Abstract
Attribute-based encryption (ABE) has been an active research area in cryptography due to its attractive applications. But almost all ABE scheme are based on bilinear maps, which leave them vulnerable to quantum cryptanalysis. The cryptographic system based on lattices is considered to be able to resist the quantum attack, and the computational efficiency is high. Therefore, the encryption scheme based on lattice theory has received wide attention in recent years. At present, the research of the attribute based encryption scheme on ideal lattices is lacking, and there are many problems need to be solved. Lots of existing schemes support only a single access policy and cannot support flexible expressions. For solving the problem of designing access structure in attribute-based encryption scheme under quantum environment, combined with Zhu’s scheme, an attribute-based encryption scheme supporting tree access structures on ideal lattices is introduced. The scheme adopts tree-access structure to express access strategy, the leaf nodes of the tree represent attributes, and the non-leaf nodes represent logical operators. The access tree can express the access policy flexibly by Shamir threshold secret sharing technology, including “and”, “or”, “threshold” operation. The scheme is proved to be secure against chosen plaintext attack under the standard mode. The analysis shows that our scheme can resist the quantum attack and realize the flexible access strategy with the better performance.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457–473. Springer, Heidelberg (2005). https://doi.org/10.1007/11426639_27
Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, pp. 89–98. ACM, New York (2006)
Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: IEEE Symposium on Security and Privacy, pp. 321–334 (2007)
Ostrovsky, R., Sahai, A., Waters, B.: Attribute-based encryption with non-monotonic access structures. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, CCS 2007, pp. 195–203. ACM, New York (2007)
Waters, B.: Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. LNCS, vol. 6571, pp. 53–70. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-19379-8_4
Goyal, V., Jain, A., Pandey, O., Sahai, A.: Bounded ciphertext policy attribute based encryption. In: Aceto, L., Damgård, I., Goldberg, L.A., Halldórsson, M.M., Ingólfsdóttir, A., Walukiewicz, I. (eds.) ICALP 2008. LNCS, vol. 5126, pp. 579–591. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-70583-3_47
Attrapadung, N., Imai, H.: Dual-policy attribute based encryption. In: Abdalla, M., Pointcheval, D., Fouque, P.-A., Vergnaud, D. (eds.) ACNS 2009. LNCS, vol. 5536, pp. 168–185. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-01957-9_11
Yanli, C., Huashan, Y.: CP ABE based searchable encryption with attribute revocation. J. Chongqing Univ. Posts Telecommun. (Nat. Sci. Edn.) 28(4), 545–554 (2016)
Boyen, X.: Attribute-based functional encryption on lattices. In: Sahai, A. (ed.) TCC 2013. LNCS, vol. 7785, pp. 122–142. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-36594-2_8
Zhang, J., Zhang, Z., Ge, A.: Ciphertext policy attribute-based encryption from lattices. In: Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2012, pp. 16–17. ACM, New York (2012)
Wang, Y.: Lattice ciphertext policy attribute-based encryption in the standard model. Int. J. Netw. Secur. 16(6), 444–451 (2014)
Zhu, W., Yu, J., Wang, T., Xie, W.: Efficient attribute-based encryption from R-LWE. Chin. J. Electron. 23(4), 778–782 (2014)
Tan, S.F., Samsudin, A.: Lattice ciphertext-policy attribute-based encryption from Ring-LWE. In: International Symposium on Technology Management and Emerging Technologies, pp. 258–262. IEEE, Langkawi (2015)
Chen, Z., Zhang, P., Zhang, F., Huang, J.: Ciphertext policy attribute-based encryption supporting unbounded attribute space from R-LWE. KSII Trans. Internet Inf. Syst. 11(4), 2292–2309 (2017)
Yan, X., Liu, Y., Li, Z., Huang, Q.: A privacy-preserving multi-authority attribute-based encryption scheme on ideal lattices in the cloud environment. In: Netinfo Security, no. 8, pp. 19–25 (2017)
Wang, T., Han, G., Yu, J., Zhang, P., Sun, X.: Efficient chosen-ciphertext secure encryption from R-LWE. Wirel. Pers. Commun. 95, 1–16 (2017)
Acknowledgements
This work is supported by “13th Five-Year” National Crypto Development Fund under Grant (No. MMJJ20170122), the Project of Education Department of Henan Province (No. 18A413001, No. 16A520013), Natural Science Foundation of Henan Polytechnic University (No. T2018-1).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Switzerland AG
About this paper
Cite this paper
Yu, J., Yang, C., Tang, Y., Yan, X. (2018). Attribute-Based Encryption Scheme Supporting Tree-Access Structure on Ideal Lattices. In: Sun, X., Pan, Z., Bertino, E. (eds) Cloud Computing and Security. ICCCS 2018. Lecture Notes in Computer Science(), vol 11065. Springer, Cham. https://doi.org/10.1007/978-3-030-00012-7_47
Download citation
DOI: https://doi.org/10.1007/978-3-030-00012-7_47
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-00011-0
Online ISBN: 978-3-030-00012-7
eBook Packages: Computer ScienceComputer Science (R0)