RL-ABE: A Revocable Lattice Attribute Based Encryption Scheme Based on R-LWE Problem in Cloud Storage

被引:25
作者
Zhao, Siyu [1 ]
Jiang, Rui [2 ]
Bhargava, Bharat [3 ]
机构
[1] Southeast Univ, Sch Informat Sci & Engn, Nanjing 210096, Jiangsu, Peoples R China
[2] Southeast Univ, Sch Cyber Sci & Engn, Nanjing 210096, Jiangsu, Peoples R China
[3] Purdue Univ, Dept Comp Sci, W Lafayette, IN 47907 USA
基金
中国国家自然科学基金;
关键词
Lattices; Encryption; Resists; Cloud computing; Access control; Permission; Ciphertext-policy attribute-based encryption; attribute revocation; lattice-based cryptosystem; ring learning with error problem; CRYPTOSYSTEMS; REVOCATION; EFFICIENT; SECURE;
D O I
10.1109/TSC.2020.2973256
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this article, we propose a revocable lattice-based CP-ABE (Ciphertext-Policy Attribute-Based Encryption) scheme (RL-ABE), which is suitable to be applied in the cloud storage. The RL-ABE scheme can resist quantum algorithm attack and ensure fine-grained access control to the users' rights in achieving shared data. In addition, our scheme can realize attribute revocation, which can expediently renew users' attributes to grant or revoke their access rights. Then, we formally prove the security of our scheme based on the hardness of Ring Learning with Error problem(R-LWE) to resist quantum algorithm attack, and prove our scheme can solve security threatens to withstand collusion attacks. Finally, the performance analysis shows the high efficiency of our scheme compared with other related schemes.
引用
收藏
页码:1026 / 1035
页数:10
相关论文
共 37 条
[1]  
Ajtai M., 1996, Proceedings of the Twenty-Eighth Annual ACM Symposium on the Theory of Computing, P99, DOI 10.1145/237814.237838
[2]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[3]  
Buchmann J., 2016, P 2 ACM INT WORKSH I, P2
[4]  
Gentry C, 2008, ACM S THEORY COMPUT, P197
[5]  
Georgescu Adela, 2013, Information and Communication Technology. International Conference, ICT-EurAsia 2013. Proceedings: LNCS 7804, P353, DOI 10.1007/978-3-642-36818-9_39
[6]  
Goldreich O, 1997, LECT NOTES COMPUT SC, V1294, P112
[7]  
Goyal V., 2006, P 2006 INT C PRIVACY, P1, DOI DOI 10.1145/1180405.1180418
[8]  
Huang X.F., 2015, 2015 24 INT C COMPUT, P1, DOI [10.1109/ICCCN.2015.7288431, DOI 10.1109/ICCCN.2015.7288431]
[9]   Improving Security and Efficiency in Attribute-Based Data Sharing [J].
Hur, Junbeom .
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2013, 25 (10) :2271-2282
[10]   Collusion-Resistant Unidirectional Proxy Re-Encryption Scheme from Lattices [J].
Kim, Kee Sung ;
Jeong, Ik Rae .
JOURNAL OF COMMUNICATIONS AND NETWORKS, 2016, 18 (01) :1-7