HetDAPAC: Distributed Attribute-Based Private Access Control with Heterogeneous Attributes (2401.13653v1)
Abstract: Verifying user attributes to provide fine-grained access control to databases is fundamental to an attribute-based authentication system. In such systems, either a single (central) authority verifies all attributes, or multiple independent authorities verify individual attributes distributedly to allow a user to access records stored on the servers. While a \emph{central} setup is more communication cost efficient, it causes privacy breach of \emph{all} user attributes to a central authority. Recently, Jafarpisheh et al. studied an information theoretic formulation of the \emph{distributed} multi-authority setup with $N$ non-colluding authorities, $N$ attributes and $K$ possible values for each attribute, called an $(N,K)$ distributed attribute-based private access control (DAPAC) system, where each server learns only one attribute value that it verifies, and remains oblivious to the remaining $N-1$ attributes. We show that off-loading a subset of attributes to a central server for verification improves the achievable rate from $\frac{1}{2K}$ in Jafarpisheh et al. to $\frac{1}{K+1}$ in this paper, thus \emph{almost doubling the rate} for relatively large $K$, while sacrificing the privacy of a few possibly non-sensitive attributes.
- A. Sahai and B. Waters. Fuzzy identity-based encryption. In Advances in Cryptology – EUROCRYPT, May 2005.
- M. Chase. Multi-authority attribute based encryption. In Theory of Cryptography - TCC, February 2007.
- Privacy preserving cloud data access with multi-authorities. In IEEE Infocom, April 2013.
- Efficient attribute-based encryption with privacy-preserving key generation and its application in industrial cloud. Secure Communication Networks, 2019:3249726:1–3249726:9, May 2019.
- Privacy-preserving personal health record (P3HR): A secure Android application. In ACM ICSIE, May 2018.
- Distributed attribute-based private access control. In IEEE ISIT, July 2022.
- H. Sun and S. A. Jafar. The capacity of symmetric private information retrieval. IEEE Transactions on Information Theory, 65(1):322–329, January 2019.
- H. Sun and S. A. Jafar. The capacity of private information retrieval. IEEE Transactions on Information Theory, 63(7):4075–4088, July 2017.
- Private retrieval, computing, and learning: Recent progress and future challenges. IEEE Journal on Selected Areas in Communications, 40(3):729–748, March 2022.
- K. Banawan and S. Ulukus. Private information retrieval from non-replicated databases. In IEEE ISIT, July 2019.
- Private information retrieval in graph-based replication systems. IEEE Transactions on Information Theory, 66(6):3590–3602, June 2019.
- Y. Yao and S. Jafar. The capacity of 4-star-graph PIR. In IEEE ISIT, July 2023.