Skip to main content

2018 | OriginalPaper | Buchkapitel

An Attribute-Based Encryption Scheme with LSSS Key-Policy from Lattices

verfasst von : Lihua Liu, Shangping Wang

Erschienen in: Lecture Notes in Real-Time Intelligent Systems

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

A new attribute-based encryption scheme (ABE) from lattices with Linear Secret Sharing Scheme (LSSS) key-policy is presented. In the new scheme, the key of an attribute under an access policy represented by LSSS is generated by the use of the sample-pre algorithm on lattices. Every attribute has its own authority, and the private key of each attribute under an access policy is produced by its own authority alone. The new scheme has the advantage of fine-grained access control, and also could support multi-authority attribute management, thus it facilitates the practical management of attribute encryption system. The security of the new scheme is proved in the selective-attribute attack model under learning with errors (LWE) assumption, and the security parameter selecting is discussed in detail.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Cramer, R. (ed.) Advances in Cryptology EUROCRYPT 2005. LNCS, vol. 3494, pp. 557–559. Springer, Heidelberg (2005) Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Cramer, R. (ed.) Advances in Cryptology EUROCRYPT 2005. LNCS, vol. 3494, pp. 557–559. Springer, Heidelberg (2005)
2.
Zurück zum Zitat Goyal, V., Pandey, O., Sahai, A., et al.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 89–98. ACM (2006) Goyal, V., Pandey, O., Sahai, A., et al.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 89–98. ACM (2006)
3.
Zurück zum Zitat Boneh, D., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: Proceedings of the 2007 IEEE Symposium on Security and Privacy, Washington, pp. 321–334. IEEE Computer Society (2007) Boneh, D., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: Proceedings of the 2007 IEEE Symposium on Security and Privacy, Washington, pp. 321–334. IEEE Computer Society (2007)
4.
Zurück zum Zitat Waters, B.: Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In: Public Key Cryptography PKC 2011. LNCS, vol. 6571, pp. 53–70. Springer, Heidelberg (2011) Waters, B.: Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In: Public Key Cryptography PKC 2011. LNCS, vol. 6571, pp. 53–70. Springer, Heidelberg (2011)
5.
Zurück zum Zitat Okamoto, T., Takashima, K.: Fully secure unbounded inner-product and attribute-based encryption. In: Advances in Cryptology-ASIACRYPT 2012, pp. 349–366. Springer, Heidelberg (2012) Okamoto, T., Takashima, K.: Fully secure unbounded inner-product and attribute-based encryption. In: Advances in Cryptology-ASIACRYPT 2012, pp. 349–366. Springer, Heidelberg (2012)
6.
Zurück zum Zitat Maji, H.K., Prabhakaran, M., Rosulek, M.: Attribute-based signatures. In: Topics in Cryptology-CT-RSA 2011, pp. 376–392. Springer, Heidelberg (2011) Maji, H.K., Prabhakaran, M., Rosulek, M.: Attribute-based signatures. In: Topics in Cryptology-CT-RSA 2011, pp. 376–392. Springer, Heidelberg (2011)
7.
Zurück zum Zitat Escala, A., Herranz, J., Morillo, P.: Revocable attribute-based signatures with adaptive security in the standard model. In: Progress in Cryptology-AFRICACRYPT 2011, pp. 224–241. Springer, Heidelberg (2011) Escala, A., Herranz, J., Morillo, P.: Revocable attribute-based signatures with adaptive security in the standard model. In: Progress in Cryptology-AFRICACRYPT 2011, pp. 224–241. Springer, Heidelberg (2011)
8.
Zurück zum Zitat Ateniese, G., Kirsch, J., Blanton, M.: Secret handshakes with dynamic and fuzzy matching. In: NDSS, vol. 7, pp. 1–19 (2007) Ateniese, G., Kirsch, J., Blanton, M.: Secret handshakes with dynamic and fuzzy matching. In: NDSS, vol. 7, pp. 1–19 (2007)
9.
Zurück zum Zitat Wang, H., Xu, Q.L., Ban, T.: A provably secure two-party attribute-based key agreement protocol. In: Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2009, pp. 1042–1045. IEEE (2009) Wang, H., Xu, Q.L., Ban, T.: A provably secure two-party attribute-based key agreement protocol. In: Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2009, pp. 1042–1045. IEEE (2009)
10.
Zurück zum Zitat Anada, H., Arita, S., Handa, S., et al.: Attribute-based identification: definitions and efficient constructions. In: Information Security and Privacy, pp. 168–186. Springer, Heidelberg (2013) Anada, H., Arita, S., Handa, S., et al.: Attribute-based identification: definitions and efficient constructions. In: Information Security and Privacy, pp. 168–186. Springer, Heidelberg (2013)
11.
Zurück zum Zitat Chase, M.: Multi-authority attribute based encryption. In: Theory of Cryptography, pp. 515–534. Springer, Heidelberg (2007) Chase, M.: Multi-authority attribute based encryption. In: Theory of Cryptography, pp. 515–534. Springer, Heidelberg (2007)
12.
Zurück zum Zitat Lewko, A., Waters, B.: Decentralizing attribute-based encryption. In: Advances in Cryptology-EUROCRYPT 2011, pp. 568–588. Springer, Heidelberg (2011) Lewko, A., Waters, B.: Decentralizing attribute-based encryption. In: Advances in Cryptology-EUROCRYPT 2011, pp. 568–588. Springer, Heidelberg (2011)
13.
Zurück zum Zitat Ajtai, M.: Generating hard instances of lattice problems. In: Proceedings of the 28th Annual ACM Symposium on Theory of Computing, pp. 99–108. ACM, New York (1996) Ajtai, M.: Generating hard instances of lattice problems. In: Proceedings of the 28th Annual ACM Symposium on Theory of Computing, pp. 99–108. ACM, New York (1996)
14.
Zurück zum Zitat Ajtai, M., Dwork, C.: A public-key cryptosystem with worst-case/average-case equivalence. In: STOC, pp. 284–293 (1997) Ajtai, M., Dwork, C.: A public-key cryptosystem with worst-case/average-case equivalence. In: STOC, pp. 284–293 (1997)
15.
Zurück zum Zitat Gentry, C., Peikert, C., Vaikuntanathan, V.: Trapdoors for hard lattices and new cryptographic constructions. In: STOC, pp. 197–206. ACM (2008) Gentry, C., Peikert, C., Vaikuntanathan, V.: Trapdoors for hard lattices and new cryptographic constructions. In: STOC, pp. 197–206. ACM (2008)
16.
Zurück zum Zitat Boyen, X.: Attribute-based functional encryption on lattices. In: TCC, pp. 122–142 (2013) Boyen, X.: Attribute-based functional encryption on lattices. In: TCC, pp. 122–142 (2013)
Metadaten
Titel
An Attribute-Based Encryption Scheme with LSSS Key-Policy from Lattices
verfasst von
Lihua Liu
Shangping Wang
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-319-60744-3_24