Targeted Homomorphic Attribute-Based Encryption

被引:38
|
作者
Brakerski, Zvika [1 ]
Cash, David [2 ]
Tsabary, Rotem [1 ]
Wee, Hoeteck [3 ,4 ]
机构
[1] Weizmann Inst Sci, Rehovot, Israel
[2] Rutgers State Univ, New Brunswick, NJ USA
[3] CNRS, ENS, Paris, France
[4] Columbia Univ, Paris, France
来源
关键词
D O I
10.1007/978-3-662-53644-5_13
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In (key-policy) attribute-based encryption (ABE), messages are encrypted respective to attributes x, and keys are generated respective to policy functions f. The ciphertext is decryptable by a key only if f(x) = 0. Adding homomorphic capabilities to ABE is a long standing open problem, with current techniques only allowing compact homomorphic evaluation on ciphertext respective to the same x. Recent advances in the study of multi-key FHE also allow cross-attribute homomorphism with ciphertext size growing (quadratically) with the number of input ciphertexts. We present an ABE scheme where homomorphic operations can be performed compactly across attributes. Of course, decrypting the resulting ciphertext needs to be done with a key respective to a policy f with f(x(i)) = 0 for all attributes involved in the computation. In our scheme, the target policy f needs to be known to the evaluator, we call this targeted homomorphism. Our scheme is secure under the polynomial hardness of learning with errors (LWE) with sub-exponential modulusto-noise ratio We present a second scheme where there needs not be a single target policy. Instead, the decryptor only needs a set of keys representing policies f(j) s.t. for any attribute xi there exists f(j) with f(j)(x(i)) = 0. In this scheme, the ciphertext size grows (quadratically) with the size of the set of policies (and is still independent of the number of inputs or attributes). Again, the target set of policies needs to be known at evaluation time. This latter scheme is secure in the random oracle model under the polynomial hardness of LWE with sub-exponential noise ratio.
引用
收藏
页码:330 / 360
页数:31
相关论文
共 50 条
  • [1] Attribute-Based Adaptive Homomorphic Encryption for Big Data Security
    Thenmozhi, R.
    Shridevi, S.
    Mohanty, Sachi Nandan
    Garcia Diaz, Vicente
    Gupta, Deepak
    Tiwari, Prayag
    Shorfuzzaman, Mohammad
    [J]. BIG DATA, 2021,
  • [2] Attribute-Based Fully Homomorphic Encryption Scheme from Lattices with Short Ciphertext
    Liu, Yuan
    Pan, Yun
    Gu, Lize
    Zhang, Yuan
    An, Dezhi
    [J]. MATHEMATICAL PROBLEMS IN ENGINEERING, 2021, 2021
  • [3] Attribute-Based Encryption for Circuits
    Gorbunov, Sergey
    Vaikuntanathan, Vinod
    Wee, Hoeteck
    [J]. STOC'13: PROCEEDINGS OF THE 2013 ACM SYMPOSIUM ON THEORY OF COMPUTING, 2013, : 545 - 554
  • [4] Decentralizing Attribute-Based Encryption
    Lewko, Allison
    Waters, Brent
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2011, 2011, 6632 : 568 - 588
  • [5] Registered Attribute-Based Encryption
    Hohenberger, Susan
    Lu, George
    Waters, Brent
    Wu, David J.
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2023, PT III, 2023, 14006 : 511 - 542
  • [6] Attribute-Based Encryption for Circuits
    Gorbunov, Sergey
    Vaikuntanathan, Vinod
    Wee, Hoeteck
    [J]. JOURNAL OF THE ACM, 2015, 62 (06)
  • [7] Distributed Attribute-Based Encryption
    Mueller, Sascha
    Katzenbeisser, Stefan
    Eckert, Claudia
    [J]. INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2008, 2009, 5461 : 20 - 36
  • [8] Multi-party (Leveled) Homomorphic Encryption on Identity-Based and Attribute-Based Settings
    Kuchta, Veronika
    Sharma, Gaurav
    Sahu, Rajeev Anand
    Markowitch, Olivier
    [J]. INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2017, 2018, 10779 : 71 - 92
  • [9] Enhancing Attribute-Based Encryption with Attribute Hierarchy
    Li, Jin
    Wang, Qian
    Wang, Cong
    Ren, Kui
    [J]. MOBILE NETWORKS & APPLICATIONS, 2011, 16 (05): : 553 - 561
  • [10] Enhancing Attribute-Based Encryption with Attribute Hierarchy
    Jin Li
    Qian Wang
    Cong Wang
    Kui Ren
    [J]. Mobile Networks and Applications, 2011, 16 : 553 - 561