高级搜索

留言板

尊敬的读者、作者、审稿人, 关于本刊的投稿、审稿、编辑和出版的任何问题, 您可以本页添加留言。我们将尽快给您答复。谢谢您的支持!

姓名
邮箱
手机号码
标题
留言内容
验证码

新的格上多机构属性基加密方案

闫玺玺 刘媛 李子臣 汤永利 叶青

闫玺玺, 刘媛, 李子臣, 汤永利, 叶青. 新的格上多机构属性基加密方案[J]. 电子与信息学报, 2018, 40(4): 811-817. doi: 10.11999/JEIT170628
引用本文: 闫玺玺, 刘媛, 李子臣, 汤永利, 叶青. 新的格上多机构属性基加密方案[J]. 电子与信息学报, 2018, 40(4): 811-817. doi: 10.11999/JEIT170628
YAN Xixi, LIU Yuan, LI Zichen, TANG Yongli, YE Qing. New Multi-authority Attribute-based Encryption Scheme on Lattices[J]. Journal of Electronics & Information Technology, 2018, 40(4): 811-817. doi: 10.11999/JEIT170628
Citation: YAN Xixi, LIU Yuan, LI Zichen, TANG Yongli, YE Qing. New Multi-authority Attribute-based Encryption Scheme on Lattices[J]. Journal of Electronics & Information Technology, 2018, 40(4): 811-817. doi: 10.11999/JEIT170628

新的格上多机构属性基加密方案

doi: 10.11999/JEIT170628
基金项目: 

国家自然科学基金(61300216),河南省教育厅科研项目(16A520013),国家密码管理局十三五国家密码发展基金(MMJJ20170122)

New Multi-authority Attribute-based Encryption Scheme on Lattices

Funds: 

The National Natural Science Foundation of China (61300216), The Scientific Research Project of Henan Province (16A520013), The 13th Five-Year National Crypto Development Foundation (MMJJ20170122)

  • 摘要: 针对基于双线性映射的属性基加密方案中无法抵抗量子攻击的问题,该文提出一种新的格上多机构属性基加密方案。先利用格上左抽样算法为用户生成密钥,使得用户私钥尺寸与级联矩阵的列数和用户属性个数相关,缩短用户私钥尺寸;然后采用Shamir门限秘密共享技术构造访问树,实现属性的与、或、门限3种操作,密文允许基于任意的访问结构生成,表达能力更加丰富,解决了大多方案中访问策略单一问题;方案证明可在标准模型下归约到判定性带误差学习问题的难解性。对比分析表明,方案系统公私钥、用户私钥和密文尺寸均有所优化,并较优于大多数单机构方案,此外方案存在多个属性机构,支持任意单调访问结构,安全性和实用性更满足云环境需求。
  • SAHAI A and WATERS B. Fuzzy identity-based encryption [C]. Advances in Cryptology-Eurocrypt 2005. Berlin, Heidelberg, May 2005: 457-473.
    AJTAI M and DWORK C. A public-key cryptosystem with worst-case/average-case equivalence[C]. Proceedings of ACM Symposium on Theory of Computing(STOC). EI Paso, Texas, USA, May 1997: 284-293.
    REGEV O. On lattices, learning with errors, random linear codes, and cryptography[C]. Proceedings of the Symposium on Theory of Computing, Baltimore, USA, 2005: 84-93.
    AGRAWAL S, BOYEN X, VAIKUNTANATHAN V, et al. Functional encryption for threshold functions (or fuzzy IBE) from lattices[C]. Proceedings of International Conference on Practice and Theory in Public Key Cryptography. Darmstadt, Germany, 2012: 280-297.
    BOYEN X. Attribute-based functional encryption on lattices[C]. Proceedings of the 10th Theory of Cryptography Conference, Lecture Notes in Computer Science, Tokyo, Japan, 2013, 7785: 122-142.
    LIU Ximeng, MA Jianfeng, XIONG Jinbo, et al. Threshold attribute-based encryption with attribute hierarchy for lattices in the standard model[J]. IET Information Security, 2014, 8(4): 217-223. doi: 10.1049/iet-ifs.2013.0111.
    ZHAO Jian, GAO Haiying, and ZHANG Junqi. Attribute- based encryption for circuits on lattices[J]. Tsinghua Science and Technology, 2014, 45(5): 463-469. doi: 10.3969/j.issn. 1007-0214.2014.05.005.
    WANG Yongtao. Lattice ciphertext policy attribute-based encryption in the standard model[J]. International Journal of Network Security, 2014, 16(6): 444-451. doi: 10.6633/IJNS. 201411.16(6).6.
    ZHU Wei-ling, YU Jianping, WANG Ting, et al. Efficient attribute-based encryption from R-LWE[J]. Chinese Journal of Electronics, 2014, 23(4): 778-782.
    吴立强, 杨晓元, 韩益亮. 基于理想格的高效模糊身份加密方案[J]. 计算机学报, 2015, 38(4): 775-782. doi: 10.3724/SP.J. 1016.2015.00775.
    WU Liqiang, YANG Xiaoyuan, and HAN Yiliang. An efficient FIBE scheme based on ideal lattices[J]. Chinese Journal of Computers, 2015, 38(4): 775-782. doi: 10.3724/ SP.J.1016.2015.00775.
    TAN S F and SAMAUDIN A. Lattice ciphertext-policy attribute-based encryption from ring-LWE[C]. Proceedings of International Symposium on Technology Management and Emerging Technologies, Langkawai Island, Malaysia, 2015: 258-262.
    孙泽栋, 祝跃飞, 顾纯祥, 等. 基于RLWE的密钥策略属性加密体制[J]. 通信学报,2016, 37(Z1): 125-131. doi: 10.11959/ j.issn.1000-436x.2016258.
    SUN Zedong, ZHU Yuefei, GU Chunxiang, et al. RLWE- based key-policy ABE scheme[J]. Journal of Communications, 2016, 37(Z1): 125-131. doi: 10.11959/j.issn.1000-436x. 2016258.
    杨海滨. 一种新的格上基于身份的分层加密方案[J]. 武汉大学学报理学版, 2016, 62(2): 155-160. doi: 10.14188/j.1671- 8836.2016.02.009.
    YANG Haibin. A new hierarchical identity-based encryption scheme based on lattices[J]. Journal of Wuhan University (Nature Science Edition), 2016, 62(2): 155-160. doi: 10.14188 /j.1671-8836.2016.02.009.
    CHEN Zehong, ZHANG Peng, ZHANG Fangguo, et al. Ciphertext policy attribute-based encryption supporting unbounded attribute space from R-LWE[J]. KSII Transactions on Interent and Information Systems, 2017, 11(4): 2292-2309. doi: 10.3837/tiis.2017.04.025.
    CHASE M. Multi-authority attribute based encryption[C]. Proceedings of Theory of Cryptography Conference. (TCC 07), Amsterdam, Netherlands, 2007: 515-534.
    ZHANG Guoyan, QIN Jing, and QAZI S. Multi-authority attribute-based encryption scheme from lattices[J]. Journal of Universal Computer Science, 2015, 21(3): 483-501. doi: 10.3217/jucs-021-03-0483.
    GENTRY C, PEIKERT C, and VAIKUNTANATHAN V. Trapdoors for hard lattice and new cryptographic constructions[C]. Proceedings of the Symposium on Theory of Computing, Victoria, Canada, 2008: 197-206.
    AGRAWAL S, BONEH D, and BOYEN X. Efficient lattice (H)IBE in the standard model[C]. Proceedings of Eurocrypt 2010, Lecture Notes in Computer Science, Riviera, France, May 2010, 6110: 553-572.
  • 加载中
计量
  • 文章访问数:  1245
  • HTML全文浏览量:  149
  • PDF下载量:  198
  • 被引次数: 0
出版历程
  • 收稿日期:  2017-06-29
  • 修回日期:  2018-01-05
  • 刊出日期:  2018-04-19

目录

    /

    返回文章
    返回