新的格上多機(jī)構(gòu)屬性基加密方案
doi: 10.11999/JEIT170628 cstr: 32379.14.JEIT170628
-
1.
(河南理工大學(xué)計(jì)算機(jī)學(xué)院 焦作 454003)
-
2.
(北京印刷學(xué)院信息工程學(xué)院 北京 102600)
國(guó)家自然科學(xué)基金(61300216),河南省教育廳科研項(xiàng)目(16A520013),國(guó)家密碼管理局十三五國(guó)家密碼發(fā)展基金(MMJJ20170122)
New Multi-authority Attribute-based Encryption Scheme on Lattices
-
1.
(School of Computer Science and Technology, Henan Polytechnic University, Jiaozuo 454003, China)
-
2.
(School of Information Engineering, Beijing Institute of Graphic Communication, Beijing 102600, China)
The National Natural Science Foundation of China (61300216), The Scientific Research Project of Henan Province (16A520013), The 13th Five-Year National Crypto Development Foundation (MMJJ20170122)
-
摘要: 針對(duì)基于雙線性映射的屬性基加密方案中無(wú)法抵抗量子攻擊的問(wèn)題,該文提出一種新的格上多機(jī)構(gòu)屬性基加密方案。先利用格上左抽樣算法為用戶生成密鑰,使得用戶私鑰尺寸與級(jí)聯(lián)矩陣的列數(shù)和用戶屬性個(gè)數(shù)相關(guān),縮短用戶私鑰尺寸;然后采用Shamir門限秘密共享技術(shù)構(gòu)造訪問(wèn)樹(shù),實(shí)現(xiàn)屬性的與、或、門限3種操作,密文允許基于任意的訪問(wèn)結(jié)構(gòu)生成,表達(dá)能力更加豐富,解決了大多方案中訪問(wèn)策略單一問(wèn)題;方案證明可在標(biāo)準(zhǔn)模型下歸約到判定性帶誤差學(xué)習(xí)問(wèn)題的難解性。對(duì)比分析表明,方案系統(tǒng)公私鑰、用戶私鑰和密文尺寸均有所優(yōu)化,并較優(yōu)于大多數(shù)單機(jī)構(gòu)方案,此外方案存在多個(gè)屬性機(jī)構(gòu),支持任意單調(diào)訪問(wèn)結(jié)構(gòu),安全性和實(shí)用性更滿足云環(huán)境需求。
-
關(guān)鍵詞:
- 屬性基加密 /
- 格 /
- 多機(jī)構(gòu) /
- 帶誤差學(xué)習(xí) /
- 標(biāo)準(zhǔn)模型
Abstract: To resolve the problem of poor security on quantum attack in attribute-based encryption over the bilinear maps, a new multi-authority attribute-based encryption scheme on lattices is proposed. Firstly, the SamepleLeft algorithm was used to extract the users private key, so it can reduce the size of private key which is related to the dimensions of concatenation matrix and the quantity of users attributes. Secondly, aiming at the problem of single access policy, the new scheme employed the Shamir secret sharing scheme which is used to construct an access tree to realized AND, OR, THRESHOLD operations on attributes, so the ciphertext can be generated by any access structure, and the expressive skill of access policy is more extensive. Lastly, the security of the proposed scheme could reduce to the hardness of decisional learning with errors problem under standard model. Comparative analysis shows that, the size of public parameters, master secret key, users private key and ciphertext are all optimized, and it has better performance than single authority schemes in some degree. Furthermore, from perspective of security and practicability, the new multi-authority attribute-based encryption scheme is more suitable for the demand of cloud environment.-
Key words:
- Attribute-based encryption /
- Lattices /
- Multi-authority /
- Learning With Errors (LWE) /
- Standard model
-
SAHAI A and WATERS B. Fuzzy identity-based encryption [C]. Advances in Cryptology-Eurocrypt 2005. Berlin, Heidelberg, May 2005: 457-473. AJTAI M and DWORK C. A public-key cryptosystem with worst-case/average-case equivalence[C]. Proceedings of ACM Symposium on Theory of Computing(STOC). EI Paso, Texas, USA, May 1997: 284-293. REGEV O. On lattices, learning with errors, random linear codes, and cryptography[C]. Proceedings of the Symposium on Theory of Computing, Baltimore, USA, 2005: 84-93. AGRAWAL S, BOYEN X, VAIKUNTANATHAN V, et al. Functional encryption for threshold functions (or fuzzy IBE) from lattices[C]. Proceedings of International Conference on Practice and Theory in Public Key Cryptography. Darmstadt, Germany, 2012: 280-297. BOYEN X. Attribute-based functional encryption on lattices[C]. Proceedings of the 10th Theory of Cryptography Conference, Lecture Notes in Computer Science, Tokyo, Japan, 2013, 7785: 122-142. LIU Ximeng, MA Jianfeng, XIONG Jinbo, et al. Threshold attribute-based encryption with attribute hierarchy for lattices in the standard model[J]. IET Information Security, 2014, 8(4): 217-223. doi: 10.1049/iet-ifs.2013.0111. ZHAO Jian, GAO Haiying, and ZHANG Junqi. Attribute- based encryption for circuits on lattices[J]. Tsinghua Science and Technology, 2014, 45(5): 463-469. doi: 10.3969/j.issn. 1007-0214.2014.05.005. WANG Yongtao. Lattice ciphertext policy attribute-based encryption in the standard model[J]. International Journal of Network Security, 2014, 16(6): 444-451. doi: 10.6633/IJNS. 201411.16(6).6. ZHU Wei-ling, YU Jianping, WANG Ting, et al. Efficient attribute-based encryption from R-LWE[J]. Chinese Journal of Electronics, 2014, 23(4): 778-782. 吳立強(qiáng), 楊曉元, 韓益亮. 基于理想格的高效模糊身份加密方案[J]. 計(jì)算機(jī)學(xué)報(bào), 2015, 38(4): 775-782. doi: 10.3724/SP.J. 1016.2015.00775. WU Liqiang, YANG Xiaoyuan, and HAN Yiliang. An efficient FIBE scheme based on ideal lattices[J]. Chinese Journal of Computers, 2015, 38(4): 775-782. doi: 10.3724/ SP.J.1016.2015.00775. TAN S F and SAMAUDIN A. Lattice ciphertext-policy attribute-based encryption from ring-LWE[C]. Proceedings of International Symposium on Technology Management and Emerging Technologies, Langkawai Island, Malaysia, 2015: 258-262. 孫澤棟, 祝躍飛, 顧純祥, 等. 基于RLWE的密鑰策略屬性加密體制[J]. 通信學(xué)報(bào),2016, 37(Z1): 125-131. doi: 10.11959/ j.issn.1000-436x.2016258. SUN Zedong, ZHU Yuefei, GU Chunxiang, et al. RLWE- based key-policy ABE scheme[J]. Journal of Communications, 2016, 37(Z1): 125-131. doi: 10.11959/j.issn.1000-436x. 2016258. 楊海濱. 一種新的格上基于身份的分層加密方案[J]. 武漢大學(xué)學(xué)報(bào)理學(xué)版, 2016, 62(2): 155-160. doi: 10.14188/j.1671- 8836.2016.02.009. YANG Haibin. A new hierarchical identity-based encryption scheme based on lattices[J]. Journal of Wuhan University (Nature Science Edition), 2016, 62(2): 155-160. doi: 10.14188 /j.1671-8836.2016.02.009. CHEN Zehong, ZHANG Peng, ZHANG Fangguo, et al. Ciphertext policy attribute-based encryption supporting unbounded attribute space from R-LWE[J]. KSII Transactions on Interent and Information Systems, 2017, 11(4): 2292-2309. doi: 10.3837/tiis.2017.04.025. CHASE M. Multi-authority attribute based encryption[C]. Proceedings of Theory of Cryptography Conference. (TCC 07), Amsterdam, Netherlands, 2007: 515-534. ZHANG Guoyan, QIN Jing, and QAZI S. Multi-authority attribute-based encryption scheme from lattices[J]. Journal of Universal Computer Science, 2015, 21(3): 483-501. doi: 10.3217/jucs-021-03-0483. GENTRY C, PEIKERT C, and VAIKUNTANATHAN V. Trapdoors for hard lattice and new cryptographic constructions[C]. Proceedings of the Symposium on Theory of Computing, Victoria, Canada, 2008: 197-206. AGRAWAL S, BONEH D, and BOYEN X. Efficient lattice (H)IBE in the standard model[C]. Proceedings of Eurocrypt 2010, Lecture Notes in Computer Science, Riviera, France, May 2010, 6110: 553-572. -
計(jì)量
- 文章訪問(wèn)數(shù): 1351
- HTML全文瀏覽量: 179
- PDF下載量: 200
- 被引次數(shù): 0