Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
144 tokens/sec
GPT-4o
7 tokens/sec
Gemini 2.5 Pro Pro
46 tokens/sec
o3 Pro
4 tokens/sec
GPT-4.1 Pro
38 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

HetDAPAC: Distributed Attribute-Based Private Access Control with Heterogeneous Attributes (2401.13653v1)

Published 24 Jan 2024 in cs.IT, cs.CR, cs.NI, eess.SP, and math.IT

Abstract: Verifying user attributes to provide fine-grained access control to databases is fundamental to an attribute-based authentication system. In such systems, either a single (central) authority verifies all attributes, or multiple independent authorities verify individual attributes distributedly to allow a user to access records stored on the servers. While a \emph{central} setup is more communication cost efficient, it causes privacy breach of \emph{all} user attributes to a central authority. Recently, Jafarpisheh et al. studied an information theoretic formulation of the \emph{distributed} multi-authority setup with $N$ non-colluding authorities, $N$ attributes and $K$ possible values for each attribute, called an $(N,K)$ distributed attribute-based private access control (DAPAC) system, where each server learns only one attribute value that it verifies, and remains oblivious to the remaining $N-1$ attributes. We show that off-loading a subset of attributes to a central server for verification improves the achievable rate from $\frac{1}{2K}$ in Jafarpisheh et al. to $\frac{1}{K+1}$ in this paper, thus \emph{almost doubling the rate} for relatively large $K$, while sacrificing the privacy of a few possibly non-sensitive attributes.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (12)
  1. A. Sahai and B. Waters. Fuzzy identity-based encryption. In Advances in Cryptology – EUROCRYPT, May 2005.
  2. M. Chase. Multi-authority attribute based encryption. In Theory of Cryptography - TCC, February 2007.
  3. Privacy preserving cloud data access with multi-authorities. In IEEE Infocom, April 2013.
  4. Efficient attribute-based encryption with privacy-preserving key generation and its application in industrial cloud. Secure Communication Networks, 2019:3249726:1–3249726:9, May 2019.
  5. Privacy-preserving personal health record (P3HR): A secure Android application. In ACM ICSIE, May 2018.
  6. Distributed attribute-based private access control. In IEEE ISIT, July 2022.
  7. H. Sun and S. A. Jafar. The capacity of symmetric private information retrieval. IEEE Transactions on Information Theory, 65(1):322–329, January 2019.
  8. H. Sun and S. A. Jafar. The capacity of private information retrieval. IEEE Transactions on Information Theory, 63(7):4075–4088, July 2017.
  9. Private retrieval, computing, and learning: Recent progress and future challenges. IEEE Journal on Selected Areas in Communications, 40(3):729–748, March 2022.
  10. K. Banawan and S. Ulukus. Private information retrieval from non-replicated databases. In IEEE ISIT, July 2019.
  11. Private information retrieval in graph-based replication systems. IEEE Transactions on Information Theory, 66(6):3590–3602, June 2019.
  12. Y. Yao and S. Jafar. The capacity of 4-star-graph PIR. In IEEE ISIT, July 2023.

Summary

We haven't generated a summary for this paper yet.