Abstract
In recent years, the research on ciphertext-policy attribute-based encryption (CP-ABE) scheme design based on learning with errors (LWE) has been a challenging problem, and many researchers have made a lot of attempts at it. At EUROCRYPT 2021, Datta, Komargodski, and Waters proposed the first provably secure direct CP-ABE construction that supports NC circuit access structures. Improving on their work, we propose a CP-ABE scheme. Technically, we use the new lattice two-stage sampling technique of Lai, Liu, and Wang (EUROCRYPT 2021) in the key generation phase instead of the extended trapdoor sampling technique. In this way, we obtain a CP-ABE scheme, which is at least as secure as the original scheme under the same conditions, and has a shorter ciphertext; we provide an innovative design idea for designing CP-ABE schemes only based on LWE, although this is only a partial theoretical work.
1. Introduction
In order to better realize the fine-grained access control of encrypted data, attribute-based encryption comes into being as a generalization of traditional public key encryption []. Attribute encryption has two variants, including ciphertext strategy and key strategy. In the ciphertext policy ABE, that is, the ciphertext is associated with the access policy, and the key is correlated to the attribute. While in the key policy ABE, the position of the access policy and the attribute is exactly opposite. However, there is one consistent point: decryption will be successful only if the attribute meets the access policy.
Since the concept of ABE was founded by Sahai et al. [,], it has been widely studied in cryptography and has many potential applications. Therefore, cryptographic researchers all over the world have been widely concerned by the design of the ABE scheme, which has given birth to a series of achievements that, on the whole, pursue various tradeoffs between expression, efficiency, security, and potential assumptions [,,,,,,,,,,,].
Most of the work mentioned above has been based on assumptions associated with bilinear mapping. It is necessary and normal to find structures based on other assumptions. On the one hand, they can not only make us more sure about the existence of the corresponding encryption scheme but also stimulate our enthusiasm for studying and developing new technologies, so as to further deepen our understanding of cryptographic primitives. On the other hand, in view of the known attacks of quantum computing on group-based cryptographic schemes [], it is important to construct lattice-based attribute encryption to realize the security of quantum computing attacks. To this end, there are indeed several ABE schemes [,,,,,,,,], which rely on other cryptographic assumptions rather than bilinear mappings as their underlying building blocks.
However, it is an indisputable fact that most of the existing ABE schemes based on LWE are ABE with a key strategy. Until the advent of reference [], only a few LWE-based CP-ABE schemes had been constructed, and all of them were obtained through a special transformation with the help of the KP-ABE. However, this transformation will inevitably lead to some unsatisfactory results. For more details, please refer to [].
Under the assumption that there is only LWE, improving the CP-ABE structure based on the general-purpose circuits described above has always been a challenging problem. In order to solve this question, several eye-catching jobs have been completed recently. For example, the work of [,,] depends on LWE and bilinear groups. Work [] lacks a safety certificate. Recently, a CP-ABE project on the basis of LWE was constructed in [], although an indispensable part of the scheme remained the general circuit size limit. Reference [] makes a conceptual contribution to this open and challenging issue. Their excellent work also draws on some innovative ideas from the work of [,]. In TCC 2013, Boyen et al. [] proposed the first lattice-based attribute-based encryption construction (ABE) for NC circuits. Unfortunately, soon after, a loophole was discovered in the security; however, because of its technical novelty, it continues to be widely studied by many scholars. In particular, this is the first lattice-based ABE that uses the linear secret sharing scheme (LSSS) as a key tool to implement access control. In the scheme [], Agrawal et al. proved that the scheme [] is actually unsafe, and they gave an idea for repairing the security of the scheme by taking the notion of an admissible LSSS and instantiating it as the class of DNFs. After the work of [], Datta et al. proposed the first CP-ABE scheme constructed in a direct manner and provided the complete security proof. It is a very innovative and creative work; it not only introduces new methods and techniques in concept but also popularizes and constructs new MA-ABE schemes.
The purpose of this paper is to propose an improved attribute-based encryption scheme based on the ciphertext policy (CP-ABE), which is modified on the basis of []. Technically, we use the two-stage sampling technique on the lattice in [] instead of the extended trapdoor sampling technique in []. In this way, we obtain a CP-ABE scheme, which is at least as secure as the original scheme and has a shorter ciphertext.
The organization of the work of this article is listed below. In the second part, the relevant preliminary knowledge is given. In the third part, we give our CP-ABE scheme and the related proof of correctness and security.
2. Relevant Basic Knowledge
Here, we present several related concepts to facilitate readers to understand the full text. Consider a mapping . If there is a such that the formula of is always valid for all and , then is called a negligible function. In addition, for convenience, we use to represent the collection .
Let PPT denote the abbreviation of probabilistic polynomial time. Assuming that is a distribution, we will use the symbol to indicate that x is randomly sampled on the basis of the distribution . Assuming that Y is a set, we use the symbol to indicate that y is sampled on the elements of the set Y based on uniform distribution. Without losing generality, we use uppercase bold letters to represent matrices and lowercase bold letters to represent column vectors, such as and . For convenience, we use to represent the row of matrix , and, further, represents a matrix that includes the set of for all . Suppose is a vector, we use the symbols and to represent its norm and norm, respectively.
2.1. Linear Secret Sharing Schemes with Linear Independence
This section is divided into two parts. In the first part, several essential definitions and characteristics of LSSSs are listed. In the second part, a new LSSS is presented, proposed in reference [], and its definition will be listed later for the integrity of the article. This new LSSS has some interesting features, which can help us to design a CP-ABE scheme on the basis of the LWE hypothesis for all NC circuits.
2.1.1. Related Contents of LSSS
A secret sharing scheme means that the secret distributor divides the secret d into n parts using a specific algorithm and then distributes n shares to n participants. Authorized subsets of n participants can jointly reconstruct secrets, while other unauthorized subsets cannot.
Definition 1
(, []). A collection of non-empty subsets of n participants labeled from one to n is called an access structure. The collections that belong to are named the authorized collections, and the collections that do not belong to are named the unauthorized collections. An access structure is deemed monotone in the case that the latter condition is satisfied. That is, for any two , there is if there are and .
A secret sharing scheme corresponding to a monotone access structure can be regarded as a randomized algorithm whose input is a secret d and its output is n parts . These parts satisfy certain restrictions: that is, d can be determined by for arbitrary , while other sets are independent of d.
A secret sharing scheme corresponding to a non-monotone access structure can be regarded as a randomized algorithm whose input is a secret d, and its output is shares viewed as n pairs , these shares satisfy certain restrictions: that is, d can be determined by for arbitrary , while other sets are independent of d, which can be regarded as a transformation of the above concepts and algorithms.
Definition 2
(-, []). Let be a group of participants. Additionally, suppose is a prime power. The scheme described above is called non-monotone LSSS II over if the following conditions are true:
- 1.
- For as well as , each share of a secret makes up a vector whose input is over .
- 2.
- There must be a share-generating matrix, recorded as , and there is also a mapping η from to [2n]; η establishes an one-to-one mapping from the rows of to the participants derived from and their corresponding negation (represented by , respectively). This meets the conditions mentioned later, that is: Given a vector , then according to II , for the matrix described above, there must be a vector representation of y shares of secret d that is equal to . For as well as , the part includes all of the values for which (in this way, all “1 shares" fall in the first n, and all “0 shares" fall in the last n). Then, will be named the LSSS policy about the access structure .
Based on the analysis of correctness and security in [], we list the following conclusions. Correctness is achieved through the following condition: if is authorized, the vector is in the span of the rows of (where ). Security is achieved through the condition that if is not authorized, then cannot be expressed linearly by the rows of . In addition, in a case without authorization, there is a vector , with the condition that its first components are and , of which is the all 0 vector.
2.1.2. The Non-Monotone LSSS for NC
We present a new non-monotone linear secret sharing scheme proposed in [], which is suitable for all access structures that can be represented through NC circuits. This scheme possesses some very attractive and practical properties, as shown below:
- -
- Each element of the corresponding policy matrix is very small, and they all come from .
- -
- The secret can be rebuilt through a series of small coefficients are belong to .
- -
- The rows corresponding to the access policy matrix that matches a collection that is not authorized are linearly independent.
: We present the access structure described by the NC circuit, which is adapted from []. The circuit can be represented through a Boolean formula with logarithmic depth, which is represented by AND, OR, and NOT gates. Then, we use De Morgan’s law to simplify the Boolean formula to a form with only OR and AND gates, marked by variables or their negation. The next step is to transform each gate node from top to bottom and from left to right, which can be seen as recursive. First, we initialize a global counter variable and increase the value of c by one after each door is marked. Next, we consider the specific operation flow of one of the doors. The outputs of wire x are marked as and , and its sub-inputs are y (marked as and ) and z (marked as and ). The marker vectors of y and z are calculated from the marker vector of x according to the type of gate (as listed below). We calculate in turn until all the gate nodes are converted and put each vector of the lowest layer into a matrix from top to down:
: , , , .
: , , , .
2.2. The Concept of CP-ABE
A CP-ABE scheme is defined by four PPT algorithms shown below, which have been adapted from the literature []:
- : The setup algorithm is an algorithm whose input is the the security parameter , which is the input length l of the function f. Moreover its outputs are a master secret key MSK and a collection of exposed parameters PK.
- (PK, , f): The encryption program is an algorithm whose inputs are a public key PK, a message , and a function f, and the output is a ciphertext CT.
- (MSK, x): The keygen algorithm is an algorithm that outputs the private key corresponding to the attribute x with the input of the MSK and the attribute x.
- (PK, , CT): The decryption program is an algorithm whose input is the public key PK, a secret key , and a ciphertext CT. If and only if the attribute x satisfies , it will output the message ; otherwise, decryption fails.
Definition 3
([]). A CP-ABE scheme is correct if the equation shown below holds. Namely,
In fact, CP-ABE schemes that implement the access structure using an LSSS can be seen as an extension of the above definition. Namely, f is transformed into an access structure over the attribute collection. At the same time, the single attribute x in the definition above becomes a set S. By the same token, decryption can be successful only when certain conditions are met, that is, the attribute set S satisfies the access policy ; otherwise, decryption fails.
: Next, we present the security model of CP-ABE through the game between the challenger and the attacker shown below.
. After receiving the security parameters, the adversary submits an access structure , and then the challenger runs the setup algorithm and provides the resulting common parameters to the adversary.
. The adversary initiates a polynomial number of private key queries to the challenger, but a limitation of the attribute set is that the access structure must not be met, and the challenger responds and gives the matching private key SK ←(MSK, R).
. The adversary provides two messages of equal lengths to the challenger, and then the challenger chooses a bit with the probability of throwing coins at random and returns the ciphertext CT ←(PK, , ) to the adversary.
. This step is equivalent to the repetition of Phase 1.
. At the end of the game the adversary outputs a guess about b.
The probability advantage of an adversary in the above game is defined as:
Definition 4
([]). If for an arbitrary PPT adversary and all , there exists a negligible function such that holds, then we call the CP-ABE scheme for LSSS-realizable access structures selectively secure.
Definition 5
([]). If a relaxed setting is made for the key query phase of the above scheme, that is, the rows in the generating matrix corresponding to the attribute set sent by the adversary each key query must be linearly independent, namely, those attribute sets that do not meet the access policy are queried. Then it is said that the relaxed scheme is selectively secure under linear independence.
2.3. The Relevant Knowledge of Lattice
Here, we will give some lattice-related knowledge used in our CP-ABE construction. All of the relevant contents are adapted from the corresponding references. In order to save space, only an overview of lattice and Gaussian distributions is given here. For more details, please refer to []. A lattice whose dimension is m is a discrete additive subgroup of . For a matrix , where , and q are integers greater than 0, and are defined. Assume that is an arbitrary real number greater than 0. The Gaussian distribution is a distribution interpreted by a probability distribution function (where ), if a discrete set is involved, then , and then is defined as a Gaussian distribution whose parameter is on the set V, represented by the symbol . We use to represent the truncated Gaussian distribution, which is statistically indistinguishable from the Gaussian distribution . The is the same as the except that when the norm exceeds , it will output 0.
Definition 6
( []). Select a λ as the security parameter, then let n, m, and q be functions of λ and positive integers at the same time. Therefore, suppose there is a probability distribution (in general, ψ is a distribution with the condition that ) over . The DLWE problem declares that for any , in the case of , , and , there will be a pair of distributions that are computationally indistinguishable as shown below:
Lemma 1
( []). Let n and q be two functions from to . Therefore, let and be a function of n. Then, there are the two distributions shown below are statistically indistinguishable:
Lemma 2
( []). Suppose n belongs to . For arbitrary and arbitrary real , there is always .
Lemma 3
( []). A lattice trapdoor sampler is made up of a pair of algorithms, and the specific meaning and features are shown below:
- 1.
- : The purpose of the algorithm is to output a matrix and its corresponding trapdoor , when the input is the dimension of the matrix and q. The output matrix of this algorithm is indistinguishable from the matrix of the same dimension which is randomly selected evenly in the same number field.
- 2.
- : The goal of the algorithm is that when the input is matrix and its corresponding trapdoor , a parameter , , the algorithm can output a vector , and the vector must satisfy two conditions of and . The pre-image output by the algorithm is indistinguishable from the vector selected according to the Gaussian distribution with parameter δ.
Lemma 4
( []). Let , and suppose are two full rank matrices; is a trapdoor matrix corresponding to . For a matrix and (where is the Gram–Schmidt orthogonalization ), there must be a PPT algorithm SampleLeft whose output is a matrix , and the matrix is statistically indistinguishable from the distribution of .
Definition 7
(- []). Let , , and all are integers. Consider using and an arbitrary small norm matrix as inputs, and the sampler operates sequentially according to the following two stages:
- 1.
- The first stage: (this stage has nothing to do with ).
- -
- Select a matrix at a random ;
- -
- Select a vector at a random ;
- 1.
- The second stage:
- -
- Select a vector ;
- -
- Calculate ;
- -
- Sample a random vector , to make the equation hold;
- -
- Let , make the equation hold;
- -
- Output the tuple .
This is an example of a quote.
3. Our Ciphertext-Policy ABE Scheme for NC Circuits Based on LWE
Here, we are going to show our CP-ABE scheme, which supports the access structure described through the NC circuit. The specific features and construction have been shown in Section 2.1.2.
First of all, we give the specific restrictions of each parameter in the scheme according to the proof of correctness and security. The algorithm should select the appropriate parameters and noise distributions and , which meet the following conditions (fix any ):
- -
- (due to the LWE security)
- -
- (due to the leftover hash lemma)
- -
- (due to the trapdoor sampling)
- -
- (due to the trapdoor sampling)
- -
- , where (due to the smudging/security)
- -
- (due to the correctness)
Setup (): Take the security parameter , the maximum width of a linear secret sharing matrix corresponding to the scheme, and the attribute set as inputs and perform the following steps in order:
- Select an LWE instance with the appropriate parameters , as well as the distribution described above.
- Select a vector and select a series of random matrices at the same time.
- Run algorithm to generate .
- Output the public parameters and master secret keys:
: With the master secret key and the collection of attributes as inputs, perform the following steps:
- Sample a and set the vector .
- For each , sample matrix , at the same time, and, finally, let .
- Sample .
- Sample for some parameter . In other words, choose to make the equation holds.
- Let and output .
: With the public parameters PK, a message needs to be encrypted, and an LSSS access policy ), generated from the previous transformation, are the inputs (that is to say, where ). Perform the following steps in order:
- Sample vector and error vector .
- In addition, continue to sample and , for every . Calculate as described below.
- Output the ciphertext ).
: With the private key and a ciphertext as inputs, perform the following algorithm steps in order:
- In the case that the vector (1, 0, …, 0) cannot be represented by the rows of correlated to the attribute set U, the decryption will fail.
- Conversely, let be a collection of the row labels of with the condition that for any . Hence, let be scalars with the condition that , of which is the row of .
- Calculate .
- .
3.1. Correctness
Next, we will prove the correctness of the scheme. Given an attribute collection and an arbitrary access policy , where U forms an authorized set, calculate the following equation
By substituting the specific values of and into the above formula, we can obtain
Here, let us review the previous key generation process. For each , , and is established. That is to say, it holds that
Further, there will be
According to the above description, the formula holds. Moreover, for , . Additionally, because of , then calculate . Thus,
The correctness is based on the fact that the last two terms of the above two equations are very small and will not affect the MSB of . In order to achieve this, we must make the following inequalities hold with extremely overwhelming probabilities:
- -
- This is because the coordinates of are selected according .
- -
- The reason for this is precisely because all the coordinates of are selected according to , where .
- -
- This is because the equation holds where (1) the selection of is based on a distribution that is statistically indistinguishable from . Additionally, (2) .
- -
- : The reason is that , and is selected by a distribution .
- -
- Based on the fact that , we can obtain:
3.2. Security Analysisr
In this part, we will give the security analysis of the scheme in detail. The security proof of our scheme is carried out strictly according to the idea of the security proof in [].
Theorem 1
([]). Under the condition that the LWE hypothesis is true, the CP-ABE scheme we present for all access structures described through NC circuits is selectively secure.
Theorem 2.
Under the condition that the LWE assumption is true, the CP-ABE scheme we present is selectively secure under linear independence restriction.
Proof.
To prove the correctness of Theorem 2, we considered a series of hybrid games, which are slightly different from each other. The first hybrid game matches the real choice security game under the linear independent restriction, and the final hybrid scheme is the one in which the advantage of the opponent is zero. By demonstrating that the advantages of the adversaries have only a completely negligible change between different consecutive hybrid games, we have finally proved the correctness of Theorem 2. Next, we will talk about the specific hybridization and analysis process. In order to facilitate the explanation, we first use 12 algorithm graphs to show, in detail, the process of 12 hybridizations in which all the symbols used are as defined above.
Secondly, we analyze the indistinguishability of any two adjacent hybridization processes in detail. For convenience, we introduce a probability function for all adversaries , and any whose input is and output is the probability of the opponent correctly guesses the challenge bit in each hybrid program. According to the definition of Algorithm 1, it is known that for all . Furthermore, since the generated challenge ciphertext in Algorithm 12 does not disclose any information about the selection of challenge bits, it is known that for all .
Therefore, through the following series of analysis, we can conclude that for all , there is obviously
: This is the original selective weak security model of the CP-ABE scheme we constructed.
: This is similar to Algorithm 1, except for the three parts marked with a wireframe in Algorithm 2, and these changes are only semantic (As in Algorithm 1, , Algorithm 2 replaces the original vector with , where and . The semantic changes involved later are also similar to the methods here), so there is obviously for all adversaries .
: This is similar to Algorithm 2, except for the two parts marked with a wireframe in Algorithm 3, and these changes are only semantic, so there is obviously for all adversary .
: This is similar to Algorithm 3, except for those parts marked with a wireframe in Algorithm 4. The indistinguishability of Algorithm 3 and Algorithm 4 stems from the leftover hash lemma (as shown in Lemma 1) and the basic fact that the sum of two random matrices is still a random matrix. So, there is obviously for all adversaries .
: This is similar to Algorithm 4, except for those parts marked with a wireframe in Algorithm 5. It chooses another indistinguishable way to generate , which stems from the trapdoor lattice sampler. So, there is obviously for all adversaries .
: This is similar to Algorithm 5, except for several parts marked with wireframes in Algorithm 6, which can be summarized as the way in which is generated when answering the private key query of the adversary for all . This indistinguishably stems from the smudging lemma (Lemma 2), so we can deduce that for all adversaries where is a negligible function to measure the indistinguishability of two distributions under smudging and represents the number of private key queries made. For example, for all of the and , when , there is SD (where ).
: It is basically similar to Algorithm 6, just except the generation method of the vector is different when answering the adversary . Here, in order to achieve the same purpose, we use the idea of Hybrid 6 in []. Namely, let be a vector such that and for all . Note that by the game restriction, the set of rows of G with indices in must be unauthorized with respect to the access policy , and, hence, the existence of such a vector is guaranteed. We can find that the indistinguishability of Algorithm 6 and Algorithm 7 comes from the excellent characteristics of the trapdoor sampling of lattice. So, there is obviously for all adversaries .
: This is similar to Algorithm 7, except for several parts marked with wireframes in Algorithm 8. Similar to the methods and goals of Hybrid 7 in [], here, due to the restrictions of the game, for each secret key query of corresponding to some attribute set , the rows of with indices in are linearly independent. These changes can also be seen as a simple semantic, so they are indistinguishable; therefore, there is obviously for all adversaries .
: This is similar to Algorithm 8, except for several parts marked with wireframes in Algorithm 9, which can be summarized as the way in which is generated when answering the private key query of the adversary . The indistinguishability of Algorithm 8 and Algorithm 9 is derived from the excellent characteristics of the trapdoor sampling of lattice. So, there is obviously for all adversaries .
: This is similar to Algorithm 9, except for the part marked with wireframes in Algorithm 10. Namely, the way to generate the matrices has been replaced. The indistinguishability of Algorithm 1 and Algorithm 2 is derived from the excellent characteristics of the trapdoor sampling of lattice as described earlier. So, there is obviously for all adversaries .
: This is similar to Algorithm 10, except for the two parts marked with wireframes in Algorithm 11. Namely, the way to generate the vectors in the has been replaced. The indistinguishability of Algorithm 10 and Algorithm 11 is derived from the smudging lemma (Lemma 2). So, there is obviously for all adversaries .
: This is basically the same as Algorithm 11, except for a few framed parts, which are summarized as different ways of generating ciphertext in the challenge phase. In Algorithm 11, resembles a set of LWE samples, and, here, we really want to use LWE to hide s. Assume that for any , , then . Because of the decisional LWE, we have that the selection of in Algorithm 11 and Algorithm 12 is indistinguishable. In addition, Algorithm 12 makes a semantic transformation with so that gets rid of s and has the same distribution as the selection in Algorithm 11. In turn, if we look at , because of , we can make and randomly select . Then, there must be MSB = MSB. Then, according to the decisional LWE, we have that the distribution of MSB is indistinguishable from that of MSB (where ). To sum up, the indistinguishability of Algorithm 11 and Algorithm 12 is derived from the LWE assumption. So, there is obviously for all adversaries . □
| Algorithm 1 (Hybrid 0) |
![]() |
| Algorithm 2 (Hybrid 1) |
![]() |
| Algorithm 3 (Hybrid 2) |
![]() |
| Algorithm 4 (Hybrid 3) |
![]() |
| Algorithm 5 (Hybrid 4) |
![]() |
| Algorithm 6 (Hybrid 5) |
![]() |
| Algorithm 7 (Hybrid 6) |
![]() |
| Algorithm 8 (Hybrid 7) |
![]() |
| Algorithm 9 (Hybrid 8) |
![]() |
| Algorithm 10 (Hybrid 9) |
![]() |
| Algorithm 11 (Hybrid 10) |
![]() |
| Algorithm 12 (Hybrid 11) |
![]() |
3.3. Comparison
For a long time before, the only known way to implement an LWE-based CP-ABE scheme was to convert a circuit-based KP-ABE scheme into a CP-ABE scheme, in which the access policies and sets of attributes were represented as circuits by using general circuits. However, this transformation essentially results in a CP-ABE with restricted access policy classes, whose parameters are far from ideal.
In recent years, people have tried to make some improvements to the CP-ABE based on the general-purpose circuits described above, while trying to get rid of other assumptions, and have wanted to design solutions only based on LWE. This is a step-by-step process, and, recently, there have been only a few exciting attempts, but these schemes themselves are not very efficient, and they are only attempts at the design level. There has not been too much consideration for specific contents, such as the key size or ciphertext size; therefore, here, we also make a comparison mainly from these levels, as shown below.
The reason why we say that our scheme is at least the same as the scheme [] under the same parameters is that we can prove that the scheme can indeed achieve selective security. However, also because the use of two-stage sampling technology has been proven able to achieve a strong security, simple function encryption. The so-called strong security means that attackers can decrypt key queries before and after arbitrary challenges are issued in simulated security experiments. Here, we only give proof that the scheme is selectively secure. At the same time, in order to better illustrate the contribution of this scheme, we compare our scheme with some previous CP-ABE schemes, as shown in Table 1 below.
Table 1.
Comparison with the construction of some previous LWE-based CP-ABE schemes.
Here, under the same parameters, we make a simple comparison between our scheme and the one in [] in terms of the public key, private key, and ciphertext storage overhead. The results show that the ciphertext can be shortened to a certain extent by two-stage sampling technology. The specific comparison idea is as follows. Since the lengths of parts and in the ciphertext of the two schemes are equal, we only compare parts and , as shown in Table 2 (since the value of the parameter “m” in our scheme is half that of the parameter “m” in their scheme, in order to make a unified comparison, we take the parameters in our scheme as the benchmark). In addition, we also find that the sizes of the public key and private key of our scheme are superior to those of the original scheme. However, because the efficiencies of all LWE-based CP-ABEs are relatively low, we mainly pay attention to the innovation of the scheme design itself. However, some other contents, such as key size, encryption cost, decryption cost, and so on, will not be considered for the time being. The performance optimization, computational complexity, and implementation of the scheme will be considered at a later time.
Table 2.
Comparison between our scheme and the scheme in [] in terms of storage overhead under the same parameters.
3.4. Example of Parameters Selection
In this section, we refer to the six constraints of the scheme parameters in the Section 3 of this paper, and, after a series of strict calculations, we give several groups of reasonable parameter choices, which are not necessarily optimal, for detail, please refer to Table 3 as shown below.
Table 3.
Recommended parameters in our CP-ABE scheme.
3.5. A Simple Example of CP-ABE
Here, we consider a non-monotone Boolean formula , whose root has a 1-label (1, 0, 0, 0, 0) and a 0-label (0, 1, 0, 0, 0). According to the construction principle of generating matrix G, we can determine that the policy is
When the parameters 2580, and are selected, respectively, a series of operations are carried out according to the requirements of the four steps of the scheme design in Section 3.1 above because we can easily find a set of to make . Because the ciphertext generated by encryption is and , therefore, according to the decryption algorithm, it can be calculated . After a series of simplification, we can obtain . Through the calculation, it is found that ; therefore, , so it can be decrypted successfully.
4. Conclusions
In this paper, the CP-ABE scheme of [] is improved by using a two-stage sampling algorithm, and a selectively secure CP-ABE scheme with shorter ciphertext is obtained. We prove the correctness of the scheme and give strict proof of security. At the same time, we also give a comparison of the computational cost between this scheme and the one in [], and, in order to better understand the scheme, we recommend several groups of parameters through a series of strict calculations. Finally, we give a simple example to demonstrate the overall operation process of the algorithm. This scheme may provide some ideas for constructing other CP-ABE and multi-authority attribute encryption schemes, and the two-stage sampling algorithm involved in this scheme may be used in other cryptographic schemes to optimize the existing performance.
Author Contributions
Conceptualization, Y.Y. and L.S.; methodology, Y.Y.; validation, Y.Y., L.S., Q.W. and K.W.; security analysis, H.C. and L.S.; investigation, Y.Y., Q.W. and K.W.; writing—original draft preparation, Y.Y.; writing—review and editing, Y.Y. and H.C.; visualization, K.W.; supervision, K.W.; data curation Q.W.; project administration, H.C.; funding acquisition, H.C. All authors have read and agreed to the published version of the manuscript.
Funding
This research was funded by the First-class Discipline Construction Project of Beijing Electronic Science and Technology Institute (No: 3201017) and the National Natural Science Foundation of China (No: 61772047). The APC was funded by the First-class Discipline Construction Project of Beijing Electronic Science and Technology Institute (No: 3201017) and the National Natural Science Foundation of China (No: 61772047).
Institutional Review Board Statement
Not applicable.
Informed Consent Statement
Not applicable.
Data Availability Statement
Not applicable.
Conflicts of Interest
The authors declare no conflict of interest.
References
- Diffie, W.; Hellman, M.E. New directions in cryptography. IEEE Trans. Inf. Theory 1976, 22, 644–654. [Google Scholar] [CrossRef]
- Goyal, V.; Pandey, O.; Sahai, A.; Waters, B. Attribute-based encryption for fine-grained access control of encrypted data. In Proceedings of the 13th ACM Conference on Computer and Communications Security, Alexandria, VA, USA, 3 October–30 November 2006; pp. 89–98. [Google Scholar]
- Sahai, A.; Waters, B. Fuzzy identity-based encryption. In Proceedings of the EUROCRYPT 2005. LNCS, Aarhus, Denmark, 22–26 May 2005; Cramer, R., Ed.; Springer: Heidelberg, Germany, 2005; Volume 3494, pp. 457–473. [Google Scholar]
- Agrawal, S.; Freeman, D.M.; Vaikuntanathan, V. Functional encryption for inner product predicates from learning with errors. In Proceedings of the ASIACRYPT 2011. LNCS, Seoul, South Korea, 4–8 December 2011; Lee, D.H., Wang, X., Eds.; Springer: Heidelberg, Germany, 2011; Volume 7073, pp. 21–40. [Google Scholar]
- Agrawal, S.; Maitra, M.; Yamada, S. Attribute based encryption (and more) for nondeterministic finite automata from LWE. In Proceedings of the CRYPTO 2019. LNCS, Santa Barbara, CA, USA, 18–22 August 2019; Boldyreva, A., Micciancio, D., Eds.; Springer: Cham, Switzerland, 2019; Volume 11693, pp. 765–797. [Google Scholar]
- Agrawal, S.; Yamada, S. Optimal broadcast encryption from pairings and LWE. In Proceedings of the EUROCRYPT 2020. LNCS, Zagreb, Croatia, 10–14 May 2020; Canteaut, A., Ishai, Y., Eds.; Springer: Cham, Switzerland, 2020; Volume 12105, pp. 13–43. [Google Scholar]
- Attrapadung, N. Unbounded dynamic predicate compositions in attribute-based encryption. In Proceedings of the EUROCRYPT 2019. LNCS, Darmstadt, Germany, 19–23 May 2019; Ishai, Y., Rijmen, V., Eds.; Springer: Cham, Switzerland, 2019; Volume 11476, pp. 34–67. [Google Scholar]
- Boneh, D.; Gentry, C.; Gorbunov, S.; Halevi, S.; Nikolaenko, V.; Segev, G.; Vaikuntanathan, V.; Vinayagamurthy, D. Fully key-homomorphic encryption, arithmetic circuit ABE and compact garbled circuits. In EUROCRYPT 2014. LNCS; Nguyen, P.Q., Oswald, E., Eds.; Springer: Heidelberg, Germany, 2014; Volume 8441, pp. 533–556. [Google Scholar]
- Brakerski, Z.; Vaikuntanathan, V. Lattice-inspired broadcast encryption and succinct ciphertext-policy ABE. IACR Cryptol. ePrint Arch. 2020, 191. [Google Scholar]
- Brakerski, Z.; Vaikuntanathan, V. Circuit-ABE from LWE: Unbounded attributes and semi-adaptive security. In Proceedings of the CRYPTO 2016. LNCS, Santa Barbara, CA, USA, 14–18 August 2016; Robshaw, M., Katz, J., Eds.; Springer: Heidelberg, Germany, 2016; Volume 9816, pp. 363–384. [Google Scholar]
- Chen, J.; Gay, R.; Wee, H. Improved dual system ABE in prime-order groups via predicate encodings. In Proceedings of the EUROCRYPT 2015. LNCS, Sofia, Bulgaria, 26–30 April 2015; Oswald, E., Fischlin, M., Eds.; Springer: Heidelberg, Germany, 2015; Volume 9057, pp. 595–624. [Google Scholar]
- Chen, J.; Gong, J.; Kowalczyk, L.; Wee, H. Unbounded ABE via bilinear entropy expansion, revisited. In Proceedings of the EUROCRYPT 2018. LNCS, Tel Aviv, Israel, 29 April–3 May 2018; Nielsen, J.B., Rijmen, V., Eds.; Springer: Cham, Switzerland, 2018; Volume 10820, pp. 503–534. [Google Scholar]
- Garg, S.; Gentry, C.; Halevi, S.; Sahai, A.; Waters, B. Attribute-based encryption for circuits from multilinear maps. In Proceedings of the CRYPTO 2013. LNCS, Santa Barbara, CA, USA, 18–22 August 2013; Canetti, R., Garay, J.A., Eds.; Springer: Heidelberg, Germany, 2013; Volume 8043, pp. 479–499. [Google Scholar]
- Gong, J.; Waters, B.; Wee, H. ABE for DFA from k-Lin. In Proceedings of the CRYPTO 2019. LNCS; Santa Barbara, CA, USA, 18–22 August 2019; Boldyreva, A., Micciancio, D., Eds.; Springer: Cham, Switzerland, 2019; Volume 11693, pp. 732–764. [Google Scholar]
- Gong, J.; Wee, H. Adaptively secure ABE for DFA from k-Lin and more. In Proceedings of the EUROCRYPT 2020. LNCS, Zagreb, Croatia, 10–14 May 2020; Canteaut, A., Ishai, Y., Eds.; Springer: Cham, Switzerland, 2020; Volume 12107, pp. 278–308. [Google Scholar]
- Shor, P.W. Algorithms for quantum computation: Discrete logarithms and factoring. In Proceedings of the FOCS, Santa Fe, NM, USA, 20–22 November 1994; IEEE: New York, NY, USA, 1994; pp. 124–134. [Google Scholar]
- Boyen, X. Attribute-based functional encryption on lattices. In Proceedings of the TCC 2013. LNCS, Tokyo, Japan, 3–6 March 2013; Sahai, A., Ed.; Springer: Heidelberg, Germany, 2013; Volume 7785, pp. 122–142. [Google Scholar]
- Gorbunov, S.; Vinayagamurthy, D. Riding on asymmetry: Efficient ABE for branching programs. In Proceedings of the ASIACRYPT 2015. LNCS, Auckland, New Zealand, 29 November–3 December 2015; Iwata, T., Cheon, J.H., Eds.; Springer: Heidelberg, Germany, 2015; Volume 9452, pp. 550–574. [Google Scholar]
- Tsabary, R. Fully secure attribute-based encryption for t-CNF from LWE. In Proceedings of the CRYPTO 2019. LNCS, Santa Barbara, CA, USA, 18–22 August 2019; Boldyreva, A., Micciancio, D., Eds.; Springer: Cham, Switzerland, 2019; Volume 11692, pp. 62–85. [Google Scholar]
- Datta, P.; Komargodski, I.; Waters, B. Decentralized multi-authority ABE for DNFs from LWE. In Proceedings of the EUROCRYPT 2021, Part I. LNCS, Zagreb, Croatia, 17–21 October 2021; Canteaut, A., Standaert, F.-X., Eds.; Springer: Cham, Switzerland, 2021; Volume 12696, pp. 177–209. [Google Scholar]
- Agrawal, S.; Wichs, D.; Yamada, S. Optimal broadcast encryption from LWE and pairings in the standard model. In Proceedings of the TCC 2020. LNCS, Durham, NC, USA, 16–19 November 2020; Pass, R., Pietrzak, K., Eds.; Springer: Cham, Switzerland, 2021; Volume 12550, pp. 149–178. [Google Scholar]
- Agrawal, S.; Yamada, S. CP-ABE for circuits (and more) in the symmetric key setting. In Proceedings of the TCC 2020. LNCS, Durham, NC, USA, 16–19 November 2020; Pass, R., Pietrzak, K., Eds.; Springer: Cham, Switzerland, 2020; Volume 12550, pp. 117–148. [Google Scholar]
- Agrawal, S.; Biswas, R.; Nishimaki, R.; Xagawa, K.; Xie, X.; Yamada, S. Cryptanalysis of Boyen’s attribute-based encryption scheme in TCC 2013. Des. Codes Cryptogr. 2022, 90, 2301–2318. [Google Scholar] [CrossRef]
- Lai, Q.; Liu, F.H.; Wang, Z.D. New lattice two-stage sampling technique and its applications to functional encryption–stronger security and smaller ciphertexts. In Proceedings of the EUROCRYPT 2021. LNCS, Zagreb, Croatia, 17–21 October 2021; Canteaut, A., Standaert, F.-X., Eds.; Springer: Cham, Switzerland, 2021; Volume 12696, pp. 498–527. [Google Scholar]
- Datta, P.; Komargodski, I.; Waters, B. Decentralized multi-authority ABE for DNFs from LWE. IACR Cryptol. ePrint Arch. 2020, 1386, 1–92. [Google Scholar]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).











