A survey of lattice based expressive attribute based encryption

被引:12
作者
Fu, Xingbing [1 ,2 ,3 ,4 ]
Ding, Yong [3 ]
Li, Haifeng [5 ]
Ning, Jianting [6 ]
Wu, Ting [1 ]
Li, Fagen [7 ]
机构
[1] Hangzhou Dianzi Univ, Sch Cyberspace, Hangzhou 310018, Peoples R China
[2] Yibin Univ, Fac Sci, Yibin 644000, Peoples R China
[3] Guangxi Key Lab Cryptog & Informat Secur, Gulin, Guangxi, Peoples R China
[4] Guangdong Prov Key Lab Informat Secur Technol, Guangzhou, Peoples R China
[5] Dalian Univ Technol, Sch Software, Dalian 116024, Peoples R China
[6] Fujian Normal Univ, Coll Comp & Cyber Secur, Fuzhou 350117, Peoples R China
[7] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Beijing, Peoples R China
基金
中国国家自然科学基金; 国家重点研发计划;
关键词
Attribute based encryption; Cloud storage; Expressiveness; Fine grained access control; Lattice based cryptography;
D O I
10.1016/j.cosrev.2021.100438
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Attribute Based Encryption (ABE) can be employed to enforce fine grained access control over encrypted data. Due to expressiveness, ABE schemes are currently employed in cloud computing and storage systems. The classical ABE schemes based on bilinear pairing are vulnerable to quantum cryptanalysis, whereas ABE schemes from lattices can resist quantum attacks. In this work, we comprehensively survey various kinds of attribute based encryption schemes in the lattice setting in terms of expressiveness, complexity assumptions, efficiency, security and so on. We also discuss attribute based encryption schemes from lattices deserving further research to specify future directions for cryptographers. (c) 2021 Elsevier Inc. All rights reserved.
引用
收藏
页数:13
相关论文
共 43 条
[1]   CP-ABE for Circuits (and More) in the Symmetric Key Setting [J].
Agrawal, Shweta ;
Yamada, Shota .
THEORY OF CRYPTOGRAPHY, TCC 2020, PT I, 2020, 12550 :117-148
[2]   Optimal Broadcast Encryption from Pairings and LWE [J].
Agrawal, Shweta ;
Yamada, Shota .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2020, PT I, 2020, 12105 :13-43
[3]   Attribute Based Encryption (and more) for Nondeterministic Finite Automata from LWE [J].
Agrawal, Shweta ;
Maitra, Monosij ;
Yamada, Shota .
ADVANCES IN CRYPTOLOGY - CRYPTO 2019, PT II, 2019, 11693 :765-797
[4]  
Agrawal S, 2012, LECT NOTES COMPUT SC, V7293, P280, DOI 10.1007/978-3-642-30057-8_17
[5]  
[Anonymous], 1996, SECURE SCHEMES SECRE
[6]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[7]  
Boneh D, 2014, LECT NOTES COMPUT SC, V8441, P533, DOI 10.1007/978-3-642-55220-5_30
[8]  
Boyen X, 2013, LECT NOTES COMPUT SC, V7785, P122, DOI 10.1007/978-3-642-36594-2_8
[9]  
Brakerski Z., 2016, IACR CRYPTOLOGY EPRI, P691
[10]  
Brakerski Z., 2020, IACR CRYPTOLOGY EPRI, P1024