UTCS Colloquium: Brent Waters SRI International Attribute-Based Encryption: A Cryptosystem for Expressive Access Control on Encrypted Data ACES 6.304 Monday April 2 2007 at 11:00 a.m.

Contact Name: 
Jenna Whitney
Date: 
Apr 2, 2007 11:00am - 12:00pm

There is a signup schedule for this event.

Type of Ta

lk: UTCS Colloquia

Speaker Name: Brent Waters

Speaker Affil

iation: SRI International

Date: Monday April 2 2007

Start
Time: 11:00a.m.

End Time: 12:00p.m.

Location: ACES 6.304<

br>
Host: Vitaly Shmatikov

Talk Title: Attribute-Based Encrypti

on: A Cryptosystem for Expressive Access
Control on Encrypted Data
Talk Abstract:
Several distributed file and information systems requir

e complex
access-control mechanisms where access decisions depend upon

attributes of the protected data and access policies assigned to users.

Traditionally such access-control mechanisms have been enforced by aserver that acts as a trusted reference monitor; the monitor will only a

llow
a user to view data if his access policy allows it. While the use

of trusted
servers allows for a relatively straightforward solution the

re is a large
downside to this approach --- both the servers and their

storage must be
trusted and remain uncompromised. A natural solution to
this problem is to
encrypt stored data. However traditional public-key
encryption methods
require that data be encrypted to one particular use

r''s public key and are
unsuitable for expressing more complex access co

ntrol policies.

In this talk I will present recent work on a new cr

yptographic primitive called
Attribute-Based Encryption (ABE) that was
created to address this issue.
Attribute-Based Encryption allows for e

xpressive access policies over
encrypted data. In an ABE system encrypte

d data is annotated with descriptive
attributes and users'' private keys
are ascribed access formulas over these
attributes. For example if Car

ol is assigned to read and process
systems-seminar messages during the y

ear 2007 she would be ascribed the
private key with the access formula

Subj:Systems-Seminar AND Year:2007.

I will focus this talk on the ch

allenges of creating ABE systems that are both
secure and efficient. In

particular an ABE system must be secure against an
attacker that collec

ts several private keys from different colluding users. We
also want to

avoid designs that are prohibitively expensive; for example a
solution
should not include a separate public key/private for every possible
acc

ess control policy that might ever be used. In addition I will talk about<

br>recent efforts in implementing Attribute-Based Encryption and making it<

br>available as a tool to be used by researchers in systems security.