Survey of Post-Quantum Lattice-Based Ciphertext-Policy Attribute-Based Encryption Schemes for Cloud Storage: Taxonomy, Open Issues, and Future Directions

被引:2
|
作者
Sravya, Gudipati [1 ,2 ]
Kumar, Pasupuleti Syam [3 ]
Padmavathy, R. [4 ]
机构
[1] Natl Inst Technol Warangal NITW, Dept Comp Sci & Engn CSE, Hanamkonda 506004, India
[2] Inst Dev & Res Banking Technol IDRBT, Quantum Safe Cryptog Lab, Hyderabad 500057, India
[3] IDRBT, Quantum Safe Cryptog Lab, Hyderabad 500057, India
[4] NITW, Dept CSE, Hanamkonda 506004, India
关键词
Access control; Quantum computing; CP-ABE; cloud storage; LWE; lattice; post-quantum; R-LWE;
D O I
10.1109/TSC.2024.3479930
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Ciphertext Policy Attribute-Based Encryption (CP-ABE) is one of the most prevalent cryptographic primitives for realizing privacy and fine-grained access control in cloud computing. However, most of the existing CP-ABE schemes constructed using Paring-Based Cryptography (PBC) from Discrete Logarithm Problem (DLP) or Diffie Hellman Problem (DHP) assumptions are susceptible to quantum attacks, whereas CP-ABE schemes constructed using lattice-based cryptography based on Learning with Errors (LWE) and Ring-LWE (R-LWE) assumptions are quantum-safe and ensure fine-grained access control. This paper comprehensively surveys the existing Lattice-based CP-ABE (LCP-ABE) schemes based on LWE and R-LWE assumptions. Further, this paper analyzes and compares the security and performance features of existing LCP-ABE schemes. Finally, this paper identifies the open issues and future directions that need further investigation on LCP-ABE schemes.
引用
收藏
页码:4540 / 4557
页数:18
相关论文
共 50 条
  • [1] Secure Lattice-Based Ciphertext-Policy Attribute-Based Encryption From Module-LWE For Cloud Storage
    Sravya, Gudipati
    kumar, Pasupuleti Syam
    Padmavathy, R.
    2023 IEEE 16TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, CLOUD, 2023, : 554 - 556
  • [2] Searchable ciphertext-policy attribute-based encryption with revocation in cloud storage
    Li, Jiguo
    Shi, Yuerong
    Zhang, Yichen
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2017, 30 (01)
  • [3] Survey on Revocation in Ciphertext-Policy Attribute-Based Encryption
    Al-Dahhan, Ruqayah R.
    Shi, Qi
    Lee, Gyu Myoung
    Kifayat, Kashif
    SENSORS, 2019, 19 (07)
  • [4] Ciphertext-policy attribute-based encryption
    Bethencourt, John
    Sahai, Amit
    Waters, Brent
    2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 321 - +
  • [5] Efficient revocation in ciphertext-policy attribute-based encryption based cryptographic cloud storage
    Yong CHENG
    Zhi-ying WANG
    Jun MA
    Jiang-jiang WU
    Song-zhu MEI
    Jiang-chun REN
    Frontiers of Information Technology & Electronic Engineering, 2013, (02) : 85 - 97
  • [6] Efficient revocation in ciphertext-policy attribute-based encryption based cryptographic cloud storage
    Cheng, Yong
    Wang, Zhi-ying
    Ma, Jun
    Wu, Jiang-jiang
    Mei, Song-zhu
    Ren, Jiang-chun
    JOURNAL OF ZHEJIANG UNIVERSITY-SCIENCE C-COMPUTERS & ELECTRONICS, 2013, 14 (02): : 85 - 97
  • [7] Efficient revocation in ciphertext-policy attribute-based encryption based cryptographic cloud storage
    Yong Cheng
    Zhi-ying Wang
    Jun Ma
    Jiang-jiang Wu
    Song-zhu Mei
    Jiang-chun Ren
    Journal of Zhejiang University SCIENCE C, 2013, 14 : 85 - 97
  • [8] Traceable and undeniable ciphertext-policy attribute-based encryption for cloud storage service
    Yu, Gang
    Wang, Yongjuan
    Cao, Zhenfu
    Lin, Jian
    Wang, Xiangyu
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2019, 15 (04):
  • [9] Lattice-based multi-authority ciphertext-policy attribute-based searchable with attribute revocation for cloud
    Shen, Xiajiong
    Li, Xiaoran
    Yin, Hongjian
    Cao, Chaoyang
    Zhang, Lei
    COMPUTER NETWORKS, 2024, 250
  • [10] CP-ABSEL: Ciphertext-policy attribute-based searchable encryption from lattice in cloud storage
    Varri, Uma Sankararao
    Pasupuleti, Syam Kumar
    Kadambari, K. V.
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2021, 14 (03) : 1290 - 1302