Abstract
A new attribute-based encryption scheme (ABE) from lattices with Linear Secret Sharing Scheme (LSSS) key-policy is presented. In the new scheme, the key of an attribute under an access policy represented by LSSS is generated by the use of the sample-pre algorithm on lattices. Every attribute has its own authority, and the private key of each attribute under an access policy is produced by its own authority alone. The new scheme has the advantage of fine-grained access control, and also could support multi-authority attribute management, thus it facilitates the practical management of attribute encryption system. The security of the new scheme is proved in the selective-attribute attack model under learning with errors (LWE) assumption, and the security parameter selecting is discussed in detail.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Cramer, R. (ed.) Advances in Cryptology EUROCRYPT 2005. LNCS, vol. 3494, pp. 557–559. Springer, Heidelberg (2005)
Goyal, V., Pandey, O., Sahai, A., et al.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 89–98. ACM (2006)
Boneh, D., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: Proceedings of the 2007 IEEE Symposium on Security and Privacy, Washington, pp. 321–334. IEEE Computer Society (2007)
Waters, B.: Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In: Public Key Cryptography PKC 2011. LNCS, vol. 6571, pp. 53–70. Springer, Heidelberg (2011)
Okamoto, T., Takashima, K.: Fully secure unbounded inner-product and attribute-based encryption. In: Advances in Cryptology-ASIACRYPT 2012, pp. 349–366. Springer, Heidelberg (2012)
Maji, H.K., Prabhakaran, M., Rosulek, M.: Attribute-based signatures. In: Topics in Cryptology-CT-RSA 2011, pp. 376–392. Springer, Heidelberg (2011)
Escala, A., Herranz, J., Morillo, P.: Revocable attribute-based signatures with adaptive security in the standard model. In: Progress in Cryptology-AFRICACRYPT 2011, pp. 224–241. Springer, Heidelberg (2011)
Ateniese, G., Kirsch, J., Blanton, M.: Secret handshakes with dynamic and fuzzy matching. In: NDSS, vol. 7, pp. 1–19 (2007)
Wang, H., Xu, Q.L., Ban, T.: A provably secure two-party attribute-based key agreement protocol. In: Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2009, pp. 1042–1045. IEEE (2009)
Anada, H., Arita, S., Handa, S., et al.: Attribute-based identification: definitions and efficient constructions. In: Information Security and Privacy, pp. 168–186. Springer, Heidelberg (2013)
Chase, M.: Multi-authority attribute based encryption. In: Theory of Cryptography, pp. 515–534. Springer, Heidelberg (2007)
Lewko, A., Waters, B.: Decentralizing attribute-based encryption. In: Advances in Cryptology-EUROCRYPT 2011, pp. 568–588. Springer, Heidelberg (2011)
Ajtai, M.: Generating hard instances of lattice problems. In: Proceedings of the 28th Annual ACM Symposium on Theory of Computing, pp. 99–108. ACM, New York (1996)
Ajtai, M., Dwork, C.: A public-key cryptosystem with worst-case/average-case equivalence. In: STOC, pp. 284–293 (1997)
Gentry, C., Peikert, C., Vaikuntanathan, V.: Trapdoors for hard lattices and new cryptographic constructions. In: STOC, pp. 197–206. ACM (2008)
Boyen, X.: Attribute-based functional encryption on lattices. In: TCC, pp. 122–142 (2013)
Acknowledgements
This work is supported by the National Natural Science Foundation of China under grants 61572019, Shaanxi Provincial Natural Science Foundation under grants 2016JZ001, and Research Foundation of Education Department of Shaanxi Province of China under grants 2013JK1142. Thanks also go to the anonymous reviewers for their useful comments.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG
About this paper
Cite this paper
Liu, L., Wang, S. (2018). An Attribute-Based Encryption Scheme with LSSS Key-Policy from Lattices. In: Mizera-Pietraszko, J., Pichappan, P. (eds) Lecture Notes in Real-Time Intelligent Systems. RTIS 2016. Advances in Intelligent Systems and Computing, vol 613. Springer, Cham. https://doi.org/10.1007/978-3-319-60744-3_24
Download citation
DOI: https://doi.org/10.1007/978-3-319-60744-3_24
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-60743-6
Online ISBN: 978-3-319-60744-3
eBook Packages: EngineeringEngineering (R0)