1 of 32

Registered Attribute-Based Encryption

Susan Hohenberger George Lu Brent Waters David Wu

2 of 32

Public Key Encryption

pk

sk

ct

3 of 32

Attribute Based Encryption [SW05, GPSW06]

pk

skfaculty + CS

skfaculty + math

skstudent + CS

ctCS AND faculty

4 of 32

Key Exfiltration Problem

pk

skfaculty + CS

skfaculty + math

skstudent + CS

msk

5 of 32

Registration Based Encryption [GHMR18]

mpk’’

mpk

mpk'

pk1

pk2

pk3

sk1

sk2

sk3

id1

id3

id2

ctid1

No Master Secret!

6 of 32

“Trivial” RBE

mpk’’

mpk

mpk'

pk1

pk2

pk3

sk1

sk2

sk3

id1

id3

id2

ctid1

mpk independent of number of users!

7 of 32

Central Authority vs Key Curator

  • Computes compact master keys
  • Security holds even with access to curator state
  • Requires interaction
  • Computes compact master keys
  • Internal state compromises security
  • Noninteractive key issuing

8 of 32

Registered Attribute Based Encryption

mpk

faculty + CS

faculty + math

student + CS

ctCS AND faculty

9 of 32

Results

  • Registered Attribute-Based Encryption for bounded users
    • From composite order bilinear groups
    • Monotone boolean formulas policies
  • Registered Attribute-Based Encryption for unbounded users
    • From obfuscation
    • General circuits policies

10 of 32

Improvement from Prior Work

  • Monotone Boolean Formulas
  • Concrete efficiency
  • Black box
  • Identities/Point Functions
  • Large ciphertexts
  • Obfuscation or hash garbling

[GHMR18, GHM+19, GV20, CES21]

Construction 1

11 of 32

Limitations

  • Bounded Users
  • Structured Reference String
  • Quadratic CRS and curator state
  • Unbounded Users
  • Uniform Random String
  • Linear curator state

Construction 1

[GHMR18, GHM+19, GV20, CES21]

12 of 32

Background

  • Scheme constructed in composite order bilinear groups
    • Composite Order

    • Bilinear

13 of 32

Slotted Aggregation

mpk’’

mpk

mpk'

mpk

14 of 32

Slotted Aggregation

mpk

15 of 32

Roadmap

Attribute Based Encryption

1-User Registered ABE

Semihonest L-User Registered ABE

Malicious L-User Registered ABE

16 of 32

ABE in Bilinear Groups [GPSW06,LOS+10]

Encryption:

Ciphertext:

e(g,g)αs

e(g,h)ts

e(g,Uρ(x))ts

gαht

gt

Uwt : w S

μ⋅ e(g,g)αs

gs

hsxUwxs

h

e(g,g)α

Uw = guw : w U

Decryption:

g

Conjunction Policies wx : x [N]

*Replace additive secret sharing with linear secret sharing to support monotone Boolean formula

e(g,h)ts

17 of 32

ABE in Bilinear Groups [GPSW06,LOS+10]

Encryption:

Ciphertext:

e(g,g)αs

e(g,h)ts

e(g,Uρ(x))ts

gαht

gt

Uwt : w S

μ⋅ e(g,g)αs

gs

hsxUwxs

h

e(g,g)α

Uw = guw : w U

Decryption:

g

Conjunction Policies wx : x [N]

*Replace additive secret sharing with linear secret sharing to support monotone Boolean formula

e(g,h)ts

gs

e(g,Uρ(x))ts

18 of 32

ABE in Bilinear Groups [GPSW06,LOS+10]

Encryption:

pk

Ciphertext:

e(g,g)αs

gαht

gt

Uwt : w S

μ⋅ e(g,g)αs

gs

hsxUwxs

gs

h

e(g,g)α

Uw = guw : w U

Decryption:

sk

g

Conjunction Policies wx : x [N]

*Replace additive secret sharing with linear secret sharing to support monotone Boolean formula

19 of 32

1-User Registered ABE

sk

skfaculty + math

msk

pk

pk

hsk

crs

faculty +

math

mpk

ctfaculty OR CS

ctfaculty AND CS

20 of 32

1-User Registered ABE

Uwt =1

guw : w U

ABE.pk

Uw = guw

Uw = 1

R = gr

mpk

R = gr

w1 w2 w3 ∧ …

R

21 of 32

Extending to L-User (Key Aggregation)

  • Idea –multiply mpk’s of 1-user scheme together!

pki = ({Ui,w },Ri )

Compact

Deterministic

22 of 32

Cross-Term Cancellation

e( , )

e( , ) =

e(g,R2 )vt

R2 t

User 2

gv

e(g,R1 )vt

e(g,R3 )vt

gt

gt3

gt1

R1 t2

R3 t2

2

2

e( , )

·

2

2

2

Conceptually similar to techniques used for constructing vector commitments [CF11] or batch arguments [WW22]

Rt = g rt= (gt)r

23 of 32

Cross Term Cancellation

R3 t2 = g r3t2= (gt2)r3

U3,w t2 = g u3,w t2

crs

24 of 32

Key Validation

Ri =

mpk

???

gri

mpk'

Qi = Piri

crs

Pi

25 of 32

Key Validation

Ti =

mpk

???

gri

mpk'

26 of 32

Registered ABE Security

mpk

faculty + CS

faculty + math

student + CS

ctCS AND faculty

m0, m1

mb

crs

27 of 32

Security Proof

“Normal” Slot

“Semi-Functional” Slot

“Semi-Functional” Ciphertext

“Normal” Ciphertext

28 of 32

Security Proof

??

29 of 32

Security Proof

ctCS AND faculty

faculty + CS

student + CS

30 of 32

Conclusion

  • Defined registered ABE
  • Construct first registered ABE schemes
    • First registered scheme to make black box use of crypto
    • Registered ABE for general circuits
  • Followup Works
    • Registered Functional Encryption from iO [DP23, FFM+23]
    • Registered Inner Product Predicate Encryption from pairing [FFM+23]
  • Open Questions
    • Large Attribute Universe registered ABE?
    • Generic transformation from X to registered X?

31 of 32

Upcoming Work

  • Improved Asymptotic and Concrete Efficiency
    • Prime Order Construction
    • Nearly-Linear CRS

Ui tj = g ui tj : i ≠ j ∈ [n]

Uk tk = g uk tk : k ∈ [n]

ui ,ti = a di

= g adi+dj

= g a2dk

di + dj ≠ 2dk

O(n1+o(1))

32 of 32

Thank you!

Read our paper on eprint 2022/1500