的解決方案,然而隨著屬性的增多,此類方案中的訪問結構變得越來越複雜,在這種情況下,使用邏輯運算符如 “And” 或 “Or” 全面制定訪問策略變得困難,且在解密時需耗費龐大的計算成本,此外,隨著能夠訪問密文的用戶數量增加,惡意用戶可能會共謀做出盜版解碼器,並通過出售盜版解碼器以牟取暴利。為了解決這些問題,本篇論文提出了一種利用子集謂詞加密和寬鬆黑盒追踪的新方法,此方法不僅實現了細粒度訪問控制,還有效防止叛徒行為,一但叛徒出現,該方法能夠找出誰是叛徒。
In today's highly advanced network technology, data security is paramount, and achieving fine-grained access control for encrypted data is a challenge. Attribute-based encryption is a common solution, but as the number of attributes increases, the access structure in such schemes becomes more complex, making it difficult to fully formulate access policies using logical operators such as $And$ or $Or$. This complexity results in computationally expensive decryption processes. Additionally, as the number of users with access to ciphertext increases, the risk of malicious users colluding to create pirated decoders and profit from selling them also increases. To address these issues, this manuscript proposes a new approach that uses subset predicate encryption and relaxed black-box tracing. This approach not only implements fine-grained access control but also effectively prevents the emergence of traitors and identifies them if they appear.參考文獻 [BN08] Dan Boneh and Moni Naor. “Traitor tracing with constant size ciphertext”. In: Proceedings of the 15th ACM conference on Computer and communications security. 2008, pp. 501–510. [BSW07] John Bethencourt, Amit Sahai, and Brent Waters. “Ciphertext-policy attributebased encryption”. In: 2007 IEEE symposium on security and privacy (SP’07). IEEE. 2007, pp. 321–334. [BW06] Dan Boneh and Brent Waters. “A fully collusion resistant broadcast, trace,and revoke system”. In:Proceedings of the 13th ACM conference on Computer and communications security. 2006, pp. 211–220. [CFN94] Benny Chor, Amos Fiat, and Moni Naor. “Tracing traitors”. In: Advances in Cryptology—CRYPTO’94: 14th Annual International Cryptology Conference Santa Barbara, California, USA August 21–25, 1994 Proceedings 14. Springer. 1994, pp. 257–270. [CFNP00] B. Chor et al. “Tracing traitors”. In: IEEE Transactions on Information Theory 46.3 (2000), pp. 893–910. DOI: 10.1109/18.841169. [CM19] Sanjit Chatterjee and Sayantan Mukherjee. “Large universe subset predicate encryption based on static assumption (without random oracle)”. In:Cryptographers’Track at the RSA Conference. Springer. 2019, pp. 62–82. [DDPS02] Ernesto Damiani et al. “A fine-grained access control system for XML documents”. In: ACM Transactions on Information and System Security (TISSEC) 5.2 (2002), pp. 169–202.23 [FLBY+23] Kai Fan et al. “EIV-BT-ABE: Efficient Attribute-Based Encryption With Black-Box Traceability Based On Encrypted Identity Vector”. In: IEEE Internet of Things Journal (2023). [GKDM+23] Reetu Gupta et al. “Secured and privacy-preserving multi-authority access control system for cloud-based healthcare data sharing”. In: Sensors 23.5 (2023), p. 2617. [GKRW18] Rishab Goyal et al. “Risky traitor tracing and new differential privacy negative results”. In: Advances in Cryptology–CRYPTO 2018: 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19–23, 2018, Proceedings, Part I 38. Springer. 2018, pp. 467–497. [GPSW06] Vipul Goyal et al. “Attribute-based encryption for fine-grained access control of encrypted data”. In: Proceedings of the 13th ACM conference on Computer and communications security. 2006, pp. 89–98. [HY06] Taralynn Hartsell and Steve Chi-Yin Yuen. “Video streaming in online learning”. In: AACE Review (Formerly AACE Journal) 14.1 (2006), pp. 31–43. [KMMS18] Jonathan Katz et al. “Subset predicate encryption and its applications”. In:Cryptology and Network Security: 16th International Conference, CANS 2017, Hong Kong, China, November 30—December 2, 2017, Revised Selected Papers 16. Springer. 2018, pp. 115–134. [KY01] Aggelos Kiayias and Moti Yung. “Self protecting pirates and black-box traitor tracing”. In: Annual International Cryptology Conference. Springer. 2001, pp. 63–79. [KY02] Aggelos Kiayias and Moti Yung. “Traitor tracing with constant transmission rate”. In: International Conference on the Theory and Applications of Cryptographic Techniques. Springer. 2002, pp. 450–465. [LCW12] Zhen Liu, Zhenfu Cao, and Duncan S Wong. “White-box traceable ciphertext policy attribute-based encryption supporting any monotone access structures”. In: IEEE Transactions on Information Forensics and Security 8.1 (2012), pp. 76–88. [LCW13] Zhen Liu, Zhenfu Cao, and Duncan S Wong. “Blackbox traceable CP-ABE: how to catch people leaking their keys by selling decryption devices on ebay”. In: Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security. 2013, pp. 475–486. [LCW14] Zhen Liu, Zhenfu Cao, and Duncan S Wong. “Traceable CP-ABE: How to trace decryption devices found in the wild”. In: IEEE Transactions on Information Forensics and Security 10.1 (2014), pp. 55–68. [LV11] Benoıt Libert and Damien Vergnaud. “Towards practical black-box accountable authority ibe: Weak black-box traceability with short ciphertexts and private keys”. In: IEEE transactions on information theory 57.10 (2011), pp. 7189–7204. [LW11] Allison Lewko and Brent Waters. “Decentralizing attribute-based encryption”. In: Annual international conference on the theory and applications of cryptographic techniques. Springer. 2011, pp. 568–588. [LW15] Zhen Liu and Duncan S Wong. “Traceable CP-ABE on prime order groups: Fully secure and fully collusion-resistant blackbox traceable”. In: International Conference on Information and Communications Security. Springer. 2015, pp. 109–124. [LW16] Zhen Liu and Duncan S Wong. “Practical attribute-based encryption: traitor tracing, revocation and large universe”. In: The Computer Journal 59.7 (2016), pp. 983–1004. [MI04] Tatsuyuki Matsushita and Hideki Imai. “A public-key black-box traitor tracing scheme with sublinear ciphertext size against self-defensive pirates”. In: Advances in Cryptology-ASIACRYPT 2004: 10th International Conference on the Theory and Application of Cryptology and Information Security, Jeju Island, Korea, December 5-9, 2004. Proceedings 10. Springer. 2004, pp. 260–275. [NAL23] Hassan Nasiraee, Maede Ashouri-Talouki, and Ximeng Liu. “Optimal Black-Box Traceability in Decentralized Attribute-Based Encryption”. In: IEEE Transactions on Cloud Computing 11.3 (2023), pp. 2459–2472. DOI: 10.1109/TCC.2022.3210137. [NCDG+16] Jianting Ning et al. “Traceable CP-ABE with short ciphertexts: How to catch people selling decryption devices on ebay efficiently”. In: European Symposium on Research in Computer Security. Springer. 2016, pp. 551–569. [NDCW+15] Jianting Ning et al. “White-box traceable ciphertext-policy attribute-based encryption supporting flexible attributes”. In: IEEE Transactions on Information Forensics and Security 10.6 (2015), pp. 1274–1288. [QBZW+18] Huidong Qiao et al. “Practical, provably secure, and black-box traceable CP-ABE for cryptographic cloud storage”. In: Symmetry 10.10 (2018), p. 482. [QRWB+18] Huidong Qiao et al. “Compulsory traceable ciphertext-policy attribute-based encryption against privilege abuse in fog computing”. In: Future Generation Computer Systems 88 (2018), pp. 107–116. [WLW10] Guojun Wang, Qin Liu, and Jie Wu. “Hierarchical attribute-based encryption for fine-grained access control in cloud storage services”. In: Proceedings of the 17th ACM conference on Computer and communications security. 2010, pp. 735–737. [WYDW+12] Xindong Wu et al. “Online feature selection with streaming features”. In: IEEE transactions on pattern analysis and machine intelligence 35.5 (2012), pp. 1178–1192. [Z21] Mark Zhandry. “White box traitor tracing”. In: Advances in Cryptology–CRYPTO 2021: 41st Annual International Cryptology Conference, CRYPTO 2021, Virtual Event, August 16–20, 2021, Proceedings, Part IV 41. Springer. 2021, pp. 303-333. 描述 碩士
國立政治大學
資訊科學系
111753155資料來源 http://thesis.lib.nccu.edu.tw/record/#G0111753155 資料類型 thesis dc.contributor.advisor 曾一凡 zh_TW dc.contributor.author (Authors) 楊之岑 zh_TW dc.contributor.author (Authors) Yang, Chih-Tsen en_US dc.creator (作者) 楊之岑 zh_TW dc.creator (作者) Yang, Chih-Tsen en_US dc.date (日期) 2024 en_US dc.date.accessioned 5-Aug-2024 12:46:14 (UTC+8) - dc.date.available 5-Aug-2024 12:46:14 (UTC+8) - dc.date.issued (上傳時間) 5-Aug-2024 12:46:14 (UTC+8) - dc.identifier (Other Identifiers) G0111753155 en_US dc.identifier.uri (URI) https://nccur.lib.nccu.edu.tw/handle/140.119/152574 - dc.description (描述) 碩士 zh_TW dc.description (描述) 國立政治大學 zh_TW dc.description (描述) 資訊科學系 zh_TW dc.description (描述) 111753155 zh_TW dc.description.abstract (摘要) 在當今網路技術高度發達的時代,資料安全至關重要,對加密資料實現細粒度訪問控制是一項挑戰。基於屬性加密是常用的解決方案,然而隨著屬性的增多,此類方案中的訪問結構變得越來越複雜,在這種情況下,使用邏輯運算符如 “And” 或 “Or” 全面制定訪問策略變得困難,且在解密時需耗費龐大的計算成本,此外,隨著能夠訪問密文的用戶數量增加,惡意用戶可能會共謀做出盜版解碼器,並通過出售盜版解碼器以牟取暴利。為了解決這些問題,本篇論文提出了一種利用子集謂詞加密和寬鬆黑盒追踪的新方法,此方法不僅實現了細粒度訪問控制,還有效防止叛徒行為,一但叛徒出現,該方法能夠找出誰是叛徒。 zh_TW dc.description.abstract (摘要) In today's highly advanced network technology, data security is paramount, and achieving fine-grained access control for encrypted data is a challenge. Attribute-based encryption is a common solution, but as the number of attributes increases, the access structure in such schemes becomes more complex, making it difficult to fully formulate access policies using logical operators such as $And$ or $Or$. This complexity results in computationally expensive decryption processes. Additionally, as the number of users with access to ciphertext increases, the risk of malicious users colluding to create pirated decoders and profit from selling them also increases. To address these issues, this manuscript proposes a new approach that uses subset predicate encryption and relaxed black-box tracing. This approach not only implements fine-grained access control but also effectively prevents the emergence of traitors and identifies them if they appear. en_US dc.description.tableofcontents 誌謝 i 摘要 ii Abstract iii Contents iv List of Figures v List of Tables vi 1 Introduction 1 1.1 Motivation 1 1.2 Related Works 2 1.3 Our Contribution 3 1.4 Organization of the Thesis 4 2 Preliminaries 5 2.1 Bilinear Maps 5 2.2 Subset Predicate Encryption 5 2.3 Subset Predicate Encryption with Relaxed Black-Box Traceability 6 2.3.1 Selective Security for SPE-RBTT 7 2.3.2 Traceability for SPE-RBTT 8 2.4 Traitor Tracing 9 2.5 Complexity Assumption 10 3 The Proposed Scheme 11 4 Security Proof 15 5 Comparison and Analysis 19 6 Conclusion and Future Works 23 Bibliography 24 zh_TW dc.format.extent 656102 bytes - dc.format.mimetype application/pdf - dc.source.uri (資料來源) http://thesis.lib.nccu.edu.tw/record/#G0111753155 en_US dc.subject (關鍵詞) 屬性加密 zh_TW dc.subject (關鍵詞) 叛徒追蹤 zh_TW dc.subject (關鍵詞) 子集謂詞加密 zh_TW dc.subject (關鍵詞) Attribute-Based Encryption en_US dc.subject (關鍵詞) Traitor Tracing en_US dc.subject (關鍵詞) Subset Predicate Encryption en_US dc.title (題名) 具有寬鬆黑盒追蹤性的子集謂詞加密 zh_TW dc.title (題名) Subset predicate encryption with relaxed black-box traceability en_US dc.type (資料類型) thesis en_US dc.relation.reference (參考文獻) [BN08] Dan Boneh and Moni Naor. “Traitor tracing with constant size ciphertext”. In: Proceedings of the 15th ACM conference on Computer and communications security. 2008, pp. 501–510. [BSW07] John Bethencourt, Amit Sahai, and Brent Waters. “Ciphertext-policy attributebased encryption”. In: 2007 IEEE symposium on security and privacy (SP’07). IEEE. 2007, pp. 321–334. [BW06] Dan Boneh and Brent Waters. “A fully collusion resistant broadcast, trace,and revoke system”. In:Proceedings of the 13th ACM conference on Computer and communications security. 2006, pp. 211–220. [CFN94] Benny Chor, Amos Fiat, and Moni Naor. “Tracing traitors”. In: Advances in Cryptology—CRYPTO’94: 14th Annual International Cryptology Conference Santa Barbara, California, USA August 21–25, 1994 Proceedings 14. Springer. 1994, pp. 257–270. [CFNP00] B. Chor et al. “Tracing traitors”. In: IEEE Transactions on Information Theory 46.3 (2000), pp. 893–910. DOI: 10.1109/18.841169. [CM19] Sanjit Chatterjee and Sayantan Mukherjee. “Large universe subset predicate encryption based on static assumption (without random oracle)”. In:Cryptographers’Track at the RSA Conference. Springer. 2019, pp. 62–82. [DDPS02] Ernesto Damiani et al. “A fine-grained access control system for XML documents”. In: ACM Transactions on Information and System Security (TISSEC) 5.2 (2002), pp. 169–202.23 [FLBY+23] Kai Fan et al. “EIV-BT-ABE: Efficient Attribute-Based Encryption With Black-Box Traceability Based On Encrypted Identity Vector”. In: IEEE Internet of Things Journal (2023). [GKDM+23] Reetu Gupta et al. “Secured and privacy-preserving multi-authority access control system for cloud-based healthcare data sharing”. In: Sensors 23.5 (2023), p. 2617. [GKRW18] Rishab Goyal et al. “Risky traitor tracing and new differential privacy negative results”. In: Advances in Cryptology–CRYPTO 2018: 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19–23, 2018, Proceedings, Part I 38. Springer. 2018, pp. 467–497. [GPSW06] Vipul Goyal et al. “Attribute-based encryption for fine-grained access control of encrypted data”. In: Proceedings of the 13th ACM conference on Computer and communications security. 2006, pp. 89–98. [HY06] Taralynn Hartsell and Steve Chi-Yin Yuen. “Video streaming in online learning”. In: AACE Review (Formerly AACE Journal) 14.1 (2006), pp. 31–43. [KMMS18] Jonathan Katz et al. “Subset predicate encryption and its applications”. In:Cryptology and Network Security: 16th International Conference, CANS 2017, Hong Kong, China, November 30—December 2, 2017, Revised Selected Papers 16. Springer. 2018, pp. 115–134. [KY01] Aggelos Kiayias and Moti Yung. “Self protecting pirates and black-box traitor tracing”. In: Annual International Cryptology Conference. Springer. 2001, pp. 63–79. [KY02] Aggelos Kiayias and Moti Yung. “Traitor tracing with constant transmission rate”. In: International Conference on the Theory and Applications of Cryptographic Techniques. Springer. 2002, pp. 450–465. [LCW12] Zhen Liu, Zhenfu Cao, and Duncan S Wong. “White-box traceable ciphertext policy attribute-based encryption supporting any monotone access structures”. In: IEEE Transactions on Information Forensics and Security 8.1 (2012), pp. 76–88. [LCW13] Zhen Liu, Zhenfu Cao, and Duncan S Wong. “Blackbox traceable CP-ABE: how to catch people leaking their keys by selling decryption devices on ebay”. In: Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security. 2013, pp. 475–486. [LCW14] Zhen Liu, Zhenfu Cao, and Duncan S Wong. “Traceable CP-ABE: How to trace decryption devices found in the wild”. In: IEEE Transactions on Information Forensics and Security 10.1 (2014), pp. 55–68. [LV11] Benoıt Libert and Damien Vergnaud. “Towards practical black-box accountable authority ibe: Weak black-box traceability with short ciphertexts and private keys”. In: IEEE transactions on information theory 57.10 (2011), pp. 7189–7204. [LW11] Allison Lewko and Brent Waters. “Decentralizing attribute-based encryption”. In: Annual international conference on the theory and applications of cryptographic techniques. Springer. 2011, pp. 568–588. [LW15] Zhen Liu and Duncan S Wong. “Traceable CP-ABE on prime order groups: Fully secure and fully collusion-resistant blackbox traceable”. In: International Conference on Information and Communications Security. Springer. 2015, pp. 109–124. [LW16] Zhen Liu and Duncan S Wong. “Practical attribute-based encryption: traitor tracing, revocation and large universe”. In: The Computer Journal 59.7 (2016), pp. 983–1004. [MI04] Tatsuyuki Matsushita and Hideki Imai. “A public-key black-box traitor tracing scheme with sublinear ciphertext size against self-defensive pirates”. In: Advances in Cryptology-ASIACRYPT 2004: 10th International Conference on the Theory and Application of Cryptology and Information Security, Jeju Island, Korea, December 5-9, 2004. Proceedings 10. Springer. 2004, pp. 260–275. [NAL23] Hassan Nasiraee, Maede Ashouri-Talouki, and Ximeng Liu. “Optimal Black-Box Traceability in Decentralized Attribute-Based Encryption”. In: IEEE Transactions on Cloud Computing 11.3 (2023), pp. 2459–2472. DOI: 10.1109/TCC.2022.3210137. [NCDG+16] Jianting Ning et al. “Traceable CP-ABE with short ciphertexts: How to catch people selling decryption devices on ebay efficiently”. In: European Symposium on Research in Computer Security. Springer. 2016, pp. 551–569. [NDCW+15] Jianting Ning et al. “White-box traceable ciphertext-policy attribute-based encryption supporting flexible attributes”. In: IEEE Transactions on Information Forensics and Security 10.6 (2015), pp. 1274–1288. [QBZW+18] Huidong Qiao et al. “Practical, provably secure, and black-box traceable CP-ABE for cryptographic cloud storage”. In: Symmetry 10.10 (2018), p. 482. [QRWB+18] Huidong Qiao et al. “Compulsory traceable ciphertext-policy attribute-based encryption against privilege abuse in fog computing”. In: Future Generation Computer Systems 88 (2018), pp. 107–116. [WLW10] Guojun Wang, Qin Liu, and Jie Wu. “Hierarchical attribute-based encryption for fine-grained access control in cloud storage services”. In: Proceedings of the 17th ACM conference on Computer and communications security. 2010, pp. 735–737. [WYDW+12] Xindong Wu et al. “Online feature selection with streaming features”. In: IEEE transactions on pattern analysis and machine intelligence 35.5 (2012), pp. 1178–1192. [Z21] Mark Zhandry. “White box traitor tracing”. In: Advances in Cryptology–CRYPTO 2021: 41st Annual International Cryptology Conference, CRYPTO 2021, Virtual Event, August 16–20, 2021, Proceedings, Part IV 41. Springer. 2021, pp. 303-333. zh_TW