Secure Lattice-Based Ciphertext-Policy Attribute-Based Encryption From Module-LWE For Cloud Storage

被引:1
作者
Sravya, Gudipati [1 ,2 ]
kumar, Pasupuleti Syam [2 ]
Padmavathy, R. [1 ]
机构
[1] NIT Warangal, Comp Sci & Engn, Warangal, Telangana, India
[2] IDRBT, Hyderabad, Telangana, India
来源
2023 IEEE 16TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, CLOUD | 2023年
关键词
CP-ABE; Lattice-based cryptography; M-LWE; Access control; Cloud storage; Privacy;
D O I
10.1109/CLOUD60044.2023.00074
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Ciphertext-Policy Attribute-Based Encryption (CP-ABE) is the most promising scheme to achieve fine-grained access control and data privacy in a cloud environment by offering one-to-many encryption. However, most existing CP-ABE schemes are fragile to quantum attacks because they are constructed using bilinear pairing assumptions. This paper proposes a Secure Lattice-Based CP-ABE scheme (SL-CP-ABE) from the Module Learning With Errors (M-LWE) to defend against quantum attacks and to realize fine-grained access control and data privacy in the cloud storage. The security of SL-CP-ABE proved against the Indistinguishable Selective Chosen Plaintext Attack (IND-sCPA) under the hardness of the M-LWE. The performance analysis demonstrates that the SL-CP-ABE scheme is efficient and practical.
引用
收藏
页码:554 / 556
页数:3
相关论文
共 10 条
  • [1] Implementation of Lattice Trapdoors on Modules and Applications
    Bert, Pauline
    Eberhart, Gautier
    Prabel, Lucas
    Roux-Langlois, Adeline
    Sabt, Mohamed
    [J]. POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2021, 2021, 12841 : 195 - 214
  • [2] Cheung L, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P456
  • [3] Practical Applications of Improved Gaussian Sampling for Trapdoor Lattices
    Gur, Kamil D.
    Polyakov, Yuriy
    Rohloff, Kurt
    Ryan, Gerard W.
    Sajjadpour, Hadi
    Savas, Erkay
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2019, 68 (04) : 570 - 584
  • [4] Securely outsourcing the ciphertext-policy attribute-based encryption
    Kim Thuat Nguyen
    Oualha, Nouha
    Laurent, Maryline
    [J]. WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS, 2018, 21 (01): : 169 - 183
  • [5] Approx-SVP in Ideal Lattices with Pre-processing
    Pellet-Mary, Alice
    Hanrot, Guillaume
    Stehle, Damien
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2019, PT II, 2019, 11477 : 685 - 716
  • [6] Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer
    Shor, PW
    [J]. SIAM REVIEW, 1999, 41 (02) : 303 - 332
  • [7] Yongtao Wang, 2014, International Journal of Network Security, V16, P444
  • [8] Zhang J, 2012, 7TH ACM SYMPOSIUM ON INFORMATION, COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS 2012)
  • [9] Zhang YH, 2014, LECT NOTES COMPUT SC, V8782, P259, DOI 10.1007/978-3-319-12475-9_18
  • [10] Zhao Siyu, 2020, IEEE Transactions on Services Computing