## CryptoDB

### Paper: Attribute Based Encryption for Deterministic Finite Automata from $\mathsf{DLIN}$

Authors: Shweta Agrawal Monosij Maitra Shota Yamada DOI: 10.1007/978-3-030-36033-7_4 Search ePrint Search Google Waters [Crypto, 2012] provided the first attribute based encryption scheme ABE for Deterministic Finite Automata (DFA) from a parametrized or “q-type” assumption over bilinear maps. Obtaining a construction from static assumptions has been elusive, despite much progress in the area of ABE.In this work, we construct the first attribute based encryption scheme for DFA from static assumptions on pairings, namely, the $\mathsf{DLIN}$ assumption. Our scheme supports unbounded length inputs, unbounded length machines and unbounded key requests. In more detail, secret keys in our construction are associated with a DFA M of unbounded length, ciphertexts are associated with a tuple $(\mathbf {x}, \mathsf {\mu })$ where $\mathbf {x}$ is a public attribute of unbounded length and $\mathsf {\mu }$ is a secret message bit, and decryption recovers $\mathsf {\mu }$ if and only if $M(\mathbf {x})=1$.Our techniques are at least as interesting as our final result. We present a simple compiler that combines constructions of unbounded ABE schemes for monotone span programs (MSP) in a black box way to construct ABE for DFA. In more detail, we find a way to embed DFA computation into monotone span programs, which lets us compose existing constructions (modified suitably) of unbounded key-policy ABE (${\mathsf {kpABE}}$) and unbounded ciphertext-policy ABE (${\mathsf {cpABE}}$) for MSP in a simple and modular way to obtain key-policy ABE for DFA. Our construction uses its building blocks in a symmetric way – by swapping the use of the underlying ${\mathsf {kpABE}}$ and ${\mathsf {cpABE}}$, we also obtain a construction of ciphertext-policy ABE for DFA.Our work extends techniques developed recently by Agrawal, Maitra and Yamada [Crypto 2019], which show how to construct ABE that support unbounded machines and unbounded inputs by combining ABE schemes that are bounded in one co-ordinate. At the heart of our work is the observation that unbounded, multi-use ABE for MSP already achieve most of what we need to build ABE for DFA.
##### BibTeX
@article{tcc-2019-29990,
title={Attribute Based Encryption for Deterministic Finite Automata from $\mathsf{DLIN}$},
booktitle={Theory of Cryptography},
series={Lecture Notes in Computer Science},
publisher={Springer},
volume={11892},
pages={91-117},
doi={10.1007/978-3-030-36033-7_4},
author={Shweta Agrawal and Monosij Maitra and Shota Yamada},
year=2019
}