Dually Computable Cryptographic Accumulators and Their Application to Attribute Based Encryption

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

In 1993, Benaloh and De Mare introduced cryptographic accumulator, a primitive that allows the representation of a set of values by a short object (the accumulator) and offers the possibility to prove that some input values are in the accumulator. For this purpose, so-called asymmetric accumulators require the creation of an additional cryptographic object, called a witness. Through the years, several instantiations of accumulators were proposed either based on number theoretic assumptions, hash functions, bilinear pairings or more recently lattices. In this work, we present the first instantiation of an asymmetric cryptographic accumulator that allows private computation of the accumulator but public witness creation. This is obtained thanks to our unique combination of the pairing based accumulator of Nguyen with dual pairing vector spaces. We moreover introduce the new concept of dually computable cryptographic accumulators, in which we offer two ways to compute the representation of a set: either privately (using a dedicated secret key) or publicly (using only the scheme’s public key), while there is a unique witness creation for both cases. All our constructions of accumulators have constant size accumulated value and witness, and satisfy the accumulator security property of collision resistance, meaning that it is not possible to forge a witness for an element that is not in the accumulated set. As a second contribution, we show how our new concept of dually computable cryptographic accumulator can be used to build a Ciphertext Policy Attribute Based Encryption (CP-ABE). Our resulting scheme permits policies expressed as disjunctions of conjunctions (without “NO” gates), and is adaptively secure in the standard model. This is the first CP-ABE scheme having both constant-size user secret keys and ciphertexts (i.e. independent of the number of attributes in the scheme, or the policy size). For the first time, we provide a way to use cryptographic accumulators for both key management and encryption process.

Original languageEnglish
Title of host publicationCryptology and Network Security - 22nd International Conference, CANS 2023, Proceedings
EditorsJing Deng, Vladimir Kolesnikov, Alexander A. Schwarzmann
PublisherSpringer Science and Business Media Deutschland GmbH
Pages538-562
Number of pages25
ISBN (Print)9789819975624
DOIs
Publication statusPublished - 1 Jan 2023
Event22nd International Conference on Cryptology and Network Security, CANS 2023 - Augusta, United States
Duration: 31 Oct 20232 Nov 2023

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume14342 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference22nd International Conference on Cryptology and Network Security, CANS 2023
Country/TerritoryUnited States
CityAugusta
Period31/10/232/11/23

Keywords

  • Attribute based encryption
  • Cryptographic accumulators
  • Dual pairing vector spaces
  • Pairing

Fingerprint

Dive into the research topics of 'Dually Computable Cryptographic Accumulators and Their Application to Attribute Based Encryption'. Together they form a unique fingerprint.

Cite this