slide1 l.
Download
Skip this Video
Loading SlideShow in 5 Seconds..
EASiER: Encryption-based Access Control in Social Networks with Efficient Revocation PowerPoint Presentation
Download Presentation
EASiER: Encryption-based Access Control in Social Networks with Efficient Revocation

Loading in 2 Seconds...

play fullscreen
1 / 13

EASiER: Encryption-based Access Control in Social Networks with Efficient Revocation - PowerPoint PPT Presentation


  • 132 Views
  • Uploaded on

Sonia Jahid, Prateek Mittal, Nikita Borisov University of Illinois at Urbana-Champaign Presented by Nikita Borisov ASIACCS 2011. EASiER: Encryption-based Access Control in Social Networks with Efficient Revocation. Motivation. Encryption. Encrypt social network data

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'EASiER: Encryption-based Access Control in Social Networks with Efficient Revocation' - tacey


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
slide1
Sonia Jahid, Prateek Mittal, Nikita Borisov

University of Illinois at Urbana-Champaign

Presented by Nikita Borisov

ASIACCS 2011

EASiER: Encryption-based Access Control in Social Networks with Efficient Revocation

encryption
Encryption
  • Encrypt social network data
    • flyByNight [Lucas&Borisov’08]
    • NOYB [Guha et al.’09]
    • FaceCloak [Luo et al.’09]
    • Persona [Baden et al.’09]
  • Users directly control access
    • Grant access by distributing keys
    • Revoke access by…?
revocation
Revocation

Existing Data

Re-encrypt

Our Contribution:

Efficient revocation without rekeying or re-encryption, by using a minimally trusted proxy

Alice

Bob

Carol

Diana

Expensive!

system architecture

OR

AND

Colleague

1

Friend

Neighbor

System Architecture

KeyGen

Encrypt

Setup

Revoke

/KeyProxy

Decrypt

Convert

KeyProxy (Revoke Bob)

PK, MK

Alice

Proxy

CTcomponent

Modified CTcomponent

Carol

Diana

Bob

friend,

colleague

colleague

friend,

neighbor

algorithms basic idea cf naor pinkas 00
Algorithms - Basic Idea(cf. [Naor&Pinkas’00])

Point to

Determine, P(0)

SK

SKr,r1

SKr,r2

SKr,r3

SKr,r4

Convert

CT

CT’

security
Security
  • Immediate revocation
    • As soon as proxy updated
    • Including past data
  • Minimally trusted proxy
    • Cannot decrypt data
    • Cannot “unrevoke” users even if compromised
comparison
Comparison
  • Conventional revocation
    • Rekey 500 friends: 5s
    • Decrypt 2000 items: 13s
    • Encrypt 2000 items: 36s
  • EASiER: 1.5s
conclusion
Conclusion
  • We introduced an efficient revocation scheme for ABE
    • Useful in OSNs
    • Potential uses in other ABE deployments
  • Open problems
    • Forward security of proxy
    • Stronger security proofs

Sonia Jahid

Prateek Mittal

questions
Questions?

Sonia Jahid

Prateek Mittal