Privacy-preserving attribute-based encryption scheme on ideal lattices
Based on the small key size and high encryption efficiency on ideal lattices,a privacy-preserving attribute-based encryption scheme on ideal lattices was proposed,which could support flexible access policies and privacy protection for the users.In the scheme,a semi-hidden policy was introduced to pr...
Saved in:
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2018-03-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2018048/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841539446848094208 |
---|---|
author | Xixi YAN Yuan LIU Zichen LI Yongli TANG Qing YE |
author_facet | Xixi YAN Yuan LIU Zichen LI Yongli TANG Qing YE |
author_sort | Xixi YAN |
collection | DOAJ |
description | Based on the small key size and high encryption efficiency on ideal lattices,a privacy-preserving attribute-based encryption scheme on ideal lattices was proposed,which could support flexible access policies and privacy protection for the users.In the scheme,a semi-hidden policy was introduced to protect the users’ privacy.Thus,the sensitive values of user’s attributes are hidden to prevent from revealing to any third parties.In addition,the extended Shamir secret-sharing schemes was used to construct the access tree structure which can support “and” “or” and “threshold” operations of attributes with a high flexibility.Besides,the scheme was proved to be secure against chosen plaintext attack under the standard mode.Compared to the existing related schemes,the scheme can yield significant performance benefits,especially the size of system public/secret keys,users’ secret key and ciphertext.It is more effective in the large scale distributed environment. |
format | Article |
id | doaj-art-9cedd3a1c9eb469d914f928380357d8a |
institution | Kabale University |
issn | 1000-436X |
language | zho |
publishDate | 2018-03-01 |
publisher | Editorial Department of Journal on Communications |
record_format | Article |
series | Tongxin xuebao |
spelling | doaj-art-9cedd3a1c9eb469d914f928380357d8a2025-01-14T07:14:26ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2018-03-013912813559717133Privacy-preserving attribute-based encryption scheme on ideal latticesXixi YANYuan LIUZichen LIYongli TANGQing YEBased on the small key size and high encryption efficiency on ideal lattices,a privacy-preserving attribute-based encryption scheme on ideal lattices was proposed,which could support flexible access policies and privacy protection for the users.In the scheme,a semi-hidden policy was introduced to protect the users’ privacy.Thus,the sensitive values of user’s attributes are hidden to prevent from revealing to any third parties.In addition,the extended Shamir secret-sharing schemes was used to construct the access tree structure which can support “and” “or” and “threshold” operations of attributes with a high flexibility.Besides,the scheme was proved to be secure against chosen plaintext attack under the standard mode.Compared to the existing related schemes,the scheme can yield significant performance benefits,especially the size of system public/secret keys,users’ secret key and ciphertext.It is more effective in the large scale distributed environment.http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2018048/attribute based encryptionideal latticesprivacy-preservingR-LWEaccess tree |
spellingShingle | Xixi YAN Yuan LIU Zichen LI Yongli TANG Qing YE Privacy-preserving attribute-based encryption scheme on ideal lattices Tongxin xuebao attribute based encryption ideal lattices privacy-preserving R-LWE access tree |
title | Privacy-preserving attribute-based encryption scheme on ideal lattices |
title_full | Privacy-preserving attribute-based encryption scheme on ideal lattices |
title_fullStr | Privacy-preserving attribute-based encryption scheme on ideal lattices |
title_full_unstemmed | Privacy-preserving attribute-based encryption scheme on ideal lattices |
title_short | Privacy-preserving attribute-based encryption scheme on ideal lattices |
title_sort | privacy preserving attribute based encryption scheme on ideal lattices |
topic | attribute based encryption ideal lattices privacy-preserving R-LWE access tree |
url | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2018048/ |
work_keys_str_mv | AT xixiyan privacypreservingattributebasedencryptionschemeonideallattices AT yuanliu privacypreservingattributebasedencryptionschemeonideallattices AT zichenli privacypreservingattributebasedencryptionschemeonideallattices AT yonglitang privacypreservingattributebasedencryptionschemeonideallattices AT qingye privacypreservingattributebasedencryptionschemeonideallattices |