Computer Science ›› 2025, Vol. 52 ›› Issue (10): 412-422.doi: 10.11896/jsjkx.240600137

• Information Security • Previous Articles     Next Articles

Multi-functional Attribute Based Encryption from Lattices

GUO Lifeng, YANG Jieying, MA Tianjun, ZHANG Xialei   

  1. College of Computer and Information Technology,Shanxi University,Taiyuan 030006,China
  • Received:2024-06-24 Revised:2024-08-03 Online:2025-10-15 Published:2025-10-14
  • About author:GUO Lifeng,born in 1975,Ph.D,professor,postgraduate supervisor,is a member of CCF(No.Q22710M).Her main research interests include privacy protection technologies for digital encryption,signature and blockchain.
  • Supported by:
    Natural Science Foundation of Shanxi Province(202203021221012).

Abstract: Attribute based encryption from lattices has the property of resisting quantum attacks,and achieves fine-grained access control of attributes by cleverly embedding access control policies into ciphertext or keys.However,due to the inherent weaknesses of attribute based encryption,users with the same attribute may leak the key.To avoid key leakage,attribute based encryption schemes need to implement the function of tracking and revoking specific user decryption permissions.However,illegal users may still attempt to recover the keys of past sessions by collecting large amounts of encrypted data.To effectively resist such attacks,the scheme must implement forward security.In response to the current demands and challenges in the field of lattices cryptography,this paper proposes a multi-functional attribute based encryption scheme based on the Decisional Learning with Errors(DLWE) problem from lattices that can prove security.The scheme uses a complete binary tree to track the identity matrices related to the users in the decryption key(such as the values of the leaf nodes of the complete binary tree) in order to track malicious users.Introducing a user revocation mechanism that allows attribute authority to revoke user permissions in a timely and effective manner without generating new keys for the users.Using tag puncturing method to ensure that even if the current key is leaked,the past ciphertext remains secure and achieves forward security.In addition,due to the uncertainty of the upsampling algorithm from lattice,it is currently difficult to achieve experiments on attribute based encryption from lattice.Therefore,the security and correctness of the scheme are verified through theoretical analysis.The scheme not only optimizes space storage efficiency,but also compensates for the shortcomings caused by the lack of functions of attribute based encryption schemes on lattice cryptography.

Key words: Lattice,Attribute based encryption,Traceable,Forward security,User revocation

CLC Number: 

  • TP309
[1]REGEV O.On Lattices,Learning with Errors,Random Linear Codes,and Cryptography[J].Journal of the ACM,2009,56(6):1-40.
[2]BOYEN X.Attribute-based Functional Encryption on Lattices[C]//Theory of cryptography conference.Berlin:Springer,2013:122-142.
[3]KUCHTA V,MARKOWITCH O.Multi-authority Distributed Attribute-based Encryption with Application to Searchable Encryption on Lattices[C]//Paradigms in Cryptology-Mycrypt 2016.Springer,2017:409-435.
[4]SINGAMANENI K K,BUDATI A K,BIKKU T.An Efficient Q-KPABE Framework to Enhance Cloud-Based IoT Security and Privacy[J/OL].Wireless Personal Communications.(2024).https://doi.org/10.1007/s11277-024-10908-8.
[5]SUN L,ZHAO Z,WANG J,et al.Attribute-based Encryption Scheme Supporting Attribute Revocation in Cloud Storage Environment[J].Journal on Communication/Tongxin Xuebao,2019,40(5):47-56.
[6]HAN D Z,PAN N N,KUAN C L.A Traceable and RevocableCiphertext-Policy Attribute-based Encryption Scheme Based on Privacy Protection[J].IEEE Transactions on Dependable and Secure Computing,2020,19(1):316-327.
[7]WANG S,ZHANG X,ZHANG Y.Efficient Revocable andGrantable Attribute-based Encryption from Lattices with Fine-Grained Access Control[J].IET Information Security,2018,12(2):141-149.
[8]CHEN J,LIM H W,LING S,et al.Revocable Identity-based Encryption from Lattices[C]//Information Security and Privacy:17th Australasian Conference.Springer,2012:390-403.
[9]WANG Y.Lattice Ciphertext Policy Attribute-based Encryption in the Standard Model[J].Interational Journal of Network Security,2014,16(6):444-451.
[10]YANG K,WU G,DONG C,et al.Attribute Based Encryption with Efficient Revocation from Lattices[J].Interational Journal of Network Security,2020,22(1):161-170.
[11]ZHAO S,JIANG R,BHARGAVA B.RL-ABE:A Revocable Lattice Attribute-based Encryption Scheme based on R-LWE Problem in Cloud Storage[J].IEEE Transactions on Services Computing,2020,15(2):1026-1035.
[12]LUO F,AL-KUWARI S,WANG H,et al.Revocable Attribute-based Encryption from Standard Lattices[J].Computer Stan-dards & Interfaces,2023,84:103698.
[13]HUANG B,GAO J,LI X.Efficient Lattice-based revocable attribute-based Encryption Against Decryption Key Exposure for Cloud File Sharing[J].Journal of Cloud Computing,2023,12(1):37.
[14]GUO L,WANG L,MA X,et al.New Traceable and Revocable Attribute Based Encryption on Lattices[C]//2023 International Conference on Networking and Network Applications(NaNA).IEEE,2023:359-364.
[15]GREE N,MATTHEW D,IAN M.Forward Secure Asyn-chronous Messaging from Puncturable Encryption[C]//2015 IEEE Symposium on Security and Privacy.IEEE,2015:305-320.
[16]PHUONG T V X,NING R,XIN C,et al.Puncturable Attri-bute-based Encryption for Secure Data Delivery in Internet of Things[C]//IEEE INFOCOM 2018-IEEE Conference on Computer Communications.IEEE,2018:1511-1519.
[17]DUTTA P,SUSILO W,DUONG D H,et al.Puncturable Identity-based and Attribute-based Encryption from Lattices[J].Theoretical Computer Science,2022,929(11):18-38.
[18]YANG M,WANG H,HE D.Puncturable Attribute-based Encryption from Lattices for Classified Document Sharing[J].IEEE Transactions on Information Forensics and Security,2024,929(11):4028-4042.
[1] YUAN Mengjiao, LU Tianliang, HUANG Wanxin, HE Houhan. Benign-salient Region Based End-to-End Adversarial Malware Generation Method [J]. Computer Science, 2025, 52(10): 382-394.
[2] HAN Yingmei, LI Bin, LI Kun, ZHOU Qinglei, YU Shiliang. Efficient Hardware Implementation of Pipelined NTT for Dynamic Rotation Factor Generation [J]. Computer Science, 2025, 52(9): 160-169.
[3] ZHOU Tao, DU Yongping, XIE Runfeng, HAN Honggui. Vulnerability Detection Method Based on Deep Fusion of Multi-dimensional Features from Heterogeneous Contract Graphs [J]. Computer Science, 2025, 52(9): 368-375.
[4] LI Li, CHEN Jie, ZHU Jiangwen. Multi-authority Revocable Ciphertext-policy Attribute-based Encryption Data Sharing Scheme [J]. Computer Science, 2025, 52(9): 388-395.
[5] TANG Jiayi, HUANG Xiaofang, WANG Licheng, ODOOM J. Identity-based Linkable Ring Signcryption on NTRU Lattice [J]. Computer Science, 2025, 52(9): 396-404.
[6] FENG Yimeng, FENG Yan, XIE Sijiang, ZHANG Qing. Proxy-based Bidirectional Coin Mixing Mechanism of Blockchain [J]. Computer Science, 2025, 52(8): 385-392.
[7] SUN Qiming, HOU Gang, JIN Wenjie, HUANG Chen, KONG Weiqiang. Survey on Fuzzing of Embedded Software [J]. Computer Science, 2025, 52(7): 13-25.
[8] ZHANG Linmao, SUN Cong, RAO Xue. Dynamic Library Debloating Enhanced System Call Restriction of Programs [J]. Computer Science, 2025, 52(7): 50-57.
[9] LI Jiangxu, CHEN Zemao, ZHANG Liqiang. Lightweight Authentication and Key Agreement Protocol for Cloud-assisted Smart Home Communication [J]. Computer Science, 2025, 52(7): 342-352.
[10] ZHANG Guanghua, CHEN Fang, CHANG Jiyou, HU Boning, WANG He. Accelerating Firmware Vulnerability Discovery Through Precise Localization of IntermediateTaint Sources and Dangerous Functions [J]. Computer Science, 2025, 52(7): 379-387.
[11] BAO Shenghong, YAO Youjian, LI Xiaoya, CHEN Wen. Integrated PU Learning Method PUEVD and Its Application in Software Source CodeVulnerability Detection [J]. Computer Science, 2025, 52(6A): 241100144-9.
[12] ZHANG Jing, WANG Yuping. Dual-platform Key Agreement Protocol Based on Semidirect Product [J]. Computer Science, 2025, 52(6A): 240600036-6.
[13] LIU Runjun, XIAO Fengjun, HU Weitong, WANG Xu. Reversible Data Hiding in Fully Encrypted Images Based on Pixel Interval Partitioning andPrediction Recovery [J]. Computer Science, 2025, 52(6A): 240900030-8.
[14] XIE Zhenjie, LIU Yiming, CAI Ruijie, LUO Youqiang. Performance Optimization Method for Domestic Cryptographic Algorithm SM9 [J]. Computer Science, 2025, 52(6): 390-396.
[15] WANG Qiuli, REN Zhiyu, WU Xiangyu, GUAN Qiuguo, WANG Haichao. Blockchain-based Internet of Things Traceable and Anonymous Cross-domain AuthenticationScheme [J]. Computer Science, 2025, 52(5): 337-344.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!