Attribute-Based Encryption for Circuits of Unbounded Depth from Lattices

被引:2
|
作者
Hsieh, Yao-Ching [1 ]
Lin, Huijia [1 ]
Luo, Ji [1 ]
机构
[1] Univ Washington, Paul G Allen Sch Comp Sci & Engn, Seattle, WA 98195 USA
关键词
D O I
10.1109/FOCS57990.2023.00031
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Although we have known about fully homomorphic encryption (FHE) from circular security assumptions for over a decade [Gentry, FOCS '10; Brakerski-Vaikuntanathan, STOC '11], there is still a significant gap in understanding related homomorphic primitives supporting all unrestricted polynomial-size computations. One prominent example is attribute-based encryption (ABE). The state-of-the-art constructions, relying on the hardness of learning with errors (LWE) [Gorbunov-Vaikuntanathan-Wee, STOC '13; Boneh et al., Eurocrypt '14], only accommodate circuits up to all predetermined depth, akin to leveled homomorphic encryption. In addition, their components (master public key, secret keys, and ciphertexts) have sizes polynomial in the maximum circuit depth. Even in the simpler setting where a single key is published (or a single circuit is involved), the depth dependency persists, showing up in constructions of 1-key ABE and related primitives, including laconic function evaluation (LFE), 1-key functional encryption (FE), and reusable garbling schemes. So far, the only approach of eliminating depth dependency relies on indistinguishability obfuscation. Intriguingly, for over a decade, it has remained unclear whether the circular security assumptions empowering FHE can similarly benefit ABE. In this work, we introduce new lattice-based techniques to overcome the depth-dependency limitations: center dot Relying on a circular security assumption, we construct LFE, 1-key FE, 1-key ABE, and reusable garbling schemes capable of evaluating circuits of unbounded depth and size. center dot Based on the evasive circular LWE assumption, a stronger variant of the recently proposed evasive LWE assumption [Wee, Eurocrypt '22; Tsabary, Crypto '22], we construct a full-fledged ABE scheme for circuits of unbounded depth and size. Our constructions eliminate the multiplicative overheads polynomial in depth from previous constructions. Our LFE, 1-key FE, and reusable garbling schemes achieve almost optimal succinctness. Their ciphertexts and input encodings are proportional in length to the input, while function digest, secret keys, and garbled circuits maintain a constant size independent of circuit parameters. Our ABE schemes offer short components, with master public key and ciphertext sizes linear in the attribute length and secret key being constant-size.
引用
收藏
页码:415 / 434
页数:20
相关论文
共 50 条
  • [21] LSSS Matrix-Based Attribute-Based Encryption on Lattices
    Zhao, Jian
    Gao, Haiying
    [J]. 2017 13TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2017, : 253 - 257
  • [22] Ciphertext policy attribute-based encryption scheme supporting Boolean circuits over ideal lattices
    Ma, Chao
    Gao, Haiying
    Hu, Bin
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2024, 84
  • [23] Ciphertext Policy Attribute-Based Encryption for Circuits from LWE Assumption
    Wang, Geng
    Liu, Zhen
    Gu, Dawu
    [J]. INFORMATION AND COMMUNICATIONS SECURITY (ICICS 2019), 2020, 11999 : 378 - 396
  • [24] Ciphertext policy attribute-based encryption supporting unbounded attribute space from R-LWE
    Chen, Zehong
    Zhang, Peng
    Zhang, Fangguo
    Huang, Jiwu
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2017, 11 (04): : 2292 - 2309
  • [25] Attribute-Based Fully Homomorphic Encryption Scheme from Lattices with Short Ciphertext
    Liu, Yuan
    Pan, Yun
    Gu, Lize
    Zhang, Yuan
    An, Dezhi
    [J]. MATHEMATICAL PROBLEMS IN ENGINEERING, 2021, 2021
  • [26] An Attribute-Based Encryption Scheme with LSSS Key-Policy from Lattices
    Liu, Lihua
    Wang, Shangping
    [J]. LECTURE NOTES IN REAL-TIME INTELLIGENT SYSTEMS (RTIS 2016), 2018, 613 : 217 - 230
  • [27] Attribute-based encryption
    Sahai, Amit
    Waters, Brent
    Lu, Steve
    [J]. Cryptology and Information Security Series, 2009, 2 : 156 - 168
  • [28] Provable Security Analysis on Unbounded Hierarchical Identity-based Encryption and Attribute-based Encryption
    Jiang, Yajun
    Du, Ming
    [J]. 2016 3RD INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND CONTROL ENGINEERING (ICISCE), 2016, : 510 - 513
  • [29] Attribute-based signatures from lattices: unbounded attributes and semi-adaptive security
    Luo, Fucai
    Al-Kuwari, Saif
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2022, 90 (05) : 1157 - 1177
  • [30] Attribute-based signatures from lattices: unbounded attributes and semi-adaptive security
    Fucai Luo
    Saif Al-Kuwari
    [J]. Designs, Codes and Cryptography, 2022, 90 : 1157 - 1177