Threshold attribute-based encryption with attribute hierarchy for lattices in the standard model

被引:17
作者
Liu, Ximeng [1 ]
Ma, Jianfeng [2 ]
Xiong, Jinbo [2 ]
Li, Qi [2 ]
Zhang, Tao [2 ]
Zhu, Hui [1 ]
机构
[1] Xidian Univ, Sch Telecommun Engn, Xian 710071, Peoples R China
[2] Xidian Univ, Sch Comp Sci & Technol, Xian 710071, Peoples R China
基金
中国国家自然科学基金;
关键词
D O I
10.1049/iet-ifs.2013.0111
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Attribute-based encryption (ABE) has been considered as a promising cryptographic primitive for realising information security and flexible access control. However, the characteristic of attributes is treated as the identical level in most proposed schemes. Lattice-based cryptography has been attracted much attention because of that it can resist to quantum cryptanalysis. In this study, lattice-based threshold hierarchical ABE (lattice-based t-HABE) scheme without random oracles is constructed and proved to be secure against selective attribute set and chosen plaintext attacks under the standard hardness assumption of the learning with errors problem. The notion of the HABE scheme can be considered as the generalisation of traditional ABE scheme where all attributes have the same level.
引用
收藏
页码:217 / 223
页数:7
相关论文
共 25 条
[1]  
Agrawal S, 2011, IACR CRYPTOL EPRINT, V2011, P414
[2]  
Agrawal S, 2010, LECT NOTES COMPUT SC, V6223, P98, DOI 10.1007/978-3-642-14623-7_6
[3]  
Agrawal S, 2010, LECT NOTES COMPUT SC, V6110, P553
[4]  
Ajtai M., 1996, P STOC 96 PHILADELPH, P99
[5]  
Ajtai Miklos, 1997, P 29 ANN ACM S THEOR, P284, DOI [DOI 10.1145/258533.258604, 10.1145/258533.258604]
[6]   Generating Shorter Bases for Hard Random Lattices [J].
Alwen, Joel ;
Peikert, Chris .
THEORY OF COMPUTING SYSTEMS, 2011, 48 (03) :535-553
[7]  
[Anonymous], 1999, INT C AUTOMATA LANGU
[8]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[9]  
Boneh D., 2001, Advances in Cryptology - CRTPTO 2001. 21st Annual International Cryptology Conference, Proceedings (Lecture Notes in Computer Science Vol.2139), P213
[10]  
Boyen X, 2013, LECT NOTES COMPUT SC, V7785, P122, DOI 10.1007/978-3-642-36594-2_8