LWE-based multi-authority attribute-based encryption scheme with hidden policies

被引:6
|
作者
Tian, Qiuting [1 ]
Han, Dezhi [1 ]
Liu, Xingao [1 ]
Yu, Xueshan [1 ]
机构
[1] Shanghai Maritime Univ, Coll Informat Engn, 1550 Haigang Ave, Shanghai, Peoples R China
基金
中国国家自然科学基金;
关键词
attribute-based encryption; ABE; learning with errors; hidden policies; lattices; standard model; multi-authority; bilinear maps; Shamir secret sharing mechanism; LATTICES;
D O I
10.1504/IJCSE.2019.100244
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Most attribute-based encryption schemes are based on bilinear maps, which have large computational and storage overhead and cannot resist quantum attacks. In view of the above problems, a LWE-based multi-authority attribute-based encryption scheme with hidden policies is proposed. Firstly, the scheme uses the lattice theory to replace the previous bilinear maps, and supports multi-authority to manage different attribute sets. Secondly, the Shamir secret sharing mechanism is introduced to construct the access tree structure, which improves the flexibility of the system. Also, the access policies can be completely hidden so as to protect the privacy of users. Finally, the scheme is proved to be secure against the chosen plaintext attack under the standard model. Compared with the existing related schemes, the size of public parameters, master secret key, user's private key and ciphertext are all optimised in some degree. Therefore it is more suitable for data encryption in cloud environment.
引用
收藏
页码:233 / 241
页数:9
相关论文
共 50 条
  • [21] Dynamic Collusion Functional Encryption and Multi-Authority Attribute-Based Encryption
    Garg, Rachit
    Goyal, Rishab
    Lu, George
    PUBLIC-KEY CRYPTOGRAPHY, PT IV, PKC 2024, 2024, 14604 : 69 - 104
  • [22] Improving Privacy and Security in Multi-Authority Attribute-Based Encryption
    Chase, Melissa
    Chow, Sherman S. M.
    CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2009, : 121 - 130
  • [23] SIMPLE MULTI-AUTHORITY ATTRIBUTE-BASED ENCRYPTION FOR SHORT MESSAGES
    Villanyi, Viktoria I.
    COMPUTING AND INFORMATICS, 2016, 35 (01) : 128 - 142
  • [24] ON MULTI-AUTHORITY CIPHERTEXT-POLICY ATTRIBUTE-BASED ENCRYPTION
    Mueller, Sascha
    Katzenbeisser, Stefan
    Eckert, Claudia
    BULLETIN OF THE KOREAN MATHEMATICAL SOCIETY, 2009, 46 (04) : 803 - 819
  • [25] Efficient quantum multi-authority attribute-based encryption and generalizations
    Chaudhury, Shion Samadder
    QUANTUM INFORMATION PROCESSING, 2024, 23 (10)
  • [26] Key-Policy Multi-authority Attribute-Based Encryption
    Longo, Riccardo
    Marcolla, Chiara
    Sala, Massimiliano
    ALGEBRAIC INFORMATICS (CAI 2015), 2015, 9270 : 152 - 164
  • [27] A revocable multi-authority attribute-based encryption scheme for fog-enabled IoT
    Penuelas-Angulo, Alejandro
    Feregrino-Uribe, Claudia
    Morales-Sandoval, Miguel
    JOURNAL OF SYSTEMS ARCHITECTURE, 2024, 155
  • [28] Decentralizing Multi-Authority Attribute-Based Access Control Scheme with Fully Hidden Policy
    Zhang, Leyou
    Ren, Juan
    Kang, Li
    Wang, Baocang
    International Journal of Network Security, 2021, 23 (04) : 588 - 603
  • [29] Multi-authority Distributed Attribute-Based Encryption with Application to Searchable Encryption on Lattices
    Kuchta, Veronika
    Markowitch, Olivier
    PARADIGMS IN CRYPTOLOGY - MYCRYPT 2016: MALICIOUS AND EXPLORATORY CRYPTOLOGY, 2017, 10311 : 409 - 435
  • [30] Multi-authority attribute based encryption
    Chase, Melissa
    Theory of Cryptography, Proceedings, 2007, 4392 : 515 - 534