Multi-Authority Ciphertext Policy Attribute-Based Encryption Scheme on Ideal Lattices

Ciphertext policy attribute-based encryption (CP-ABE) is a promising cryptographic technology that provides fine-grained access control as well as data confidentiality. It enables one sender to encrypt the data for more receivers, and to specify a policy on who can decrypt the ciphertext using his/her attributes alone. However, most existing ABE schemes are constructed on bilinear maps and they cannot resist quantum attacks. In this paper, we propose a multi-authority CP-ABE (MA-CPABE) scheme on ideal lattices which is still secure in post-quantum era. On one hand, multiple attribute authorities are required when user's attributes cannot be managed by a central authority. On the other hand, compared with generic lattice, the ideal lattice has extra algebraic structure and can be used to construct more efficient cryptographic applications. By adding some virtual attributes for each authority, our scheme can support flexible threshold access policy. Security analysis shows that the proposed scheme is secure against chosen plaintext attack (CPA) in the standard model under the ring learning with errors (R-LWE) assumption.

[1]  Zoe L. Jiang,et al.  Offline/online attribute‐based encryption with verifiable outsourced decryption , 2017, Concurr. Comput. Pract. Exp..

[2]  Zhang Peng,et al.  Efficient Attribute-Based Encryption from R-LWE , 2014 .

[3]  Berk Sunar,et al.  Implementation and Evaluation of a Lattice-Based Key-Policy ABE Scheme , 2017, IEEE Transactions on Information Forensics and Security.

[4]  Anirban Basu,et al.  Decentralized Ciphertext-Policy Attribute-Based Encryption from Learning with Errors over Rings , 2016, 2016 IEEE Trustcom/BigDataSE/ISPA.

[5]  Dan Boneh,et al.  Efficient Lattice (H)IBE in the Standard Model , 2010, EUROCRYPT.

[6]  Azman Samsudin,et al.  Lattice Ciphertext-Policy Attribute-Based encryption from ring-LWE , 2015, 2015 International Symposium on Technology Management and Emerging Technologies (ISTMET).

[7]  Yongtao Wang,et al.  Lattice Ciphertext Policy Attribute-based Encryption in the Standard Model , 2014, Int. J. Netw. Secur..

[8]  Brent Waters,et al.  Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.

[9]  Lihua Liu,et al.  A Multi-Authority Key-Policy ABE Scheme from Lattices in Mobile Ad Hoc Networks , 2017, Ad Hoc Sens. Wirel. Networks.

[10]  Oded Regev,et al.  On lattices, learning with errors, random linear codes, and cryptography , 2005, STOC '05.

[11]  Chris Peikert,et al.  On Ideal Lattices and Learning with Errors over Rings , 2010, JACM.

[12]  Craig Gentry,et al.  Trapdoors for hard lattices and new cryptographic constructions , 2008, IACR Cryptol. ePrint Arch..

[13]  Brent Waters,et al.  Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization , 2011, Public Key Cryptography.

[14]  Xavier Boyen,et al.  Attribute-Based Functional Encryption on Lattices , 2013, TCC.

[15]  Jiwu Huang,et al.  Ciphertext policy attribute-based encryption supporting unbounded attribute space from R-LWE , 2017, KSII Trans. Internet Inf. Syst..

[16]  Jing Qin,et al.  Multi-Authority Attribute-Based Encryption Scheme from Lattices , 2015, J. Univers. Comput. Sci..

[17]  Anirban Basu,et al.  Decentralized Ciphertext-Policy Attribute-Based Encryption: A Post-Quantum Construction , 2017, J. Internet Serv. Inf. Secur..

[18]  Ron Steinfeld,et al.  Efficient Public Key Encryption Based on Ideal Lattices , 2009, ASIACRYPT.

[19]  Zhenfeng Zhang,et al.  Ciphertext policy attribute-based encryption from lattices , 2012, ASIACCS '12.

[20]  Jianfeng Ma,et al.  Secure, efficient and revocable multi-authority access control system in cloud storage , 2016, Comput. Secur..

[21]  Xiaohua Jia,et al.  Attributed-Based Access Control for Multi-authority Systems in Cloud Storage , 2012, 2012 IEEE 32nd International Conference on Distributed Computing Systems.

[22]  Vinod Vaikuntanathan,et al.  Functional Encryption for Threshold Functions (or Fuzzy IBE) from Lattices , 2012, Public Key Cryptography.

[23]  Dan Boneh,et al.  Lattice Basis Delegation in Fixed Dimension and Shorter-Ciphertext Hierarchical IBE , 2010, CRYPTO.

[24]  Brent Waters,et al.  Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.

[25]  WangXuan,et al.  Practical attribute-based encryption , 2018 .

[26]  Cynthia Dwork,et al.  A public-key cryptosystem with worst-case/average-case equivalence , 1997, STOC '97.

[27]  Allison Bishop,et al.  Decentralizing Attribute-Based Encryption , 2011, IACR Cryptol. ePrint Arch..

[28]  Brent Waters,et al.  Dynamic Credentials and Ciphertext Delegation for Attribute-Based Encryption , 2012, IACR Cryptol. ePrint Arch..