Skip to main content

A New Revocable Attribute Based Encryption onĀ Lattice

  • Conference paper
  • First Online:
Provable and Practical Security (ProvSec 2023)

Abstract

In this paper we propose a new Lattice-based Revocable Attribute Based Encryption (RL-ABE) scheme in the cloud. We use Ciphertext-Policy Attribute Based Encryption (CP-ABE) in the scheme. This policy is implemented in the way that the data owner can define her/his own access control policy. And our access policy uses a linear secret sharing scheme (LSSS) converted by boolean formula to achieve fine-grained access control of user permissions. More importantly, we propose a new revocation mechanism. Different from the current revocation mechanism, data service manager in the cloud do not require key during the revocation process, thus avoiding the key leakage problem and improving the security of the solution. In addition, the difficult problem we based on is the learning with error (LWE) problem in lattice, which is resistant to quantum algorithm attacks. The scheme that is constructed in this paper using the LWE problem is proved to be secure under selective plaintext attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 59.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 79.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Agrawal, S., Boyen, X.: Identity-based encryption from lattices in the standard model. manuscript (2009)

    Google ScholarĀ 

  2. Agrawal, S., Chase, M.: FAME: fast attribute-based message encryption. In: Thuraisingham, B., Evans, D., Malkin, T., Xu, D. (eds.) ACM-CCS 2017, pp. 665ā€“682. ACM (2017). https://doi.org/10.1145/3133956.3134014

  3. Agrawal, S., Boneh, D., Boyen, X.: Lattice basis delegation in fixed dimension and shorter-ciphertext hierarchical IBE. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 98ā€“115. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-14623-7_6

    ChapterĀ  MATHĀ  Google ScholarĀ 

  4. Agrawal, S., Boyen, X., Vaikuntanathan, V., Voulgaris, P., Wee, H.: Functional encryption for threshold functions (or fuzzy ibe) from lattices. In: Fischlin, M., Buchmann, J., Manulis, M. (eds.) PKC 2012. LNCS, vol. 7293, pp. 280ā€“297. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-30057-8_17

    ChapterĀ  Google ScholarĀ 

  5. Ajtai, M.: Generating hard instances of lattice problems (extended abstract). In: Miller, G.L. (ed.) STOC, pp. 99ā€“108. ACM (1996). https://doi.org/10.1145/237814.237838

  6. Ambrosin, M., Conti, M., Dargahi, T.: On the feasibility of attribute-based encryption on smartphone devices. In: Cirani, S., Dohler, M., Ferrari, G., Grieco, L.A., Picone, M., Watteyne, T. (eds.) Proceedings of the 2015 Workshop on IoT challenges in Mobile and Industrial Systems, 2015, pp. 49ā€“54. ACM (2015). https://doi.org/10.1145/2753476.2753482

  7. Boyen, X.: Attribute-based functional encryption on lattices. In: Sahai, A. (ed.) TCC 2013. LNCS, vol. 7785, pp. 122ā€“142. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-36594-2_8

    ChapterĀ  Google ScholarĀ 

  8. Chen, J., Lim, H.W., Ling, S., Wang, H., Nguyen, K.: Revocable identity-based encryption from lattices. In: Susilo, W., Mu, Y., Seberry, J. (eds.) ACISP 2012. LNCS, vol. 7372, pp. 390ā€“403. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-31448-3_29

    ChapterĀ  Google ScholarĀ 

  9. Datta, P., Komargodski, I., Waters, B.: Decentralized multi-authority ABE for DNFs from LWE. In: Canteaut, A., Standaert, F.-X. (eds.) EUROCRYPT 2021. LNCS, vol. 12696, pp. 177ā€“209. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-77870-5_7

    ChapterĀ  Google ScholarĀ 

  10. Gentry, C., Peikert, C., Vaikuntanathan, V.: Trapdoors for hard lattices and new cryptographic constructions. In: Dwork, C. (ed.) STOC, pp. 197ā€“206. ACM (2008). https://doi.org/10.1145/1374376.1374407

  11. Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: ACM-CCS 2006, pp. 89ā€“98. ACM (2006). https://doi.org/10.1145/1180405.1180418

  12. Han, D., Pan, N., Li, K.: A traceable and revocable ciphertext-policy attribute-based encryption scheme based on privacy protection. IEEE Trans. 19(1), 316ā€“327 (2022). https://doi.org/10.1109/TDSC.2020.2977646

    ArticleĀ  Google ScholarĀ 

  13. Lewko, A., Waters, B.: Decentralizing attribute-based encryption. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 568ā€“588. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-20465-4_31

    ChapterĀ  Google ScholarĀ 

  14. Luo, F., Al-Kuwari, S.M., Wang, H., Wang, F., Chen, K.: Revocable attribute-based encryption from standard lattices. Comput. Stand. Interfaces 84, 103698 (2023). https://doi.org/10.1016/j.csi.2022.103698

  15. Micciancio, D., Peikert, C.: Trapdoors for lattices: simpler, tighter, faster, smaller. In: Pointcheval, D., Johansson, T. (eds.) EUROCRYPT 2012. LNCS, vol. 7237, pp. 700ā€“718. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-29011-4_41

    ChapterĀ  Google ScholarĀ 

  16. Pirretti, M., Traynor, P., McDaniel, P.D., Waters, B.: Secure attribute-based systems. J. Comput. Secur. 18(5), 799ā€“837 (2010). https://doi.org/10.3233/JCS-2009-0383

    ArticleĀ  Google ScholarĀ 

  17. Regev, O.: New lattice-based cryptographic constructions. J. ACM 51(6), 899ā€“942 (2004). https://doi.org/10.1145/1039488.1039490

    ArticleĀ  MathSciNetĀ  MATHĀ  Google ScholarĀ 

  18. Regev, O.: On lattices, learning with errors, random linear codes, and cryptography. In: Gabow, H.N., Fagin, R. (eds.) STOC, pp. 84ā€“93. ACM (2005). https://doi.org/10.1145/1060590.1060603

  19. Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457ā€“473. Springer, Heidelberg (2005). https://doi.org/10.1007/11426639_27

    ChapterĀ  Google ScholarĀ 

  20. Wang, G., Liu, Q., Wu, J.: Hierarchical attribute-based encryption for fine-grained access control in cloud storage services. In: Al-Shaer, E., Keromytis, A.D., Shmatikov, V. (eds.) ACM-CCS 2010, pp. 735ā€“737. ACM (2010), https://doi.org/10.1145/1866307.1866414

  21. Wang, S., Zhang, X., Zhang, Y.: Efficient revocable and grantable attribute-based encryption from lattices with fine-grained access control. IET Inf. Secur. 12(2), 141ā€“149 (2018). https://doi.org/10.1049/iet-ifs.2017.0225

    ArticleĀ  MathSciNetĀ  Google ScholarĀ 

  22. Wang, Y.: Lattice ciphertext policy attribute-based encryption in the standard model. Int. J. Netw. Secur. 16(6), 444ā€“451 (2014). https://ijns.jalaxy.com.tw/contents/ijns-v16-n6/ijns-2014-v16-n6-p444-451.pdf

  23. Xie, X., Xue, R.: Attribute-based encryption for a subclass of circuits with bounded depth from lattices. IACR Cryptol. ePrint Arch., pp. 342 (2013). https://eprint.iacr.org/2013/342

  24. Yang, K., Wu, G., Dong, C., Fu, X., Li, F., Wu, T.: Attribute based encryption with efficient revocation from lattices. Int. J. Netw. Secur. 22(1), 161ā€“170 (2020). https://ijns.jalaxy.com.tw/contents/ijns-v22-n1/ijns-2020-v22-n1-p161-170.pdf

  25. Yang, Y., Sun, J., Liu, Z., Qiao, Y.: Practical revocable and multi-authority CP-ABE scheme from RLWE for cloud computing. J. Inf. Secur. Appl. 65, 103108 (2022). https://doi.org/10.1016/j.jisa.2022.103108

    ArticleĀ  Google ScholarĀ 

  26. Zhang, J., Zhang, Z., Ge, A.: Ciphertext policy attribute-based encryption from lattices. In: Youm, H.Y., Won, Y. (eds.) ACM-CCS 2012, pp. 16ā€“17. ACM (2012). https://doi.org/10.1145/2414456.2414464

  27. Zhang, Y., Chen, X., Li, J., Wong, D.S., Li, H.: Anonymous attribute-based encryption supporting efficient decryption test. In: Chen, K., Xie, Q., Qiu, W., Li, N., Tzeng, W. (eds.) ACM-CCS 2013, pp. 511ā€“516. ACM (2013), https://doi.org/10.1145/2484313.2484381

Download references

Acknowledgement

Lifeng Guo was supported by the National Science Foundation of Shanxi Province (202203021221012). The work is supported in part by the National Science Foundation of China (NSFC) under grants: 62002210.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Lifeng Guo .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

Ā© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Guo, L., Wang, L., Ma, X., Ma, Q. (2023). A New Revocable Attribute Based Encryption onĀ Lattice. In: Zhang, M., Au, M.H., Zhang, Y. (eds) Provable and Practical Security. ProvSec 2023. Lecture Notes in Computer Science, vol 14217. Springer, Cham. https://doi.org/10.1007/978-3-031-45513-1_17

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-45513-1_17

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-45512-4

  • Online ISBN: 978-3-031-45513-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics