Ciphertext policy attribute-based encryption supporting unbounded attribute space from R-LWE

被引:18
|
作者
Chen, Zehong [1 ,2 ]
Zhang, Peng [1 ,2 ]
Zhang, Fangguo [3 ,4 ]
Huang, Jiwu [1 ]
机构
[1] Shenzhen Univ, Coll Informat Engn, Shenzhen 518060, Peoples R China
[2] Shenzhen Univ, ATR Key Lab Natl Def Technol, Shenzhen 518060, Peoples R China
[3] Sun Yat Sen Univ, Sch Data & Comp Sci, Guangzhou 510006, Guangdong, Peoples R China
[4] Guangdong Key Lab Informat Secur, Guangzhou 510006, Guangdong, Peoples R China
基金
中国国家自然科学基金;
关键词
Ciphertext policy attribute-based encryption; R-LWE; unbounded; small universe; large universe; GRAINED ACCESS-CONTROL; LATTICES;
D O I
10.3837/tiis.2017.04.025
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Ciphertext policy attribute-based encryption (CP-ABE) is a useful cryptographic technology for guaranteeing data confidentiality but also fine-grained access control. Typically, CP-ABE can be divided into two classes: small universe with polynomial attribute space and large universe with unbounded attribute space. Since the learning with errors over rings (R-LWE) assumption has characteristics of simple algebraic structure and simple calculations, based on R-LWE, we propose a small universe CP-ABE scheme to improve the efficiency of the scheme proposed by Zhang et al. (AsiaCCS 2012). On this basis, to achieve unbounded attribute space and improve the expression of attribute, we propose a large universe CP-ABE scheme with the help of a full-rank differences function. In this scheme, all polynomials in the R-LWE can be used as values of an attribute, and these values do not need to be enumerated at the setup phase. Different trapdoors are used to generate secret keys in the key generation and the security proof. Both proposed schemes are selectively secure in the standard model under R-LWE. Comparison with other schemes demonstrates that our schemes are simpler and more efficient. R-LWE can obtain greater efficiency, and unbounded attribute space means more flexibility, so our research is suitable in practices.
引用
下载
收藏
页码:2292 / 2309
页数:18
相关论文
共 50 条
  • [1] Practical Multi-Authority Ciphertext Policy Attribute-Based Encryption from R-LWE
    Sun, Jianguo
    Qiao, Yuqing
    Liu, Zechao
    Chen, Yitao
    Yang, Yang
    19TH IEEE INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED PROCESSING WITH APPLICATIONS (ISPA/BDCLOUD/SOCIALCOM/SUSTAINCOM 2021), 2021, : 1435 - 1443
  • [2] Efficient Attribute-Based Encryption from R-LWE
    ZHU Weiling
    YU Jianping
    WANG Ting
    ZHANG Peng
    XIE Weixin
    Chinese Journal of Electronics, 2014, 23 (04) : 778 - 782
  • [3] Efficient Attribute-Based Encryption from R-LWE
    Zhu Weiling
    Yu Jianping
    Wang Ting
    Zhang Peng
    Xie Weixin
    CHINESE JOURNAL OF ELECTRONICS, 2014, 23 (04) : 778 - 782
  • [4] Ciphertext Policy Attribute-Based Encryption for Circuits from LWE Assumption
    Wang, Geng
    Liu, Zhen
    Gu, Dawu
    INFORMATION AND COMMUNICATIONS SECURITY (ICICS 2019), 2020, 11999 : 378 - 396
  • [5] Lattice Ciphertext-Policy Attribute-Based Encryption From Ring-LWE
    Fun, Tan Soo
    Samsudin, Azman
    2ND INTERNATIONAL SYMPOSIUM ISTMET 2015 TECHNOLOGY MANAGEMENT & EMERGING TECHNOLOGIES, 2015,
  • [6] Ciphertext Policy Attribute-Based Encryption from Lattices
    Zhang, Jiang
    Zhang, Zhenfeng
    Ge, Aijun
    7TH ACM SYMPOSIUM ON INFORMATION, COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS 2012), 2012,
  • [7] Ciphertext-policy attribute-based encryption
    Bethencourt, John
    Sahai, Amit
    Waters, Brent
    2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 321 - +
  • [8] Removing escrow from ciphertext policy attribute-based encryption
    Hur, Junbeom
    Koo, Dongyoung
    Hwang, Seong Oun
    Kang, Kyungtae
    COMPUTERS & MATHEMATICS WITH APPLICATIONS, 2013, 65 (09) : 1310 - 1317
  • [9] Ciphertext Policy-Hiding Attribute-Based Encryption
    Yadav, Umesh Chandra
    Ali, Syed Taqi
    2015 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2015, : 2067 - 2071
  • [10] Ciphertext-policy attribute-based delay encryption
    Chen, Lijiao
    Lv, Kewei
    INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY, 2023, 22 (02) : 167 - 185