Skip to main content

2017 | OriginalPaper | Buchkapitel

Key Policy-Attribute Based Fully Homomorphic Encryption (KP-ABFHE) Scheme for Securing Cloud Application in Multi-users Environment

verfasst von : Soo Fun Tan, Azman Samsudin

Erschienen in: 9th International Conference on Robotic, Vision, Signal Processing and Power Applications

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Recently, cloud technologies has become a cost-effective data solution among the small and medium-sized enterprises (SMEs). However, there is a raising concern on its security. This paper proposed the Key Policy-Attribute Based Fully Homomorphic Encryption (KP-ABFHE) scheme for providing an end-to end data protection in multi-users cloud environments. The proposed KP-ABFHE scheme is able to perform the computation while providing fine-grained access on the encrypted data. The proposed scheme is able to handle a monotonic access structure over a set of authorized attributes, without sacrificing the computation capabilities of homomorphic encryption. In addition, this paper proves that the proposed scheme is secure under a selective-set model with the hardness of Decision Ring-LWE\({_{d,q, \chi } }\) problem.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Rivest R (1978) On data banks and privacy homomorphisms. Found Sec Comput 4:169–180MathSciNet Rivest R (1978) On data banks and privacy homomorphisms. Found Sec Comput 4:169–180MathSciNet
2.
Zurück zum Zitat Gentry C (2009) A Fully Homomorphic encryption scheme. Phd Thesis. Standford University Gentry C (2009) A Fully Homomorphic encryption scheme. Phd Thesis. Standford University
3.
Zurück zum Zitat Xiao L, Bastani O, Yen I (2012) An efficient homomorphic encryption protocol for multi-user systems. IACR Crypt. ePrint Arch Xiao L, Bastani O, Yen I (2012) An efficient homomorphic encryption protocol for multi-user systems. IACR Crypt. ePrint Arch
4.
Zurück zum Zitat Lopez-Alt A, Tromer E, Vaikuntanathan V (2012) On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption. In: 44th symposium on Theory of Computing. ACM press, New York, pp 12–19 Lopez-Alt A, Tromer E, Vaikuntanathan V (2012) On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption. In: 44th symposium on Theory of Computing. ACM press, New York, pp 12–19
5.
Zurück zum Zitat Brakerski Z, Vaikuntanathan V (2011) Fully homomorphic encryption from ring-lwe and security for key dependent messages. In: Rogaway P (ed) CRYPTO 2011, vol 6841, LNCS. Springer, Heidelberg, pp 505–524 Brakerski Z, Vaikuntanathan V (2011) Fully homomorphic encryption from ring-lwe and security for key dependent messages. In: Rogaway P (ed) CRYPTO 2011, vol 6841, LNCS. Springer, Heidelberg, pp 505–524
6.
Zurück zum Zitat Gentry C, Sahai A, Waters B (2013) Homomorphic encryption from learning with errors: conceptually-simpler, asymptotically-faster, attribute-based. In: Ca-netti R, Garay JA (eds) CRYPTO 2013, vol 8042, LNCS. Springer, Heidelberg, pp 75–92 Gentry C, Sahai A, Waters B (2013) Homomorphic encryption from learning with errors: conceptually-simpler, asymptotically-faster, attribute-based. In: Ca-netti R, Garay JA (eds) CRYPTO 2013, vol 8042, LNCS. Springer, Heidelberg, pp 75–92
7.
Zurück zum Zitat Clear M, McGoldrick C (2013) Policy-based non-interactive outsourcing of com-putation using multikey FHE and CP-ABE. In: 10th international conference on security and cryptography (SECRYPT). IEEE Press, Reykjavik, pp 444–452 Clear M, McGoldrick C (2013) Policy-based non-interactive outsourcing of com-putation using multikey FHE and CP-ABE. In: 10th international conference on security and cryptography (SECRYPT). IEEE Press, Reykjavik, pp 444–452
8.
Zurück zum Zitat Clear M, McGoldrick C (2013) Bootstrappable identity-based fully homomorphic encryption. In: Gritzalis D, Kiayias A, Askoxylakis I (eds) CANS 2013, vol 8831, LNCS. Springer, Switzerland, pp 1–19 Clear M, McGoldrick C (2013) Bootstrappable identity-based fully homomorphic encryption. In: Gritzalis D, Kiayias A, Askoxylakis I (eds) CANS 2013, vol 8831, LNCS. Springer, Switzerland, pp 1–19
9.
Zurück zum Zitat Beimel A (1996) Secure schemes for secret sharing and key distribution. Phd Thesis. Israel Institute of Technology, Haifa, Israel Beimel A (1996) Secure schemes for secret sharing and key distribution. Phd Thesis. Israel Institute of Technology, Haifa, Israel
10.
Zurück zum Zitat Lyubashevsky V, Peikert C, Regev O (2010) On ideal lattices and learning with errors over rings. In: Gilbert H (ed) EUROCRYPT 2010, vol 6110, LNCS. Springer, Heidelberg, pp 1–23 Lyubashevsky V, Peikert C, Regev O (2010) On ideal lattices and learning with errors over rings. In: Gilbert H (ed) EUROCRYPT 2010, vol 6110, LNCS. Springer, Heidelberg, pp 1–23
11.
Zurück zum Zitat Lyubashevsky V, Peikert C, Regev O (2013) A toolkit for ring-LWE cryptography. In: JohanssonT, Nguyen PQ (eds) EUROCRYPT 2013, vol. 7881, LNCS. Springer, Heidelberg, pp 35–54 Lyubashevsky V, Peikert C, Regev O (2013) A toolkit for ring-LWE cryptography. In: JohanssonT, Nguyen PQ (eds) EUROCRYPT 2013, vol. 7881, LNCS. Springer, Heidelberg, pp 35–54
12.
Zurück zum Zitat Soo Fun T, Azman S (2015) Lattice ciphertext-policy attribute-based encryption from ring-LWE. In: 2nd international symposium on technology management and emerging technologies (ISTMET). IEEE Press, Langkawi, pp 282–286 Soo Fun T, Azman S (2015) Lattice ciphertext-policy attribute-based encryption from ring-LWE. In: 2nd international symposium on technology management and emerging technologies (ISTMET). IEEE Press, Langkawi, pp 282–286
13.
Zurück zum Zitat Goyal V, Pandey O, Sahai A, Waters B (2006) Attribute-based encryption for fine-grained access control of encrypted data. In: 13th ACM conference on Computer and communications security (CCS). ACM Press. New York, pp 89–98 Goyal V, Pandey O, Sahai A, Waters B (2006) Attribute-based encryption for fine-grained access control of encrypted data. In: 13th ACM conference on Computer and communications security (CCS). ACM Press. New York, pp 89–98
14.
Zurück zum Zitat Koo D, Hur J, Yoon H (2013) Secure and efficient data retrieval over encrypted data using attribute-based encryption in cloud storage. Comp. Elect. Eng. 39:34–46CrossRef Koo D, Hur J, Yoon H (2013) Secure and efficient data retrieval over encrypted data using attribute-based encryption in cloud storage. Comp. Elect. Eng. 39:34–46CrossRef
15.
Zurück zum Zitat Weiling Z, Jianping Y, Ting W, Peng Z, Weixin X (2014) Efficient attribute-based encryption from R-LWE. Chin. J. Elect. 23:4 Weiling Z, Jianping Y, Ting W, Peng Z, Weixin X (2014) Efficient attribute-based encryption from R-LWE. Chin. J. Elect. 23:4
Metadaten
Titel
Key Policy-Attribute Based Fully Homomorphic Encryption (KP-ABFHE) Scheme for Securing Cloud Application in Multi-users Environment
verfasst von
Soo Fun Tan
Azman Samsudin
Copyright-Jahr
2017
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-1721-6_9

Neuer Inhalt