Secure and Efficient Multi-Authority Attribute-Based Encryption Scheme From Lattices

被引:7
|
作者
Liu, Yuan [1 ]
Wang, Licheng [1 ]
Li, Lixiang [1 ]
Yan, Xixi [2 ]
机构
[1] Beijing Univ Posts & Telecommun, State Key Lab Networking & Switching Technol, Beijing 100876, Peoples R China
[2] Henan Polytech Univ, Sch Comp Sci & Technol, Jiaozuo 454003, Peoples R China
来源
IEEE ACCESS | 2019年 / 7卷
基金
中国国家自然科学基金;
关键词
Learning with errors; MA-ABE; MP12; optimized sampling algorithm; standard model;
D O I
10.1109/ACCESS.2018.2888850
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Attribute-based encryption (ABE) mechanism on lattices can against quantum attack and guarantees fine-grained access control of encrypted data, and it has been widely used in cloud computing and privacy protection. However, the high complexity of the trapdoor generation and delegation and preimage sampling are the main barriers for the development of ABE schemes in a post-quantum world. Thus, we proposed a security and efficient multi-authority ABE scheme from lattices in this paper. The scheme is based on the theory of MP12 and is proved to be secure under the standard model. In this scheme, we construct an optimized sampling algorithm to generate a Z(q)-invertible matrix with a lower runtime. Based on it, combining the trapdoor generation and delegation algorithm in MP12, we designed multiple attribute authorities which can manage different attribute sets and generate private keys for the user independently. In addition, the Shamir's secret sharing technique is introduced to support policies expressed in any monotone access structures. Compared with the existing related schemes, the proposed scheme can improve the functional agility and the flexibility of the access policy prominently, and it also can achieve a better performance with less lattice dimension, trapdoor storage occupation, and ciphertext expansion rate. The analysis shows that our scheme is feasible and superior in the large-scale distributed environment.
引用
收藏
页码:3665 / 3674
页数:10
相关论文
共 50 条
  • [41] Multi-Authority Attribute-Based Encryption Access Control Scheme in Wireless Body Area Network
    Xiao, Min
    Hu, Xiaoyong
    [J]. 2018 3RD INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS ENGINEERING (ICISE), 2018, : 39 - 45
  • [42] Multi-authority attribute-based encryption access control scheme with policy hidden for cloud storage
    Zhong, Hong
    Zhu, Wenlong
    Xu, Yan
    Cui, Jie
    [J]. SOFT COMPUTING, 2018, 22 (01) : 243 - 251
  • [43] Multi-authority attribute based encryption
    Chase, Melissa
    [J]. Theory of Cryptography, Proceedings, 2007, 4392 : 515 - 534
  • [44] Multi-authority attribute-based encryption scheme with constant-size ciphertexts and user revocation
    Zhang, Xiao
    Wu, Faguo
    Yao, Wang
    Wang, Zhao
    Wang, Wenhua
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2019, 31 (21):
  • [45] Multi-authority attribute-based encryption access control scheme with policy hidden for cloud storage
    Hong Zhong
    Wenlong Zhu
    Yan Xu
    Jie Cui
    [J]. Soft Computing, 2018, 22 : 243 - 251
  • [46] A Multi-authority Attribute-Based Encryption Access Control for Social Network
    Yang, Xiao-dong
    Yang, Miao-miao
    Yang, Ping
    Leng, Qi
    [J]. CONFERENCE PROCEEDINGS OF 2017 3RD IEEE INTERNATIONAL CONFERENCE ON CONTROL SCIENCE AND SYSTEMS ENGINEERING (ICCSSE), 2017, : 671 - 674
  • [47] Distributed Multi-authority Attribute-Based Encryption Using Cellular Automata
    Pradhan, Ankit
    Sethi, Kamalakanta
    Mohapatra, Shrohan
    Bera, Padmalochan
    [J]. CRYPTOLOGY AND NETWORK SECURITY (CANS 2019), 2019, 11829 : 434 - 456
  • [48] A Distributed Multi-Authority Attribute Based Encryption Scheme for Secure Sharing of Personal Health Records
    Pussewalage, Harsha S. Gardiyawasam
    Oleshchuk, Vladimir A.
    [J]. PROCEEDINGS OF THE 22ND ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES (SACMAT'17), 2017, : 255 - 262
  • [49] Fully Secure Multi-authority Ciphertext-Policy Attribute-Based Encryption without Random Oracles
    Liu, Zhen
    Cao, Zhenfu
    Huang, Qiong
    Wong, Duncan S.
    Yuen, Tsz Hon
    [J]. COMPUTER SECURITY - ESORICS 2011, 2011, 6879 : 278 - +
  • [50] Attribute Revocable Multi-Authority Attribute-Based Encryption with Forward Secrecy for Cloud Storage
    Nomura, Kenta
    Mohri, Masami
    Shiraishi, Yoshiaki
    Morii, Masakatu
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2017, E100D (10) : 2420 - 2431