Skip to main content

An Attribute-Based Encryption Scheme with LSSS Key-Policy from Lattices

  • Conference paper
  • First Online:
Lecture Notes in Real-Time Intelligent Systems (RTIS 2016)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 613))

Included in the following conference series:

  • 1758 Accesses

Abstract

A new attribute-based encryption scheme (ABE) from lattices with Linear Secret Sharing Scheme (LSSS) key-policy is presented. In the new scheme, the key of an attribute under an access policy represented by LSSS is generated by the use of the sample-pre algorithm on lattices. Every attribute has its own authority, and the private key of each attribute under an access policy is produced by its own authority alone. The new scheme has the advantage of fine-grained access control, and also could support multi-authority attribute management, thus it facilitates the practical management of attribute encryption system. The security of the new scheme is proved in the selective-attribute attack model under learning with errors (LWE) assumption, and the security parameter selecting is discussed in detail.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Cramer, R. (ed.) Advances in Cryptology EUROCRYPT 2005. LNCS, vol. 3494, pp. 557–559. Springer, Heidelberg (2005)

    Google Scholar 

  2. Goyal, V., Pandey, O., Sahai, A., et al.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 89–98. ACM (2006)

    Google Scholar 

  3. Boneh, D., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: Proceedings of the 2007 IEEE Symposium on Security and Privacy, Washington, pp. 321–334. IEEE Computer Society (2007)

    Google Scholar 

  4. Waters, B.: Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In: Public Key Cryptography PKC 2011. LNCS, vol. 6571, pp. 53–70. Springer, Heidelberg (2011)

    Google Scholar 

  5. Okamoto, T., Takashima, K.: Fully secure unbounded inner-product and attribute-based encryption. In: Advances in Cryptology-ASIACRYPT 2012, pp. 349–366. Springer, Heidelberg (2012)

    Google Scholar 

  6. Maji, H.K., Prabhakaran, M., Rosulek, M.: Attribute-based signatures. In: Topics in Cryptology-CT-RSA 2011, pp. 376–392. Springer, Heidelberg (2011)

    Google Scholar 

  7. Escala, A., Herranz, J., Morillo, P.: Revocable attribute-based signatures with adaptive security in the standard model. In: Progress in Cryptology-AFRICACRYPT 2011, pp. 224–241. Springer, Heidelberg (2011)

    Google Scholar 

  8. Ateniese, G., Kirsch, J., Blanton, M.: Secret handshakes with dynamic and fuzzy matching. In: NDSS, vol. 7, pp. 1–19 (2007)

    Google Scholar 

  9. Wang, H., Xu, Q.L., Ban, T.: A provably secure two-party attribute-based key agreement protocol. In: Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2009, pp. 1042–1045. IEEE (2009)

    Google Scholar 

  10. Anada, H., Arita, S., Handa, S., et al.: Attribute-based identification: definitions and efficient constructions. In: Information Security and Privacy, pp. 168–186. Springer, Heidelberg (2013)

    Google Scholar 

  11. Chase, M.: Multi-authority attribute based encryption. In: Theory of Cryptography, pp. 515–534. Springer, Heidelberg (2007)

    Google Scholar 

  12. Lewko, A., Waters, B.: Decentralizing attribute-based encryption. In: Advances in Cryptology-EUROCRYPT 2011, pp. 568–588. Springer, Heidelberg (2011)

    Google Scholar 

  13. Ajtai, M.: Generating hard instances of lattice problems. In: Proceedings of the 28th Annual ACM Symposium on Theory of Computing, pp. 99–108. ACM, New York (1996)

    Google Scholar 

  14. Ajtai, M., Dwork, C.: A public-key cryptosystem with worst-case/average-case equivalence. In: STOC, pp. 284–293 (1997)

    Google Scholar 

  15. Gentry, C., Peikert, C., Vaikuntanathan, V.: Trapdoors for hard lattices and new cryptographic constructions. In: STOC, pp. 197–206. ACM (2008)

    Google Scholar 

  16. Boyen, X.: Attribute-based functional encryption on lattices. In: TCC, pp. 122–142 (2013)

    Google Scholar 

Download references

Acknowledgements

This work is supported by the National Natural Science Foundation of China under grants 61572019, Shaanxi Provincial Natural Science Foundation under grants 2016JZ001, and Research Foundation of Education Department of Shaanxi Province of China under grants 2013JK1142. Thanks also go to the anonymous reviewers for their useful comments.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Lihua Liu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this paper

Cite this paper

Liu, L., Wang, S. (2018). An Attribute-Based Encryption Scheme with LSSS Key-Policy from Lattices. In: Mizera-Pietraszko, J., Pichappan, P. (eds) Lecture Notes in Real-Time Intelligent Systems. RTIS 2016. Advances in Intelligent Systems and Computing, vol 613. Springer, Cham. https://doi.org/10.1007/978-3-319-60744-3_24

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-60744-3_24

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-60743-6

  • Online ISBN: 978-3-319-60744-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics