Crates.io | abe_gpsw |
lib.rs | abe_gpsw |
version | 2.0.0 |
source | src |
created_at | 2021-11-25 15:01:43.483384 |
updated_at | 2022-09-01 12:30:16.743232 |
description | ABE GPSW scheme for BLS pairing implemented in rust |
homepage | |
repository | https://github.com/Cosmian/abe_gpsw |
max_upload_size | |
id | 487623 |
size | 783,046 |
This crate provides a Key-Policy Attribute-Based Encryption implementation based on Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data written by Vipul Goyal, Omkant Pandey, Amit Sahai, Brent Waters.
The implementation uses the BLS12-381 elliptic curve for pairing.
See the demo code which contains a complete usage of the API with detailed comments.
Run it as a test using
cargo test core::demo::abe -- --nocapture`
The crate is separated in 2 main modules:
core
: contains the cryptographic code for GPSW. The main entry point is the engine which use is demonstrated in the demo code.interfaces
: contains interfaces useful for Cosmian matching those in crypto_base as well as a Foreign Function Interface (FFI) useful to integrate with other languages. In particular, the code in this module demonstrates the use of hybrid cryptography involving ABE and AES and exposes it as a FFI.To build the core only, run
cargo build --release
To build the Cosmian interfaces without FFI, pass the interfaces
feature flag, i.e.
cargo build --release --features interfaces
To build everything, including the FFI, pass the ffi
feature flag, or use --all-features
i.e.
cargo build --release --all-features
The latter will build a shared library and one can verify that the FFI symbols are present using (linux)
objdump -T target/release/libabe_gpsw.so
The code contains numerous tests that you can run using
cargo test --release --all-features
Go to the build directory for an example on hw to build for GLIBC 2.17
Benchmarking is using Criterion library.
Run all benchmarks:
cargo bench --all-features
note: unfortunately, we cannot automatically tell Criterion to run benchmarks with ffi
feature activated, we need to specify it.
Run only non-FFI benchmarks:
cargo bench --features interfaces
To generate a Flamegraph on Criterion's benchmark:
cargo flamegraph --bench benches --features ffi -- --bench
In a standard public-key encryption scheme, each user has his own public key and secret key, so that if one wants to encrypt a message intended for several receivers (for example, according to their jobs in a company), it will be necessary to compute the ciphertext for each public key of each recipient, which implies a huge loss of time and space.
While public key encryption is widely used and has a lot of interest in many applications, there is a limitation in this "one-to-many" scenario.
One might think that the trivial solution consisting of sharing a common secret key among all legitimate receivers would be sufficient. However, this is not the case, mainly because the security notions in "one-to-many" communications need to be extended to meet practical requirements. Therefore, if a common secret key is shared among all the receivers, then one of the receivers can give it to the adversary. Consequently, on the one hand, the confidentiality of the whole system is totally broken and on the other hand, we have no idea who the source of secret leakage is and we can not detect and exclude this source.
New schemes were developed recently to address this particular setting where the encrypted data is intended for multiple users.
Attribute-Based Encryption (ABE) is a relatively recent approach that aims to solve the problem of access control and "one-to-many" communications and storage. ABE defines the identity as a set of attributes, e.g., roles. This way messages can now be encrypted with respect to subsets of attributes or policies defined over a set of attributes (key-policy or ciphertext-policy).
First ABE scheme was formalised as Fuzzy Identity-Based Encryption in Fuzzy Identity-based Encryption. The main feature is that only users holding a key for "matching attributes" should be able to decrypt a ciphertext and user keys are always issued by some trusted party.
Some specificities of ABE schemes are:
In Ciphertext-Policy Attribute-Based Encryption (CP-ABE), the access policy is encoded in the encrypted message; a ciphertext specifies an access policy over a defined universe of attributes within the system. A user’s private key is associated with a set of attributes which corresponds to a user’s identity: a user will be able to decrypt a ciphertext, if and only if his attributes satisfy the policy of the respective ciphertext. See for example BSW07.
KP-ABE is the dual to CP-ABE in the sense that an access policy is encoded into the users secret key, e.g., (𝐴∧𝐶)∨𝐷, and a ciphertext is computed with respect to a set of attributes, e.g., {𝐴,𝐵}. In this example the user would not be able to decrypt the ciphertext but would for instance be able to decrypt a ciphertext with respect to {𝐴,𝐶}. See for example [GPSW06].
Policies in GPSW use monotone access structures.
In order to make policies more user friendly, Cosmian implements an indirection between the way the user expresses a policy and the actual attribute values used in GPSW.
From a user perspective, the overall policy is expressed as a set of policy axes. Each axis can be optionally marked as being hierarchical, and contains an enumeration of the possible values for that axis. For an hierarchical axis the attributes must be provided in ascending order.
For instance, the policy
[
"Security Level": {
"hierarchical": true,
"attributes": ["low","medium","high"]
},
"Department": {
"hierarchical": false,
"attributes": ["HR","FIN","MKG","R&D"]
}
]
defines 2 axis Security Level
and Department
.
Here, the use of axis allows to handle access policies encoded as CNF formulas.
Contrarily to the Department
axis, the Security Level
axis is hierarchical: a user that possesses a key with an attribute Security Level::high
will have access to data encrypted with any of the attributes of the Security Level
.
All unique attribute names (7 in the example above) are derived by concatenating the axis names and the possible values for that axis, and are assigned a unique attribute value:
Attribute name | Value |
---|---|
Department::HR | 1 |
Department::FIN | 2 |
Department::MKG | 3 |
Department::R&D | 4 |
Security Level::low | 5 |
Security Level::medium | 6 |
Security Level::high | 7 |
From the master secret key, a derived decryption key for a user of the marketing department (MKG
) with a medium
security level will hold an access policy expressed as the boolean expression:
"Department::MKG && ( Security Level::medium || Security Level::low )"
Finally, since attribute names are mapped to attribute values, the policy above is translated in GPSW as
3 & ( 6 | 5 )
This KP-ABE implementation is based on the crate cosmian_bls12_381, a pairing-friendly elliptic curve construction from the BLS family, with embedding degree 12. It is built over a 381-bit prime field GF(p)
with...
-0xd201000000010000
0x1a0111ea397fe69a4b1ba7b6434bacd764774b84f38512bf6730d2a0f6b0f6241eabfffeb153ffffb9feffffffffaaab
0x73eda753299d7d483339d80809a1d80553bda402fffe5bfeffffffff00000001
... yielding two source groups G1 and G2, each of 255-bit prime order q
, such that an efficiently computable non-degenerate bilinear pairing function e
exists into a third target group GT. Specifically, G1 is the q
-order subgroup of E(Fp) : y2 = x3 + 4 and G2 is the q
-order subgroup of E'(Fp2) : y2 = x3 + 4(u + 1) where the extension field Fp2 is defined as Fp(u) / (u2 + 1).
BLS12-381 is chosen so that z
has small Hamming weight (to improve pairing performance) and also so that GF(q)
has a large 232 primitive root of unity for performing radix-2 fast Fourier transforms for efficient multi-point evaluation and interpolation. It is also chosen so that it exists in a particularly efficient and rigid subfamily of BLS12 curves.