Circuit-ABE from LWE: Unbounded Attributes and Semi-adaptive Security
نویسندگان
چکیده
We construct an LWE-based key-policy attribute-based encryption (ABE) scheme that supports attributes of unbounded polynomial length. Namely, the size of the public parameters is a fixed polynomial in the security parameter and a depth bound, and with these fixed length parameters, one can encrypt attributes of arbitrary length. Similarly, any polynomial size circuit that adheres to the depth bound can be used as the policy circuit regardless of its input length (recall that a depth d circuit can have as many as 2 inputs). This is in contrast to previous LWE-based schemes where the length of the public parameters has to grow linearly with the maximal attribute length. We prove that our scheme is semi-adaptively secure, namely, the adversary can choose the challenge attribute after seeing the public parameters (but before any decryption keys). Previous LWE-based constructions were only able to achieve selective security. (We stress that the “complexity leveraging” technique is not applicable for unbounded attributes.) We believe that our techniques are of interest at least as much as our end result. Fundamentally, selective security and bounded attributes are both shortcomings that arise out of the current LWE proof techniques that program the challenge attributes into the public parameters. The LWE toolbox we develop in this work allows us to delay this programming. In a nutshell, the new tools include a way to generate an a-priori unbounded sequence of LWE matrices, and have fine-grained control over which trapdoor is embedded in each and every one of them, all with succinct representation. ∗Weizmann Institute of Science, [email protected]. Supported by the Israel Science Foundation (Grant No. 468/14), the Alon Young Faculty Fellowship, Binational Science Foundation (Grant No. 712307) and Google Faculty Research Award. †MIT CSAIL, [email protected]. Research supported in part by DARPA Safeware Grant, NSF CAREER Award CNS-1350619, NSF Grant CNS-1413964 (MACS: A Modular Approach to Computer Security), US-Israel Binational Science Foundation Grant No. 712307, Alfred P. Sloan Research Fellowship, Microsoft Faculty Fellowship, NEC Corporation and a Steven and Renee Finn Career Development Chair from MIT.
منابع مشابه
Decentralized Ciphertext-Policy Attribute-Based Encryption: A Post-Quantum Construction
In Ciphertext Policy Attribute-Based Encryption (CP-ABE) system, a set of attributes is associated with the private keys of each user. Also, the ciphertext is attached with a policy which is defined over that set of attributes. A user can decrypt the ciphertext if the ciphertext’s policy is satisfied by the attributes associated hith her private key. Traditional CP-ABE schemes, based on number ...
متن کاملInterpolating Predicate and Functional Encryption from Learning With Errors
We construct a functional encryption scheme for circuits which achieves a notion of security that interpolates predicate and functional encryption. Our scheme is secure based on the subexponential learning with errors (LWE) assumption. Our construction simultaneously achieves and improves upon the security of the current best known, and incomparable, constructions from standard assumptions, nam...
متن کاملSemi-adaptive Security and Bundling Functionalities Made Generic and Easy
Semi-adaptive security is a notion of security that lies between selective and adaptive security for Attribute-Based Encryption (ABE) and Functional Encryption (FE) systems. In the semi-adaptive model the attacker is forced to disclose the challenge messages before it makes any key queries, but is allowed to see the public parameters. We show how to generically transform any selectively secure ...
متن کاملExpressive Attribute-Based Encryption with Constant-Size Ciphertexts from the Decisional Linear Assumption
We propose a key-policy attribute-based encryption (KP-ABE) scheme with constantsize ciphertexts, whose semi-adaptive security is proven under the decisional linear (DLIN) assumption in the standard model. The access structure is expressive, that is given by non-monotone span programs. It also has fast decryption, i.e., a decryption includes only a constant number of pairing operations. As an a...
متن کاملLarge Universe Attribute-Based Encryption Scheme from Lattices
School of science, Xi’an University of Technology Xi'an, 710054, Shaanxi , CHINA [email protected] (Lab of Cryptography and Network Security, Xi’an University of Technology, Xi’an, 710054, China) Abstract. We propose a large universe attribute-based encryption (ABE ) scheme from lattices. It is inspired by Brent Waters’s scheme which is a large universe attribute-based encryption using bilinear ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2016 شماره
صفحات -
تاریخ انتشار 2016