Abstract
In this paper we propose a new Lattice-based Revocable Attribute Based Encryption (RL-ABE) scheme in the cloud. We use Ciphertext-Policy Attribute Based Encryption (CP-ABE) in the scheme. This policy is implemented in the way that the data owner can define her/his own access control policy. And our access policy uses a linear secret sharing scheme (LSSS) converted by boolean formula to achieve fine-grained access control of user permissions. More importantly, we propose a new revocation mechanism. Different from the current revocation mechanism, data service manager in the cloud do not require key during the revocation process, thus avoiding the key leakage problem and improving the security of the solution. In addition, the difficult problem we based on is the learning with error (LWE) problem in lattice, which is resistant to quantum algorithm attacks. The scheme that is constructed in this paper using the LWE problem is proved to be secure under selective plaintext attacks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Agrawal, S., Boyen, X.: Identity-based encryption from lattices in the standard model. manuscript (2009)
Agrawal, S., Chase, M.: FAME: fast attribute-based message encryption. In: Thuraisingham, B., Evans, D., Malkin, T., Xu, D. (eds.) ACM-CCS 2017, pp. 665ā682. ACM (2017). https://doi.org/10.1145/3133956.3134014
Agrawal, S., Boneh, D., Boyen, X.: Lattice basis delegation in fixed dimension and shorter-ciphertext hierarchical IBE. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 98ā115. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-14623-7_6
Agrawal, S., Boyen, X., Vaikuntanathan, V., Voulgaris, P., Wee, H.: Functional encryption for threshold functions (or fuzzy ibe) from lattices. In: Fischlin, M., Buchmann, J., Manulis, M. (eds.) PKC 2012. LNCS, vol. 7293, pp. 280ā297. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-30057-8_17
Ajtai, M.: Generating hard instances of lattice problems (extended abstract). In: Miller, G.L. (ed.) STOC, pp. 99ā108. ACM (1996). https://doi.org/10.1145/237814.237838
Ambrosin, M., Conti, M., Dargahi, T.: On the feasibility of attribute-based encryption on smartphone devices. In: Cirani, S., Dohler, M., Ferrari, G., Grieco, L.A., Picone, M., Watteyne, T. (eds.) Proceedings of the 2015 Workshop on IoT challenges in Mobile and Industrial Systems, 2015, pp. 49ā54. ACM (2015). https://doi.org/10.1145/2753476.2753482
Boyen, X.: Attribute-based functional encryption on lattices. In: Sahai, A. (ed.) TCC 2013. LNCS, vol. 7785, pp. 122ā142. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-36594-2_8
Chen, J., Lim, H.W., Ling, S., Wang, H., Nguyen, K.: Revocable identity-based encryption from lattices. In: Susilo, W., Mu, Y., Seberry, J. (eds.) ACISP 2012. LNCS, vol. 7372, pp. 390ā403. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-31448-3_29
Datta, P., Komargodski, I., Waters, B.: Decentralized multi-authority ABE for DNFs from LWE. In: Canteaut, A., Standaert, F.-X. (eds.) EUROCRYPT 2021. LNCS, vol. 12696, pp. 177ā209. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-77870-5_7
Gentry, C., Peikert, C., Vaikuntanathan, V.: Trapdoors for hard lattices and new cryptographic constructions. In: Dwork, C. (ed.) STOC, pp. 197ā206. ACM (2008). https://doi.org/10.1145/1374376.1374407
Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: ACM-CCS 2006, pp. 89ā98. ACM (2006). https://doi.org/10.1145/1180405.1180418
Han, D., Pan, N., Li, K.: A traceable and revocable ciphertext-policy attribute-based encryption scheme based on privacy protection. IEEE Trans. 19(1), 316ā327 (2022). https://doi.org/10.1109/TDSC.2020.2977646
Lewko, A., Waters, B.: Decentralizing attribute-based encryption. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 568ā588. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-20465-4_31
Luo, F., Al-Kuwari, S.M., Wang, H., Wang, F., Chen, K.: Revocable attribute-based encryption from standard lattices. Comput. Stand. Interfaces 84, 103698 (2023). https://doi.org/10.1016/j.csi.2022.103698
Micciancio, D., Peikert, C.: Trapdoors for lattices: simpler, tighter, faster, smaller. In: Pointcheval, D., Johansson, T. (eds.) EUROCRYPT 2012. LNCS, vol. 7237, pp. 700ā718. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-29011-4_41
Pirretti, M., Traynor, P., McDaniel, P.D., Waters, B.: Secure attribute-based systems. J. Comput. Secur. 18(5), 799ā837 (2010). https://doi.org/10.3233/JCS-2009-0383
Regev, O.: New lattice-based cryptographic constructions. J. ACM 51(6), 899ā942 (2004). https://doi.org/10.1145/1039488.1039490
Regev, O.: On lattices, learning with errors, random linear codes, and cryptography. In: Gabow, H.N., Fagin, R. (eds.) STOC, pp. 84ā93. ACM (2005). https://doi.org/10.1145/1060590.1060603
Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457ā473. Springer, Heidelberg (2005). https://doi.org/10.1007/11426639_27
Wang, G., Liu, Q., Wu, J.: Hierarchical attribute-based encryption for fine-grained access control in cloud storage services. In: Al-Shaer, E., Keromytis, A.D., Shmatikov, V. (eds.) ACM-CCS 2010, pp. 735ā737. ACM (2010), https://doi.org/10.1145/1866307.1866414
Wang, S., Zhang, X., Zhang, Y.: Efficient revocable and grantable attribute-based encryption from lattices with fine-grained access control. IET Inf. Secur. 12(2), 141ā149 (2018). https://doi.org/10.1049/iet-ifs.2017.0225
Wang, Y.: Lattice ciphertext policy attribute-based encryption in the standard model. Int. J. Netw. Secur. 16(6), 444ā451 (2014). https://ijns.jalaxy.com.tw/contents/ijns-v16-n6/ijns-2014-v16-n6-p444-451.pdf
Xie, X., Xue, R.: Attribute-based encryption for a subclass of circuits with bounded depth from lattices. IACR Cryptol. ePrint Arch., pp. 342 (2013). https://eprint.iacr.org/2013/342
Yang, K., Wu, G., Dong, C., Fu, X., Li, F., Wu, T.: Attribute based encryption with efficient revocation from lattices. Int. J. Netw. Secur. 22(1), 161ā170 (2020). https://ijns.jalaxy.com.tw/contents/ijns-v22-n1/ijns-2020-v22-n1-p161-170.pdf
Yang, Y., Sun, J., Liu, Z., Qiao, Y.: Practical revocable and multi-authority CP-ABE scheme from RLWE for cloud computing. J. Inf. Secur. Appl. 65, 103108 (2022). https://doi.org/10.1016/j.jisa.2022.103108
Zhang, J., Zhang, Z., Ge, A.: Ciphertext policy attribute-based encryption from lattices. In: Youm, H.Y., Won, Y. (eds.) ACM-CCS 2012, pp. 16ā17. ACM (2012). https://doi.org/10.1145/2414456.2414464
Zhang, Y., Chen, X., Li, J., Wong, D.S., Li, H.: Anonymous attribute-based encryption supporting efficient decryption test. In: Chen, K., Xie, Q., Qiu, W., Li, N., Tzeng, W. (eds.) ACM-CCS 2013, pp. 511ā516. ACM (2013), https://doi.org/10.1145/2484313.2484381
Acknowledgement
Lifeng Guo was supported by the National Science Foundation of Shanxi Province (202203021221012). The work is supported in part by the National Science Foundation of China (NSFC) under grants: 62002210.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
Ā© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Guo, L., Wang, L., Ma, X., Ma, Q. (2023). A New Revocable Attribute Based Encryption onĀ Lattice. In: Zhang, M., Au, M.H., Zhang, Y. (eds) Provable and Practical Security. ProvSec 2023. Lecture Notes in Computer Science, vol 14217. Springer, Cham. https://doi.org/10.1007/978-3-031-45513-1_17
Download citation
DOI: https://doi.org/10.1007/978-3-031-45513-1_17
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-45512-4
Online ISBN: 978-3-031-45513-1
eBook Packages: Computer ScienceComputer Science (R0)