Abstract
The existing Ciphertext-Policy Attribute-Based Encryption (CP-ABE) scheme from lattices can only support a simple threshold access structure, resulting in its limited application scenario. In order to improve the flexibility and expressiveness of the CP-ABE scheme, we present a CP-ABE for circuits from lattices in this paper. The new scheme generates secret key for each attribute of the attribute set by invoking the sampling algorithm from lattices and embeds the attribute set into the secret keys. Meanwhile, to associate the ciphertext with a circuit, we design a Secret Matrix Distribution Mechanism (SMDM) for circuits, which distributes a matrix with specific form to each node of the circuit, and the scheme can generate the ciphertexts by combining the matrices of the leaf nodes. In the decryption phase, the SMDM guarantees the user who satisfies the access structure can decrypt the ciphertexts correctly. Finally, we prove that our scheme is secure against chosen plaintext attack in the selective weak security model under the Learning with Errors (LWE) assumptions.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457–473. Springer, Heidelberg (2005). https://doi.org/10.1007/11426639_27
Goyal, V., Pandey, O., Sahai, A., et al.: Attribute-based encryption for fine grained access control of encrypted data. In: Proceedings of the ACM Conference on Computer and Communications Security (CCS 2006), pp. 89–98. ACM, New York (2006). https://doi.org/10.1145/1180405.1180418
Yinan, S.: Attribute-based encryption algorithm. M.S. dissertation, Shanghai Jiao Tong University, pp. 32–33 (2010)
Agrawal, S., Boyen, X., Vaikuntanathan, V., Voulgaris, P., Wee, H.: Functional encryption for threshold functions (or Fuzzy IBE) from lattices. In: Fischlin, M., Buchmann, J., Manulis, M. (eds.) PKC 2012. LNCS, vol. 7293, pp. 280–297. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-30057-8_17
Jiang, Z, Zhenfeng, Z, Aijun, G.: Ciphertext policy attribute-based encryption from lattices. In: Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2012), pp. 16–17. ACM, New York (2012). https://doi.org/10.1145/2414456.2414464
Boyen, X.: Attribute-based functional encryption on lattices. In: Sahai, A. (ed.) TCC 2013. LNCS, vol. 7785, pp. 122–142. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-36594-2_8
Xiang, X., Rui, X.: Attribute-Based Encryption for a Subclass of Circuits with Bounded Depth from Lattices. IACR Cryptology ePrint Archive, http://eprint.iacr.org/2013/342. Accessed 2013
Gorbunov, S., Vaikuntanathan, V., Wee, H.: Attribute-based Encryption for Circuits. IACR Cryptology ePrint Archive, http://eprint.iacr.org/2013/337. Accessed 2013
Boneh, D, Nikolaenko, V, Segev, G.: Attribute-based Encryption for Arithmetic Circuits. IACR Cryptology ePrint Archive, http://eprint.iacr.org/2013/669. Accessed 2013
Yongtao, W.: Lattice ciphertext policy attribute-based encryption in the standard model. Int. J. Netw. Secur. 16(6), 444–451 (2014)
Boyen, X., Li, Q.: Attribute-based encryption for finite automata from LWE. In: Au, M.-H., Miyaji, A. (eds.) ProvSec 2015. LNCS, vol. 9451, pp. 247–267. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-26059-4_14
Fang, B.R.: Matrix Theory. Tsing University Press, Beijing (2013)
Alwen, J., Peikert, C.: Generating shorter bases for hard random lattices. Theory Comput. Syst. 48(535), 75–86 (2011)
Zhao, J.: Research on attribute-based encryption from lattices. M.S. dissertation, Zhengzhou Information Science and Technology Institute, 4–7 2015
Garg, S., Gentry, C., Halevi, S., Sahai, A., Waters, B.: Attribute-based encryption for circuits from multilinear maps. In: Canetti, R., Garay, J.A. (eds.) CRYPTO 2013. LNCS, vol. 8043, pp. 479–499. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-40084-1_27
Oded, R.: On lattices, learning with errors, random linear codes, and cryptography. J. ACM STOC 56(34), 1–40 (2005)
Agrawal, S., Boneh, D., Boyen, X.: Efficient lattice (H)IBE in the standard model. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 553–572. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-13190-5_28
Gay, R., Méaux, P., Wee, H.: Predicate encryption for multi-dimensional range queries from lattices. In: Katz, J. (ed.) PKC 2015. LNCS, vol. 9020, pp. 752–776. Springer, Heidelberg (2015). https://doi.org/10.1007/978-3-662-46447-2_34
Ibraimi, L., Tang, Q., Hartel, P., Jonker, W.: Efficient and provable secure ciphertext-policy attribute-based encryption schemes. In: Bao, F., Li, H., Wang, G. (eds.) ISPEC 2009. LNCS, vol. 5451, pp. 1–12. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-00843-6_1
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Zhao, J., Gao, H., Hu, B. (2019). Ciphertext-Policy Attribute-Based Encryption for Circuits from Lattices Under Weak Security Model. In: Zhang, H., Zhao, B., Yan, F. (eds) Trusted Computing and Information Security. CTCIS 2018. Communications in Computer and Information Science, vol 960. Springer, Singapore. https://doi.org/10.1007/978-981-13-5913-2_1
Download citation
DOI: https://doi.org/10.1007/978-981-13-5913-2_1
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-5912-5
Online ISBN: 978-981-13-5913-2
eBook Packages: Computer ScienceComputer Science (R0)