AI Chat Paper
Note: Please note that the following content is generated by AMiner AI. SciOpen does not take any responsibility related to this content.
{{lang === 'zh_CN' ? '文章概述' : 'Summary'}}
{{lang === 'en_US' ? '中' : 'Eng'}}
Chat more with AI
PDF (3 MB)
Collect
Submit Manuscript AI Chat Paper
Show Outline
Outline
Show full outline
Hide outline
Outline
Show full outline
Hide outline
Open Access

Attribute-Based Encryption for Circuits on Lattices

Jian Zhao( )Haiying GaoJunqi Zhang
PLA Information Engineering University, Zhengzhou 450000, China.
Show Author Information

Abstract

In the previous construction of attributed-based encryption for circuits on lattices, the secret key size was exponential to the number of AND gates of the circuit. Therefore, it was suitable for the shallow circuits whose depth is bounded. For decreasing the key size of previous scheme, combining the techniques of Two-to-One Recoding (TOR), and sampling on lattices, we propose a new Key-Policy Attribute-Based Encryption (KP-ABE) scheme for circuits of any arbitrary polynomial on lattices, and prove that the scheme is secure against chosen plaintext attack in the selective model under the Learning With Errors (LWE) assumptions. In our scheme, the key size is proportional to the number of gates or wires in the circuits.

References

[1]
A. Sahai and B. Waters, Fuzzy identity-based encryption, Lecture Notes in Computer Science, vol. 3494, pp. 457-473, 2005.
[2]
S. D. C. D. Vimercati and S. Foresti, Access control policies and languages, Int. J. of Computational Science and Engineering, vol. 3, no. 2, pp. 94-102, 2007.
[3]
V. Goyal, O. Pandey, A. Sahai, and B. Waters, Attribute-based encryption for fine-grained access control of encrypted data, presented at 13th ACM Conference on Computer and Communications Security, Alexandra, USA, 2006.
[4]
B. Waters, Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization, Lecture Notes in Computer Science, vol. 6571, pp. 53-70, 2011.
[5]
P. W. Shor, Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer, SIAM J. Comput., pp. 1484-1509, 1997.
[6]
M. Ajtai, Generating hard instances of lattice problems (extend abstract), presented at 28th Annual ACM Symposium on the Theory of Computing, Philadephia, USA, 1996.
[7]
S. Agrawal, X. Boyen, V. Vaikunthanathan, P. Voulgaris, and H. Wee, Functional encryption for threshold functions (or, Fuzzy IBE) from lattices, Lecture Notes in Computer Science, vol. 7293, pp. 280-297, 2012.
[8]
J. Zhang, Z. F. Zhang, and A. J. Ge, Ciphertext policy attribute-based encryption from lattices, presented at 7th ACM Symposium on Information, Computer and Communications Security, Seoul, Korea, 2012.
[9]
X. Boyen, Attribute-based functional encryption on lattices, Lecture Notes in Computer Science, vol. 7785, pp. 122-142, 2013.
[10]
A. Sahai and B. Waters, Attribute-based encryption for circuits from multilinear maps, Lecture Notes in Computer Science, vol. 8083, pp. 479-499, 2013.
[11]
X. Xie and R. Xue, Attribute-based encryption for a subclass of circuits with bounded depth from lattices, http://eprint.iacr.org/2013/342, 2013.
[12]
S. Gorbunov, V. Vaikuntanathan, and H. Wee, Attribute-based encryption for circuits, http://eprint.iacr.org/2013/337, 2013.
[13]
J. Bethencourt, A. Sahai, and B. Waters, Ciphertext-policy attribute-based encryption, in 2007 IEEE Symposium on Security and Privacy, 2007, pp. 321-334.
[14]
O. Regev, On lattices, learning with errors, random linear codes, and cryptography, in Proc. 37th Annual ACM Symposium on Theory of Computing, 2005, pp. 84-93.
[15]
D. Micciancio and C. Peikert, Trapdoors for lattices: Simpler, tighter, faster, smaller, Lecture Notes in Computer Science, vol. 7237, pp. 700-718, 2012.
[16]
C. Gentry, C. Peikert, and V. Vaikuntanathan, Trapdoors for hard lattices and new cryptographic constructions, in Proc. 40th Annual ACM Symposium on Theory of Computing, 2008, pp. 197-206.
[17]
A. Korthaus and M. Aleksy, A distributed knowledge management infrastructure based on a topic map grid, Int. J. of High Performance Computing and Networking, vol. 6, no. 1, pp. 66-80, 2009.
Tsinghua Science and Technology
Pages 463-469
Cite this article:
Zhao J, Gao H, Zhang J. Attribute-Based Encryption for Circuits on Lattices. Tsinghua Science and Technology, 2014, 19(5): 463-469. https://doi.org/10.1109/TST.2014.6919822

717

Views

23

Downloads

5

Crossref

N/A

Web of Science

9

Scopus

0

CSCD

Altmetrics

Received: 14 July 2014
Revised: 21 July 2014
Accepted: 10 August 2014
Published: 13 October 2014
© The Author(s) 2014
Return