SlideShare a Scribd company logo
Public Key Infrastructure:

Encryption & Decryption:


 1. Bob Request Alice's Public key
                                       Public Key Infrastructure
 from KDC                                                                          4. Alice uses her private key to
                                                                 Alice             decrypt messages encrypted by Bob.

                            Public Key
                2.PKI signs the Public key & send
                                                                     Private Key
  Bob           it to Bob

                                 3. Bob uses her public key to
                                 encrypt message for Alice.


Disadvantage:

    1. To communicate with Alice, Bob, at first, has to communicate with the PKI.
Identity Based Encryption (IDE):

 In IDE, one’s publicly known identity (ex. email address) is being used as his/her public key where as
corresponding private key is generated from the known identity.

IDE encryption scheme is a four algorithms/steps scheme where the algorithms are i. Setup Algorithm ii.
Key (private key) Generation Algorithm iii. Encryption Algorithm iv. Decryption Algorithm.

Setup and Key Generation:

                          Private Key Generator
                                  (PKG)
                                                1. Set up Algorithm
                                             generate a master key for
                                                       Alice
                                Master Key
  2. Alice show & Prove her                      3. Given the identity, Key Generation Algorithm
        Identity to PKG                                  generate Private key for Alice.


                Identity                                Private Key
       Ex: alice@example.org




Encryption & Decryption:

       1. Bob knows & uses Alice's         Private Key Generator
       Identity to encrypt the message             (PKG)

 Bob                                     Alice

                                                  Master Key
                                                                             2. Alice uses her Private Key to
                                                                             decrypt the message

                                         Identity                    Private Key
                                 Ex.alice@example.org




Advantage:

    1. Bob does not need to contact KDC / CA for Alice’s Public Key. He knows Alice’s Identity which he
       uses to encrypt message for Alice.
Fuzzy Identity Based Encryption (Fuzzy-IDE):

Fuzzy Identity of a person is a set of descriptive attributes which a predefined error tolerance capability.
In Fuzzy-IDE, these attributes are used as one’s known public key.

Setup & Key Generation

                             Private Key Generator
                                     (PKG)
                                              1. Given a Error Tolerance factor d,
                                              set up algorithm generates a
                                              Master key for Alice.
                                   Master Key
 2. Alice's Identity w is being
 decided

                   Fuzzy Identity (w)            Private Key
                                           3. Given Identity w, Key Generation
                                           Algorithm generates Alice's Private
           Attr1       ...        AttrN    key.


Advantage:

        With her private key, Alice can decrypt messages encrypted with her own identity (w). She can
also decrypt messages encrypted with other’s identity (w’) if |w ∩w’| >= d.

Encryption & Decryption in Fuzzy IDE System

 1. Charlie encrypt Message(M)                                       3. Alice can also decrypt M with her
 with Bob's Identity w'                                              private Key with (|w∩w'| >= d)

        Charlie                                      Bob                                 Alice
     (Identity w'')                              (Identity w')                        (Identity w)
                                     2. Bob can decrypt M with his
                                     private Key

Example:

   Person                    Fuzzy Identity                d                          Comment
    Alice          w={“exam-committee”, “chair”,           2          Alice can decrypt everything that Bob &
                   “system”}                                         Charile can Decrypt. Because |w ∩w’|>=2
                                                                                  and |w ∩w’’|>=2
    Bob            w’={“exam-committee”,                    3        Bob can only decrypt message encrypted
                   “faculty”, “system”, “usa”}                        with Charlie’s identity as |w’ ∩w’’|>=3
  Charlie          w’’={“exam-committee”,                   4        Charlie cannot decrypt any message that
                   “student”, “system”, “usa”}                           are encrypted with others identity.
Attribute-based Encryption (or Key-policy ABE):

Access Tree / Key-policy(Ƭ):

Access Policy to be associated with private key where leaf nodes are attributes coming from fuzzy
identity.

                                   OR


                       AND                       Dean              2 out of 3



 Computer Science           Admission-                     Computer Science             Admission-        faculty
                            committee                                                   committee




Account Setup & Key-generation:

                                           Private Key Generator
                                                   (PKG)
                                                                1. Setup Algorithm generates
                                                                Alice's Master Key
                                                   Master Key
                                                                            4. Given the Key-policy, Key
                                                                            Generation Algorithm generates
 2. Alice's Identity is being decided                                       Private key for Alice.

                                Fuzzy Identity (w)                 Private Key
                                                                                 3. Alice's Key Policy is being
                                                                                 decided from her identity
                        Attr1       ...         AttrN                Key Policy



Encryption & Decryption:

                                                                                3. Alice can decrypt M if her key
                                                                                policy is satisfied with γ. ie Ƭ(γ)=1




                                                         Bob                                    Alice
     Charlie                                                                                 (Identity w)
                                                     (Identity w')
  (Identity w'')
                                          2. Bob can decrypt M if his
 1. Charlie encrypt Message(M)            key policy is satisfied with γ.
 with a set of attributes γ (not
                                          ie Ƭ(γ)=1
 with anyone's identity )
Example:

Assuming, Alice has the following key policy

                                        OR


                         AND                    Dean        2 out of 3



 Computer Science              Admission-              Computer Science         Admission-             faculty
                               committee                                        committee

Alice can decrypt a file encrypted with the attribute set {“Computer Science”, “Admission committee”}.
But she cannot decrypt another ciphertext associated with attributes {“Computer Science”, “program-
committee”}.

Variations of ABE:

Ciphertext-Policy ABE vs. Key-policy ABE:

While in original ABE (key-policy ABE) access policy is associated with the private key, in Ciphertext–
policy ABE, access policy is associated in the ciphertext.

                   Key-policy ABE                                        Ciphertext-policy ABE

                                                                                      pon B E
                                                                                               s
                                 ts




    Ciphertext                         Private key                                         ent
                                                                                  com y A
                                  en




                                                             Ciphertext                            Private key
                              pon




                                                                                ed t-polic
                        ed y ABE
                          com




                                                                         Sel hertex




    Attribute
                sel -polic




                                         Policy
   Association                         Association            Policy                                Attribute
                                                                            e ct
                   e ct




                                                            Association
                 K ey




                                                                          Cip




                                                                                                   Association
ABE with monotonic Access Structure vs. ABE with non-monotonic Access Structure:

Monotonic Access structure uses ‘AND gate’, ‘OR gate’, or ‘k out of N’ threshold gate.

Non-Monotonic Access structure uses Monotonic Access structure and additional ‘NOT gate’.

Example:                                     OR
Monotonic
Access                                                Dean           2 out of 3
                                  AND
structure

               Computer Science         Admission-             Computer Science      Admission-     faculty
                                        committee                                    committee
Example:                                   OR
Non-
Monotonic                         AND                Dean         2 out of 3
Access
structure
               Computer Science     Admission-              Computer Science      program-    NOT
                                    committee                                     committee

                                                                                              Student




Hierarchical ABE (HABE):

In HABE, the attributes are classified into trees according to their relationship defined in the access
control system. Every node in this tree is associated with an attribute, and an ancestral node can derive
its descendant’s key, but the reverse is not allowed.

                                          Attribute1
                                                             Attribute1 can be used instead of
                                                              any or all the attributes of this
                                                             tree
 Attribute2 can be used instead of
  attribute4 or attribute 5 or both of
 them but not vice versa. Attribute2
                                                            Attribute3




                 Attribute4              Attribute5

Single Authority ABE vs. Multi-authority ABE:

More Related Content

PPT
Diffiehellman
PPTX
Firewall Basing
PPTX
MAC-Message Authentication Codes
PPTX
Cryptography and Information Security
PPTX
Elgamal & schnorr digital signature scheme copy
PPTX
IP Security
PDF
9. chapter 8 np hard and np complete problems
PPT
Kerberos
Diffiehellman
Firewall Basing
MAC-Message Authentication Codes
Cryptography and Information Security
Elgamal & schnorr digital signature scheme copy
IP Security
9. chapter 8 np hard and np complete problems
Kerberos

What's hot (20)

PPTX
RSA algorithm
PPTX
Email security
PPT
RSA Algorithm - Public Key Cryptography
PPT
Diffie-hellman algorithm
PPTX
Trusted systems
PDF
18CS2005 Cryptography and Network Security
PDF
Elliptic curve cryptography
PPTX
Seminar Presentation | Network Intrusion Detection using Supervised Machine L...
PPTX
Kerberos protocol
PPTX
Key management
PDF
RSA ALGORITHM
PPTX
Introduction to Cryptography
PPTX
Kerberos
PPTX
User authentication
 
PDF
PAC Learning
PPT
Secure Socket Layer
PPT
Rsa and diffie hellman algorithms
PDF
Vtu network security(10 ec832) unit 3 notes.
PDF
IP Security
RSA algorithm
Email security
RSA Algorithm - Public Key Cryptography
Diffie-hellman algorithm
Trusted systems
18CS2005 Cryptography and Network Security
Elliptic curve cryptography
Seminar Presentation | Network Intrusion Detection using Supervised Machine L...
Kerberos protocol
Key management
RSA ALGORITHM
Introduction to Cryptography
Kerberos
User authentication
 
PAC Learning
Secure Socket Layer
Rsa and diffie hellman algorithms
Vtu network security(10 ec832) unit 3 notes.
IP Security
Ad

Viewers also liked (20)

PPTX
Attribute Based Encryption with Privacy Preserving In Clouds
PPTX
Attribute-Based Encryption for Cloud Security
PPTX
Attributes based encryption with verifiable outsourced decryption
PPTX
Final_attribute based encryption in cloud with significant reduction of compu...
PPTX
Scalable and secure sharing of public health record using attribute based Enc...
PPTX
Efficient sharing of personal health records using encryption in cloud computing
PPTX
Scalable and secure sharing of personal health records in cloud computing usi...
PPTX
A Fully Anonymous Attribute-Based Encryption to Control Cloud Data Access and...
PDF
Attribute based encryption with privacy preserving in clouds
PPTX
Decentralized access control with anonymous authentication of data stored in ...
PPT
Decentralized access control with anonymous authentication of data stored in ...
PPTX
Attribute based encryption in cloud with significant reduction reviw2
PPTX
PPTX
Scalable and secure sharing of personal health records
PDF
B04010610
DOCX
CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIB...
PDF
ATTRIBUTE-BASED DATA SHARING SCHEME REVISITED IN CLOUD COMPUTING,bulk ieee pr...
PDF
AN EFFICIENT FILE HIERARCHY ATTRIBUTE-BASED ENCRYPTION SCHEME IN CLOUD COMPUT...
DOC
Decentralized access control with anonymous authentication of data stored in ...
PPTX
Personal Health Records
Attribute Based Encryption with Privacy Preserving In Clouds
Attribute-Based Encryption for Cloud Security
Attributes based encryption with verifiable outsourced decryption
Final_attribute based encryption in cloud with significant reduction of compu...
Scalable and secure sharing of public health record using attribute based Enc...
Efficient sharing of personal health records using encryption in cloud computing
Scalable and secure sharing of personal health records in cloud computing usi...
A Fully Anonymous Attribute-Based Encryption to Control Cloud Data Access and...
Attribute based encryption with privacy preserving in clouds
Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...
Attribute based encryption in cloud with significant reduction reviw2
Scalable and secure sharing of personal health records
B04010610
CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIB...
ATTRIBUTE-BASED DATA SHARING SCHEME REVISITED IN CLOUD COMPUTING,bulk ieee pr...
AN EFFICIENT FILE HIERARCHY ATTRIBUTE-BASED ENCRYPTION SCHEME IN CLOUD COMPUT...
Decentralized access control with anonymous authentication of data stored in ...
Personal Health Records
Ad

Similar to Attribute Based Encryption (20)

PDF
Who’s right
PPT
CS283-PublicKey.ppt
PPT
CS283-PublicKey.ppt
PPT
Authentication (Distributed computing)
PPT
Secure Communication (Distributed computing)
PPT
1329 n 9460
PPT
Crypt
PDF
Ch12 Encryption
PDF
Chapter 8 - Security in Computer Networks
PDF
CGI White Paper - Key Incryption Mechanism
PDF
Chapter8 nov 29_05[one.]
PPT
13 asymmetric key cryptography
ODP
Network Security
PPTX
key aggregate cryptosystem for scalable data sharing in cloud storage abstract
PDF
Da24658663
PPT
PDF
CPK Theory And Parctice
PDF
Introduction to PKI & SafeNet Luna Hardware Security Modules with Microsoft W...
PPTX
Part2-Apps-Security.pptx
Who’s right
CS283-PublicKey.ppt
CS283-PublicKey.ppt
Authentication (Distributed computing)
Secure Communication (Distributed computing)
1329 n 9460
Crypt
Ch12 Encryption
Chapter 8 - Security in Computer Networks
CGI White Paper - Key Incryption Mechanism
Chapter8 nov 29_05[one.]
13 asymmetric key cryptography
Network Security
key aggregate cryptosystem for scalable data sharing in cloud storage abstract
Da24658663
CPK Theory And Parctice
Introduction to PKI & SafeNet Luna Hardware Security Modules with Microsoft W...
Part2-Apps-Security.pptx

More from UT, San Antonio (20)

PPTX
digital certificate - types and formats
PPTX
Saml metadata
PPTX
Static Analysis with Sonarlint
PPTX
Shellshock- from bug towards vulnerability
PPT
Abac17 prosun-slides
PPT
Abac17 prosun-slides
TXT
Recitation
TXT
Recitation
PDF
Big Data Processing: Performance Gain Through In-Memory Computation
PDF
Enumerated authorization policy ABAC (EP-ABAC) model
PDF
Where is my Privacy presentation slideshow (one page only)
PDF
Three month course
PDF
One month-syllabus
PPT
Zerovm backgroud
PPTX
Security_of_openstack_keystone
PDF
Research seminar group_1_prosunjit
PPT
Final Project Transciption Factor DNA binding Prediction
PDF
Cyber Security Exam 2
PDF
Transcription Factor DNA Binding Prediction
digital certificate - types and formats
Saml metadata
Static Analysis with Sonarlint
Shellshock- from bug towards vulnerability
Abac17 prosun-slides
Abac17 prosun-slides
Recitation
Recitation
Big Data Processing: Performance Gain Through In-Memory Computation
Enumerated authorization policy ABAC (EP-ABAC) model
Where is my Privacy presentation slideshow (one page only)
Three month course
One month-syllabus
Zerovm backgroud
Security_of_openstack_keystone
Research seminar group_1_prosunjit
Final Project Transciption Factor DNA binding Prediction
Cyber Security Exam 2
Transcription Factor DNA Binding Prediction

Recently uploaded (20)

PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
Approach and Philosophy of On baking technology
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Empathic Computing: Creating Shared Understanding
PDF
Electronic commerce courselecture one. Pdf
PDF
Machine learning based COVID-19 study performance prediction
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPTX
sap open course for s4hana steps from ECC to s4
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
A comparative analysis of optical character recognition models for extracting...
PPTX
Machine Learning_overview_presentation.pptx
PDF
Encapsulation theory and applications.pdf
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
Assigned Numbers - 2025 - Bluetooth® Document
Approach and Philosophy of On baking technology
20250228 LYD VKU AI Blended-Learning.pptx
Dropbox Q2 2025 Financial Results & Investor Presentation
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Programs and apps: productivity, graphics, security and other tools
MIND Revenue Release Quarter 2 2025 Press Release
Empathic Computing: Creating Shared Understanding
Electronic commerce courselecture one. Pdf
Machine learning based COVID-19 study performance prediction
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Reach Out and Touch Someone: Haptics and Empathic Computing
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
sap open course for s4hana steps from ECC to s4
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
A comparative analysis of optical character recognition models for extracting...
Machine Learning_overview_presentation.pptx
Encapsulation theory and applications.pdf
The Rise and Fall of 3GPP – Time for a Sabbatical?

Attribute Based Encryption

  • 1. Public Key Infrastructure: Encryption & Decryption: 1. Bob Request Alice's Public key Public Key Infrastructure from KDC 4. Alice uses her private key to Alice decrypt messages encrypted by Bob. Public Key 2.PKI signs the Public key & send Private Key Bob it to Bob 3. Bob uses her public key to encrypt message for Alice. Disadvantage: 1. To communicate with Alice, Bob, at first, has to communicate with the PKI.
  • 2. Identity Based Encryption (IDE): In IDE, one’s publicly known identity (ex. email address) is being used as his/her public key where as corresponding private key is generated from the known identity. IDE encryption scheme is a four algorithms/steps scheme where the algorithms are i. Setup Algorithm ii. Key (private key) Generation Algorithm iii. Encryption Algorithm iv. Decryption Algorithm. Setup and Key Generation: Private Key Generator (PKG) 1. Set up Algorithm generate a master key for Alice Master Key 2. Alice show & Prove her 3. Given the identity, Key Generation Algorithm Identity to PKG generate Private key for Alice. Identity Private Key Ex: [email protected] Encryption & Decryption: 1. Bob knows & uses Alice's Private Key Generator Identity to encrypt the message (PKG) Bob Alice Master Key 2. Alice uses her Private Key to decrypt the message Identity Private Key [email protected] Advantage: 1. Bob does not need to contact KDC / CA for Alice’s Public Key. He knows Alice’s Identity which he uses to encrypt message for Alice.
  • 3. Fuzzy Identity Based Encryption (Fuzzy-IDE): Fuzzy Identity of a person is a set of descriptive attributes which a predefined error tolerance capability. In Fuzzy-IDE, these attributes are used as one’s known public key. Setup & Key Generation Private Key Generator (PKG) 1. Given a Error Tolerance factor d, set up algorithm generates a Master key for Alice. Master Key 2. Alice's Identity w is being decided Fuzzy Identity (w) Private Key 3. Given Identity w, Key Generation Algorithm generates Alice's Private Attr1 ... AttrN key. Advantage: With her private key, Alice can decrypt messages encrypted with her own identity (w). She can also decrypt messages encrypted with other’s identity (w’) if |w ∩w’| >= d. Encryption & Decryption in Fuzzy IDE System 1. Charlie encrypt Message(M) 3. Alice can also decrypt M with her with Bob's Identity w' private Key with (|w∩w'| >= d) Charlie Bob Alice (Identity w'') (Identity w') (Identity w) 2. Bob can decrypt M with his private Key Example: Person Fuzzy Identity d Comment Alice w={“exam-committee”, “chair”, 2 Alice can decrypt everything that Bob & “system”} Charile can Decrypt. Because |w ∩w’|>=2 and |w ∩w’’|>=2 Bob w’={“exam-committee”, 3 Bob can only decrypt message encrypted “faculty”, “system”, “usa”} with Charlie’s identity as |w’ ∩w’’|>=3 Charlie w’’={“exam-committee”, 4 Charlie cannot decrypt any message that “student”, “system”, “usa”} are encrypted with others identity.
  • 4. Attribute-based Encryption (or Key-policy ABE): Access Tree / Key-policy(Ƭ): Access Policy to be associated with private key where leaf nodes are attributes coming from fuzzy identity. OR AND Dean 2 out of 3 Computer Science Admission- Computer Science Admission- faculty committee committee Account Setup & Key-generation: Private Key Generator (PKG) 1. Setup Algorithm generates Alice's Master Key Master Key 4. Given the Key-policy, Key Generation Algorithm generates 2. Alice's Identity is being decided Private key for Alice. Fuzzy Identity (w) Private Key 3. Alice's Key Policy is being decided from her identity Attr1 ... AttrN Key Policy Encryption & Decryption: 3. Alice can decrypt M if her key policy is satisfied with γ. ie Ƭ(γ)=1 Bob Alice Charlie (Identity w) (Identity w') (Identity w'') 2. Bob can decrypt M if his 1. Charlie encrypt Message(M) key policy is satisfied with γ. with a set of attributes γ (not ie Ƭ(γ)=1 with anyone's identity )
  • 5. Example: Assuming, Alice has the following key policy OR AND Dean 2 out of 3 Computer Science Admission- Computer Science Admission- faculty committee committee Alice can decrypt a file encrypted with the attribute set {“Computer Science”, “Admission committee”}. But she cannot decrypt another ciphertext associated with attributes {“Computer Science”, “program- committee”}. Variations of ABE: Ciphertext-Policy ABE vs. Key-policy ABE: While in original ABE (key-policy ABE) access policy is associated with the private key, in Ciphertext– policy ABE, access policy is associated in the ciphertext. Key-policy ABE Ciphertext-policy ABE pon B E s ts Ciphertext Private key ent com y A en Ciphertext Private key pon ed t-polic ed y ABE com Sel hertex Attribute sel -polic Policy Association Association Policy Attribute e ct e ct Association K ey Cip Association
  • 6. ABE with monotonic Access Structure vs. ABE with non-monotonic Access Structure: Monotonic Access structure uses ‘AND gate’, ‘OR gate’, or ‘k out of N’ threshold gate. Non-Monotonic Access structure uses Monotonic Access structure and additional ‘NOT gate’. Example: OR Monotonic Access Dean 2 out of 3 AND structure Computer Science Admission- Computer Science Admission- faculty committee committee Example: OR Non- Monotonic AND Dean 2 out of 3 Access structure Computer Science Admission- Computer Science program- NOT committee committee Student Hierarchical ABE (HABE): In HABE, the attributes are classified into trees according to their relationship defined in the access control system. Every node in this tree is associated with an attribute, and an ancestral node can derive its descendant’s key, but the reverse is not allowed. Attribute1 Attribute1 can be used instead of any or all the attributes of this tree Attribute2 can be used instead of attribute4 or attribute 5 or both of them but not vice versa. Attribute2 Attribute3 Attribute4 Attribute5 Single Authority ABE vs. Multi-authority ABE: