Puncturable identity-based and attribute-based encryption from lattices

被引:4
|
作者
Dutta, Priyanka [1 ]
Susilo, Willy [1 ]
Dung Hoang Duong [1 ]
Roy, Partha Sarathi [1 ]
机构
[1] Univ Wollongong, Sch Comp & Informat Technol, Inst Cybersecur & Cryptol, Northfields Ave, Wollongong, NSW 2522, Australia
基金
澳大利亚研究理事会;
关键词
Identity-based; Attribute-based; Puncturable encryption; Learning with errors;
D O I
10.1016/j.tcs.2022.06.028
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The concept of puncturable encryption (PE) was introduced by Green and Miers at IEEE S & P, 2015. PE allows recipients to update their decryption keys to revoke decryption capability for selected messages without communicating with senders. From the first instantiation, PE shows its essence for many interesting applications, such as asynchronous messaging systems, group messaging systems, public-key watermarking schemes, secure cloud emails, and many more. To eliminate the necessity of having a costly certificate verification process, Wei et al. introduced puncturable identity-based encryption (PIBE) at ESORICS, 2019. Unfortunately, till today, there is no PIBE, which can withstand quantum attack. In this paper, we aim to fill this gap in the literature by presenting the first constructions of PIBE, for both selective and adaptive identity, which are secure in the standard model based on the hardness of learning with errors problem. Finally, we extend the design idea of selectively secure PIBE to provide the first construction of lattice -based puncturable key-policy attribute-based encryption (KP-PABE), which can facilitate fine-grained access mechanism with decryption revocation. Design ideas of proposed constructions can, also, be useful to construct other lattice-based expressive PE. (c) 2022 Elsevier B.V. All rights reserved.
引用
收藏
页码:18 / 38
页数:21
相关论文
共 50 条
  • [1] Puncturable Identity-Based Encryption from Lattices
    Dutta, Priyanka
    Susilo, Willy
    Duong, Dung Hoang
    Roy, Partha Sarathi
    [J]. INFORMATION SECURITY AND PRIVACY, ACISP 2021, 2021, 13083 : 571 - 589
  • [2] Puncturable Attribute-Based Encryption From Lattices for Classified Document Sharing
    Yang, Mengxue
    Wang, Huaqun
    He, Debiao
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 4028 - 4042
  • [3] Attribute-based encryption implies identity-based encryption
    Herranz, Javier
    [J]. IET INFORMATION SECURITY, 2017, 11 (06) : 332 - 337
  • [4] Hierarchical Identity-based Puncturable Encryption from Lattices with Application to Forward Security
    Dutta, Priyanka
    Jiang, Mei
    Dung Hoang Duong
    Susilo, Willy
    Fukushima, Kazuhide
    Kiyomoto, Shinsaku
    [J]. ASIA CCS'22: PROCEEDINGS OF THE 2022 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2022, : 408 - 422
  • [5] Provably Secure Ciphertext-Policy Attribute-Based Encryption from Identity-Based Encryption
    Tseng, Yi-Fan
    Fan, Chun-, I
    Lin, Chih-Wen
    [J]. JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2019, 25 (03) : 182 - 202
  • [6] Provable Security Analysis on Unbounded Hierarchical Identity-based Encryption and Attribute-based Encryption
    Jiang, Yajun
    Du, Ming
    [J]. 2016 3RD INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND CONTROL ENGINEERING (ICISCE), 2016, : 510 - 513
  • [7] Attribute-Based Encryption for Circuits on Lattices
    Zhao, Jian
    Gao, Haiying
    Zhang, Junqi
    [J]. TSINGHUA SCIENCE AND TECHNOLOGY, 2014, 19 (05) : 463 - 469
  • [8] Attribute-Based Functional Encryption on Lattices
    Boyen, Xavier
    [J]. THEORY OF CRYPTOGRAPHY (TCC 2013), 2013, 7785 : 122 - 142
  • [9] Attribute-Based Encryption for Circuits on Lattices
    Jian Zhao
    Haiying Gao
    Junqi Zhang
    [J]. Tsinghua Science and Technology, 2014, 19 (05) : 463 - 469
  • [10] Wildcarded identity-based encryption from lattices
    Minh Thuy Truc Pham
    Ngoc Ai Van Nguyen
    Jiang, Mei
    Dung Hoang Duong
    Susilo, Willy
    [J]. THEORETICAL COMPUTER SCIENCE, 2022, 902 : 41 - 53