[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to main content

Attribute-Based Encryption Scheme Supporting Tree-Access Structure on Ideal Lattices

  • Conference paper
  • First Online:
Cloud Computing and Security (ICCCS 2018)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 11065))

Included in the following conference series:

Abstract

Attribute-based encryption (ABE) has been an active research area in cryptography due to its attractive applications. But almost all ABE scheme are based on bilinear maps, which leave them vulnerable to quantum cryptanalysis. The cryptographic system based on lattices is considered to be able to resist the quantum attack, and the computational efficiency is high. Therefore, the encryption scheme based on lattice theory has received wide attention in recent years. At present, the research of the attribute based encryption scheme on ideal lattices is lacking, and there are many problems need to be solved. Lots of existing schemes support only a single access policy and cannot support flexible expressions. For solving the problem of designing access structure in attribute-based encryption scheme under quantum environment, combined with Zhu’s scheme, an attribute-based encryption scheme supporting tree access structures on ideal lattices is introduced. The scheme adopts tree-access structure to express access strategy, the leaf nodes of the tree represent attributes, and the non-leaf nodes represent logical operators. The access tree can express the access policy flexibly by Shamir threshold secret sharing technology, including “and”, “or”, “threshold” operation. The scheme is proved to be secure against chosen plaintext attack under the standard mode. The analysis shows that our scheme can resist the quantum attack and realize the flexible access strategy with the better performance.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
GBP 19.95
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
GBP 35.99
Price includes VAT (United Kingdom)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
GBP 44.99
Price includes VAT (United Kingdom)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457–473. Springer, Heidelberg (2005). https://doi.org/10.1007/11426639_27

    Chapter  Google Scholar 

  2. Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, pp. 89–98. ACM, New York (2006)

    Google Scholar 

  3. Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: IEEE Symposium on Security and Privacy, pp. 321–334 (2007)

    Google Scholar 

  4. Ostrovsky, R., Sahai, A., Waters, B.: Attribute-based encryption with non-monotonic access structures. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, CCS 2007, pp. 195–203. ACM, New York (2007)

    Google Scholar 

  5. Waters, B.: Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. LNCS, vol. 6571, pp. 53–70. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-19379-8_4

    Chapter  Google Scholar 

  6. Goyal, V., Jain, A., Pandey, O., Sahai, A.: Bounded ciphertext policy attribute based encryption. In: Aceto, L., Damgård, I., Goldberg, L.A., Halldórsson, M.M., Ingólfsdóttir, A., Walukiewicz, I. (eds.) ICALP 2008. LNCS, vol. 5126, pp. 579–591. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-70583-3_47

    Chapter  Google Scholar 

  7. Attrapadung, N., Imai, H.: Dual-policy attribute based encryption. In: Abdalla, M., Pointcheval, D., Fouque, P.-A., Vergnaud, D. (eds.) ACNS 2009. LNCS, vol. 5536, pp. 168–185. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-01957-9_11

    Chapter  Google Scholar 

  8. Yanli, C., Huashan, Y.: CP ABE based searchable encryption with attribute revocation. J. Chongqing Univ. Posts Telecommun. (Nat. Sci. Edn.) 28(4), 545–554 (2016)

    Google Scholar 

  9. Boyen, X.: Attribute-based functional encryption on lattices. In: Sahai, A. (ed.) TCC 2013. LNCS, vol. 7785, pp. 122–142. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-36594-2_8

    Chapter  Google Scholar 

  10. Zhang, J., Zhang, Z., Ge, A.: Ciphertext policy attribute-based encryption from lattices. In: Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2012, pp. 16–17. ACM, New York (2012)

    Google Scholar 

  11. Wang, Y.: Lattice ciphertext policy attribute-based encryption in the standard model. Int. J. Netw. Secur. 16(6), 444–451 (2014)

    Google Scholar 

  12. Zhu, W., Yu, J., Wang, T., Xie, W.: Efficient attribute-based encryption from R-LWE. Chin. J. Electron. 23(4), 778–782 (2014)

    Google Scholar 

  13. Tan, S.F., Samsudin, A.: Lattice ciphertext-policy attribute-based encryption from Ring-LWE. In: International Symposium on Technology Management and Emerging Technologies, pp. 258–262. IEEE, Langkawi (2015)

    Google Scholar 

  14. Chen, Z., Zhang, P., Zhang, F., Huang, J.: Ciphertext policy attribute-based encryption supporting unbounded attribute space from R-LWE. KSII Trans. Internet Inf. Syst. 11(4), 2292–2309 (2017)

    Google Scholar 

  15. Yan, X., Liu, Y., Li, Z., Huang, Q.: A privacy-preserving multi-authority attribute-based encryption scheme on ideal lattices in the cloud environment. In: Netinfo Security, no. 8, pp. 19–25 (2017)

    Google Scholar 

  16. Wang, T., Han, G., Yu, J., Zhang, P., Sun, X.: Efficient chosen-ciphertext secure encryption from R-LWE. Wirel. Pers. Commun. 95, 1–16 (2017)

    Article  Google Scholar 

Download references

Acknowledgements

This work is supported by “13th Five-Year” National Crypto Development Fund under Grant (No. MMJJ20170122), the Project of Education Department of Henan Province (No. 18A413001, No. 16A520013), Natural Science Foundation of Henan Polytechnic University (No. T2018-1).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xixi Yan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Yu, J., Yang, C., Tang, Y., Yan, X. (2018). Attribute-Based Encryption Scheme Supporting Tree-Access Structure on Ideal Lattices. In: Sun, X., Pan, Z., Bertino, E. (eds) Cloud Computing and Security. ICCCS 2018. Lecture Notes in Computer Science(), vol 11065. Springer, Cham. https://doi.org/10.1007/978-3-030-00012-7_47

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-00012-7_47

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-00011-0

  • Online ISBN: 978-3-030-00012-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics