LWE-based multi-authority attribute-based encryption scheme with hidden policies

被引:6
|
作者
Tian, Qiuting [1 ]
Han, Dezhi [1 ]
Liu, Xingao [1 ]
Yu, Xueshan [1 ]
机构
[1] Shanghai Maritime Univ, Coll Informat Engn, 1550 Haigang Ave, Shanghai, Peoples R China
基金
中国国家自然科学基金;
关键词
attribute-based encryption; ABE; learning with errors; hidden policies; lattices; standard model; multi-authority; bilinear maps; Shamir secret sharing mechanism; LATTICES;
D O I
10.1504/IJCSE.2019.100244
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Most attribute-based encryption schemes are based on bilinear maps, which have large computational and storage overhead and cannot resist quantum attacks. In view of the above problems, a LWE-based multi-authority attribute-based encryption scheme with hidden policies is proposed. Firstly, the scheme uses the lattice theory to replace the previous bilinear maps, and supports multi-authority to manage different attribute sets. Secondly, the Shamir secret sharing mechanism is introduced to construct the access tree structure, which improves the flexibility of the system. Also, the access policies can be completely hidden so as to protect the privacy of users. Finally, the scheme is proved to be secure against the chosen plaintext attack under the standard model. Compared with the existing related schemes, the size of public parameters, master secret key, user's private key and ciphertext are all optimised in some degree. Therefore it is more suitable for data encryption in cloud environment.
引用
收藏
页码:233 / 241
页数:9
相关论文
共 50 条
  • [1] A Multi-Authority Attribute-Based Encryption Scheme with Attribute Hierarchy
    Qi, Fang
    Li, Ke
    Tang, Zhe
    2017 15TH IEEE INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED PROCESSING WITH APPLICATIONS AND 2017 16TH IEEE INTERNATIONAL CONFERENCE ON UBIQUITOUS COMPUTING AND COMMUNICATIONS (ISPA/IUCC 2017), 2017, : 607 - 613
  • [2] New Multi-authority Attribute-based Encryption Scheme on Lattices
    Yan Xixi
    Liu Yuan
    Li Zichen
    Tang Yongli
    Ye Qing
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2018, 40 (04) : 811 - 817
  • [3] Decentralized Multi-Authority Attribute-based Searchable Encryption Scheme
    Ren, Juan
    Zhang, Leyou
    Wang, Baocang
    International Journal of Network Security, 2021, 23 (02) : 332 - 342
  • [4] Multi-Authority Attribute-Based Encryption Scheme from Lattices
    Zhang, Guoyan
    Qin, Jing
    Qazi, Shams
    JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2015, 21 (03) : 483 - 501
  • [5] Multi-authority attribute-based encryption access control scheme with policy hidden for cloud storage
    Zhong, Hong
    Zhu, Wenlong
    Xu, Yan
    Cui, Jie
    SOFT COMPUTING, 2018, 22 (01) : 243 - 251
  • [6] A Multi-authority Attribute-based Encryption Scheme with Pre-decryption
    Chen, Danwei
    Wan, Liangqing
    Wang, Chen
    Pan, Su
    Ji, Yuting
    2015 SEVENTH INTERNATIONAL SYMPOSIUM ON PARALLEL ARCHITECTURES, ALGORITHMS AND PROGRAMMING (PAAP), 2015, : 223 - 228
  • [7] Blockchain Access Control Scheme Based on Multi-authority Attribute-Based Encryption
    Li, Yang
    Qi, Baoyue
    Wang, Mengmeng
    Zhu, Jianming
    Wang, Xiuli
    DATA SCIENCE (ICPCSEE 2022), PT II, 2022, 1629 : 105 - 124
  • [8] Multi-authority attribute-based encryption access control scheme with policy hidden for cloud storage
    Hong Zhong
    Wenlong Zhu
    Yan Xu
    Jie Cui
    Soft Computing, 2018, 22 : 243 - 251
  • [9] TRACEABLE MULTI-AUTHORITY ATTRIBUTE-BASED ENCRYPTION SCHEME FOR CLOUD COMPUTING
    Yang, Xiaodong
    Yang, Ping
    An, Faying
    Zhou, Qixu
    Yang, Miaomiao
    2017 14TH INTERNATIONAL COMPUTER CONFERENCE ON WAVELET ACTIVE MEDIA TECHNOLOGY AND INFORMATION PROCESSING (ICCWAMTIP), 2017, : 263 - 267
  • [10] Multi-authority attribute-based identification scheme
    Tang F.
    Bao J.
    Huang Y.
    Huang D.
    Wang H.
    Tongxin Xuebao/Journal on Communications, 2021, 42 (03): : 220 - 228