LWE-based multi-authority attribute-based encryption scheme with hidden policies

被引:6
|
作者
Tian, Qiuting [1 ]
Han, Dezhi [1 ]
Liu, Xingao [1 ]
Yu, Xueshan [1 ]
机构
[1] Shanghai Maritime Univ, Coll Informat Engn, 1550 Haigang Ave, Shanghai, Peoples R China
基金
中国国家自然科学基金;
关键词
attribute-based encryption; ABE; learning with errors; hidden policies; lattices; standard model; multi-authority; bilinear maps; Shamir secret sharing mechanism; LATTICES;
D O I
10.1504/IJCSE.2019.100244
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Most attribute-based encryption schemes are based on bilinear maps, which have large computational and storage overhead and cannot resist quantum attacks. In view of the above problems, a LWE-based multi-authority attribute-based encryption scheme with hidden policies is proposed. Firstly, the scheme uses the lattice theory to replace the previous bilinear maps, and supports multi-authority to manage different attribute sets. Secondly, the Shamir secret sharing mechanism is introduced to construct the access tree structure, which improves the flexibility of the system. Also, the access policies can be completely hidden so as to protect the privacy of users. Finally, the scheme is proved to be secure against the chosen plaintext attack under the standard model. Compared with the existing related schemes, the size of public parameters, master secret key, user's private key and ciphertext are all optimised in some degree. Therefore it is more suitable for data encryption in cloud environment.
引用
收藏
页码:233 / 241
页数:9
相关论文
共 50 条
  • [31] Multi-authority attribute-based encryption with honest-but-curious central authority
    Bozovic, Vladimir
    Socek, Daniel
    Steinwandt, Rainer
    Villanyi, Viktoria I.
    INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 2012, 89 (03) : 268 - 283
  • [32] Multi-authority attribute-based encryption access control scheme with hidden policy and constant length ciphertext for cloud storage
    Fan Yundong
    Wu Xiaoping
    Wang Jiasheng
    2017 IEEE SECOND INTERNATIONAL CONFERENCE ON DATA SCIENCE IN CYBERSPACE (DSC), 2017, : 205 - 212
  • [33] Efficient Revocable Multi-Authority Attribute-Based Encryption for Cloud Storage
    Ming, Yang
    He, Baokang
    Wang, Chenhao
    IEEE ACCESS, 2021, 9 : 42593 - 42603
  • [34] Weighted Attribute-Based Proxy Re-Encryption Scheme with Distributed Multi-Authority Attributes
    Yi, Wenlong
    Wang, Chuang
    Kuzmin, Sergey
    Gerasimov, Igor
    Cheng, Xiangping
    SENSORS, 2024, 24 (15)
  • [35] Distributed Multi-authority Attribute-based Encryption Scheme for Friend Discovery in Mobile Social Networks
    Wang, Wenbo
    Qi, Fang
    Wu, Xiaoqiang
    Tang, Zhe
    INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE 2016 (ICCS 2016), 2016, 80 : 617 - 626
  • [36] Hierarchical Multi-Authority and Attribute-Based Encryption Friend Discovery Scheme in Mobile Social Networks
    Luo, Entao
    Liu, Qin
    Wang, Guojun
    IEEE COMMUNICATIONS LETTERS, 2016, 20 (09) : 1772 - 1775
  • [37] A Multi-authority Attribute-Based Encryption Access Control for Social Network
    Yang, Xiao-dong
    Yang, Miao-miao
    Yang, Ping
    Leng, Qi
    CONFERENCE PROCEEDINGS OF 2017 3RD IEEE INTERNATIONAL CONFERENCE ON CONTROL SCIENCE AND SYSTEMS ENGINEERING (ICCSSE), 2017, : 671 - 674
  • [38] Distributed Multi-authority Attribute-Based Encryption Using Cellular Automata
    Pradhan, Ankit
    Sethi, Kamalakanta
    Mohapatra, Shrohan
    Bera, Padmalochan
    CRYPTOLOGY AND NETWORK SECURITY (CANS 2019), 2019, 11829 : 434 - 456
  • [39] Multi-Authority Attribute-Based Encryption Access Control Scheme in Wireless Body Area Network
    Xiao, Min
    Hu, Xiaoyong
    2018 3RD INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS ENGINEERING (ICISE), 2018, : 39 - 45
  • [40] Multi-authority attribute-based encryption scheme with constant-size ciphertexts and user revocation
    Zhang, Xiao
    Wu, Faguo
    Yao, Wang
    Wang, Zhao
    Wang, Wenhua
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2019, 31 (21):