计算机科学 ›› 2025, Vol. 52 ›› Issue (10): 412-422.doi: 10.11896/jsjkx.240600137
郭丽峰, 杨杰莹, 马添军, 张夏蕾
GUO Lifeng, YANG Jieying, MA Tianjun, ZHANG Xialei
摘要: 格上属性基加密具有抗量子攻击的特性,并且将访问控制策略嵌入密文或者密钥,可实现属性的细粒度访问控制。但是由于属性基加密固有的弱点,相同属性的用户可能会泄露密钥。为避免密钥泄露,属性基加密方案需实现追踪并撤销特定用户解密权限的功能。然而,非法用户仍可能通过收集大量密文数据,试图恢复过去会话的密钥。为有效抵御这种攻击,方案必须实现前向安全。针对当前格密码领域的需求与挑战,提出基于判定性误差学习问题(Decisional Learning with Error,DLWE)可证明安全的格上具有多功能的属性基加密(Multi-functional Attribute based Encryption from Lattices)方案。使用完全二叉树追踪解密密钥中与用户相关的身份矩阵(即完全二叉树叶子节点的值),以便追踪恶意用户;引入用户撤销机制,允许属性权威在不重新为用户生成密钥的情况下,及时且有效地撤销用户的权限;采用标签穿刺的方法,确保即使当前密钥泄漏,过去密文仍然保持安全,实现前向安全。此外,由于格上采样算法的不确定性,目前格上的属性基加密实验难以实现,因此通过理论分析验证所提方案的安全性和正确性。该方案不仅优化了空间存储效率,还弥补了格密码中属性基加密方案功能单一导致的不足。
中图分类号:
[1]REGEV O.On Lattices,Learning with Errors,Random Linear Codes,and Cryptography[J].Journal of the ACM,2009,56(6):1-40. [2]BOYEN X.Attribute-based Functional Encryption on Lattices[C]//Theory of cryptography conference.Berlin:Springer,2013:122-142. [3]KUCHTA V,MARKOWITCH O.Multi-authority Distributed Attribute-based Encryption with Application to Searchable Encryption on Lattices[C]//Paradigms in Cryptology-Mycrypt 2016.Springer,2017:409-435. [4]SINGAMANENI K K,BUDATI A K,BIKKU T.An Efficient Q-KPABE Framework to Enhance Cloud-Based IoT Security and Privacy[J/OL].Wireless Personal Communications.(2024).https://doi.org/10.1007/s11277-024-10908-8. [5]SUN L,ZHAO Z,WANG J,et al.Attribute-based Encryption Scheme Supporting Attribute Revocation in Cloud Storage Environment[J].Journal on Communication/Tongxin Xuebao,2019,40(5):47-56. [6]HAN D Z,PAN N N,KUAN C L.A Traceable and RevocableCiphertext-Policy Attribute-based Encryption Scheme Based on Privacy Protection[J].IEEE Transactions on Dependable and Secure Computing,2020,19(1):316-327. [7]WANG S,ZHANG X,ZHANG Y.Efficient Revocable andGrantable Attribute-based Encryption from Lattices with Fine-Grained Access Control[J].IET Information Security,2018,12(2):141-149. [8]CHEN J,LIM H W,LING S,et al.Revocable Identity-based Encryption from Lattices[C]//Information Security and Privacy:17th Australasian Conference.Springer,2012:390-403. [9]WANG Y.Lattice Ciphertext Policy Attribute-based Encryption in the Standard Model[J].Interational Journal of Network Security,2014,16(6):444-451. [10]YANG K,WU G,DONG C,et al.Attribute Based Encryption with Efficient Revocation from Lattices[J].Interational Journal of Network Security,2020,22(1):161-170. [11]ZHAO S,JIANG R,BHARGAVA B.RL-ABE:A Revocable Lattice Attribute-based Encryption Scheme based on R-LWE Problem in Cloud Storage[J].IEEE Transactions on Services Computing,2020,15(2):1026-1035. [12]LUO F,AL-KUWARI S,WANG H,et al.Revocable Attribute-based Encryption from Standard Lattices[J].Computer Stan-dards & Interfaces,2023,84:103698. [13]HUANG B,GAO J,LI X.Efficient Lattice-based revocable attribute-based Encryption Against Decryption Key Exposure for Cloud File Sharing[J].Journal of Cloud Computing,2023,12(1):37. [14]GUO L,WANG L,MA X,et al.New Traceable and Revocable Attribute Based Encryption on Lattices[C]//2023 International Conference on Networking and Network Applications(NaNA).IEEE,2023:359-364. [15]GREE N,MATTHEW D,IAN M.Forward Secure Asyn-chronous Messaging from Puncturable Encryption[C]//2015 IEEE Symposium on Security and Privacy.IEEE,2015:305-320. [16]PHUONG T V X,NING R,XIN C,et al.Puncturable Attri-bute-based Encryption for Secure Data Delivery in Internet of Things[C]//IEEE INFOCOM 2018-IEEE Conference on Computer Communications.IEEE,2018:1511-1519. [17]DUTTA P,SUSILO W,DUONG D H,et al.Puncturable Identity-based and Attribute-based Encryption from Lattices[J].Theoretical Computer Science,2022,929(11):18-38. [18]YANG M,WANG H,HE D.Puncturable Attribute-based Encryption from Lattices for Classified Document Sharing[J].IEEE Transactions on Information Forensics and Security,2024,929(11):4028-4042. |
|