1. Introduction
With the continuous development of quantum computing technology, traditional encryption algorithms face unprecedented challenges. In this context, lattice-based cryptography has emerged as a promising choice to combat quantum attacks. Lattice-based cryptography was first proposed by Ajtai [1], who constructed an unbreakable cryptographic system using computationally hard lattice problems. This innovative solution not only lays the foundation for the development of post-quantum cryptography but also attracts widespread attention for its unique contributions to the field of cryptography. Therefore, lattice-based cryptography is regarded as an important milestone in the development of post-quantum cryptography.
In the field of cryptography, ciphertext policy attribute-based encryption (CP-ABE) and identity authentication technologies play a crucial role in information security and user identity verification. Considering the security threats during the process of data exchange in Internet of Thing (IoT), such as adversaries impersonating users to access data stored on servers or devices, receiving incomplete or tampered data, etc., research on post-quantum-based identity authentication and access control has become particularly urgent. In this context, the verification key protocol [2] based on the Ring Learning With Errors (RLWEs) assumption emerges as an important security service. Its main objective is to establish a session key after mutual authentication between users and accessed servers, which can ensure secure communication between users and servers. It provides a forward-looking solution for identity authentication and data access control issues in IoT environments, and it lays the foundation for more secure and reliable IoT communication.
CP-ABE technology has the dual advantages of fine-grained access control and data protection; thus, it attracts widespread attention. In recent years, the lattice-based [3] attribute encryption approach has become an important research direction in CP-ABE. Moreover, with in-depth research on the RLWEs problem, significant progress has been made in this direction, and lattice-based CP-ABE schemes have been successfully introduced into both centralized and decentralized systems. Continuous optimizations of the RLWEs problem have further enhanced the performance in implementing flexible access policies. For instance, in [4], the private keys are distributed by the decentralized multi-authority to improve efficiency, which is more suitable for distributed storage environments. This development gives the lattice-based CP-ABE schemes a unique advantage in the diverse and complex access control requirements of modern network environments.
In this paper, we made improvements based on reference [5], in which different third-party authorities and flexibility during communication are considered. Specifically, our improvements are mainly described in the following aspects:
In the Gaussian sampling algorithm, two parameters are set for the standard deviation of the Gaussian distribution, which can concentrate the generated random values around the mean and ensures a wider Gaussian curve within a certain range of fluctuations. This results in a broader distribution of random values and improves overall performance.
The RTrapGen algorithm handles shared and non-shared attributes differently. To enhance the efficiency of key generation, we first identify and categorize the hierarchical relationships of identities during initialization. Subsequently, in the AASetup phase, different sets of attributes are formed based on relationships, thereby reducing the computational overhead of the authorization authority. These optimization measures contribute to improving the performance of the algorithm.
In the decryption phase, traditional Gaussian elimination is replaced to solve a set of scalar problems to verify the decryption result. A basis transformation is applied to the shared matrices in the Linear Secret Sharing Scheme (LSSS), and the shared matrices are rapidly converted into a collection of shortest vectors, thereby reducing the computational cost of linear space checks.
2. Related Work
So far, researchers have been continuously exploring and enhancing the security of CP-ABE schemes. These efforts aim to ensure that encryption systems effectively protect data from unauthorized access and disclosure. Zhang et al. [6] proposed an improved scheme for cloud computing CP-ABE, which closely associates access control policies with data to achieve fine-grained access control. The scheme also considers potential attacks through system information leakage rather than directly attacking the encryption algorithm, so it effectively maintains data security. Traditional cryptography is quite mature in resisting attacks, but further research on lattice-based cryptography is considered against quantum computers. Huang et al. [7] proposed a lattice-based group authentication scheme to resist various attacks. The scheme can implement group authentication where administrators can select any user to create the authentication process after confirming the total number of users. It indicates promising applications in the IoT domain. Sedat Akleylek et al. [8] proposed a new lattice-based IoT authentication scheme based on the ISIS problem, which can ensure system reliability against quantum attacks and meets zero-knowledge properties to protect privacy during authentication. It also defends against various attacks such as man-in-the-middle, simulation, and replay, while optimizing efficiency; therefore, it is suitable for RFID systems in the IoT. Through continuous security optimization, system protection can be effectively maintained while computational overhead is reduced. Fu et al. [9] proposed an offline/online lattice-based CP-ABE scheme, which can reduce the computational burden of mobile devices in two phases. With the RLWEs assumption, it enhances security against quantum computing attacks. And it is suitable for resource-constrained devices and has long-term security.
A gradual improvement has been achieved in lattice-based attribute strategies. However, challenges remain in lightweight and flexible encryption. Zhao et al. [10] proposed a revocable lattice attribute-based encryption scheme based on the RLWEs problem that can support attribute revocation and flexibly update user permissions to adapt to changing demands. Security proof is crucial for encryption schemes. In this scheme, security threats are discussed, such as collusion attacks [11,12,13], and corresponding solutions are proposed. This security analysis ensure that the schemes are not compromised by potential threats in practical applications. Further, researchers use the authentication scheme based on lattice in different application scenarios. Ali Shahidinejad et al. [14] presented a decentralized authentication and key exchange protocol for device-to-device communication in IoT, in which lattice-based encryption is used to resist quantum attacks and edge computing is introduced to reduce device computational overhead as well as improve system efficiency. This authentication scheme is applicable in smart homes [15], smart agriculture [16], and healthcare [17], which provides inter-domain authentication support.
Pithwi et al. [5] addressed a lattice-based quantum-resistant distributed identity authentication and policy attribute encryption scheme that can ensure the balance between security and lightweight encryption. This scheme uses ring variant trapdoors for lattice-based cryptography, which is suitable for distributed environments due to supporting the distributed settings. In the key generation and decryption phases, Shamir threshold secret sharing and Lagrange interpolation are employed for private key partitioning and recovery. Furthermore, Gaussian preimage sampling on lattice is utilized for efficiency improvement. We find that a further improvement can be achieved based on [5]; for example, more stable parameters are found by the standard deviation of the distribution in Gaussian sampling algorithms to obtain a wider distribution of random values. Additionally, in the RTrapGen algorithm, the shared and the non-shared attribute sets are distinguished to facilitate computation. In the AASetup phase, different attribute sets are formed based on the shared and the non-shared attributes, which reduces the computational overhead of authorization authorities and indirectly enhances the efficiency of the key generation phase (KenGen). These optimization measures contribute to improving the performance of the algorithm. In the decryption phase, classical Gaussian elimination is replaced to address a set of scalar problems, which can determine the success of decryption. To achieve this improvement, a basis transformation is applied to the shared matrix in the LSSS, which can be rapidly converted into a set of shortest vectors. Thereby, it can reduce the computational cost of linear space checks.
3. Preliminaries
In post-quantum cryptography, the mathematical structure of lattices has significant advantages in resisting quantum computing attacks based on lattice structures; the difficulty of the RLWEs problem is discussed in this paper. The RLWEs problem is established on a ring, and its security relies on the relationship between indistinct polynomials and random errors. Lattice-based RLWE algorithms provide an effective means against quantum attacks by leveraging the characteristics of rings and errors. This approach is widely applied in practical scenarios such as distributed identity authentication and attribute-based encryption schemes to ensure secure communication and data protection. In this section, we discuss the mathematical foundation and structure of lattice-based RLWE problems in the quantum domain, as well as the techniques adopted in distributed identity authentication and attribute-based encryption schemes.
3.1. Lattices
Taking into account an -dimensional lattice, each base vector comprises real number vectors, denoted by , where represents the -th component of the -th base vector. Thus, the basis of becomes a set , where and are polynomial rings. Then, the lattice can be represented as . Furthermore, for the -norm on lattice vector , it is defined as , where is the th component of vector .
3.2. RLWEs
Given a polynomial ring , a secret polynomial , and an error polynomial , we define the following sampling process: randomly selecting . Calculate , where all calculations are performed on the ring of module . The opponent obtains a set of sample pairs , generated from the above process or a completely random distribution. Specifically, for example, the truly random oracle is described as follow. The generated samples for are entirely random, where polynomial a and polynomial b are randomly selected from with a uniform distribution. The RLWEs oracle is described as follow. In the generated sample pairs , where the polynomial is randomly selected from a uniform distribution on , is described as a fixed secret polynomial, and the noise is extracted from a discrete Gaussian distribution. The decision RLWEs assume that the opponent cannot significantly distinguish between samples from the RLWEs oracle and samples from the genuinely random oracle in polynomial time. Therefore, the difficulty of the decision RLWEs problem lies in the difficulty that the opponent recovers the secret polynomial from a given sample, even if the opponent knows the process of generating the sample [18].
3.3. Gaussian Sampling
Discrete Gaussian sampling and Gaussian inversion sampling are widely applied in the fields of computer science and cryptography. The former refers to the process of generating random samples from a discrete Gaussian distribution, while the latter refers to the process of generating random samples from a standard normal distribution (Gaussian distribution with mean 0 and variance 1). We briefly introduce these two sampling methods.
(Discrete Gaussian Sampling). A Gaussian function with center distance and density function () is denoted as . Gaussian distribution based on an -dimensional lattice is defined as , and a discrete Gaussian distribution [5] is defined as , . In this paper, the Gaussian function value is calculated at each point on the lattice, and all the values are summed to obtain the total. Then, the Gaussian function value at each point is divided by this total. As a result, the sum of the normalized Gaussian function values will be 1. This normalization ensures that the integral of the function can be 1 over the entire lattice, which meets the properties of a probability distribution.
(Gaussian preimage sampling). As shown in Algorithm 1 below, . Given input vector , the trap , a vector , and the parameters , an interference vector is generated, while the vector is computed by , where a vector , for all , . The vector is obtained as the output and is sampled from when is true [11].
Algorithm 1: RSamplePre |
Input: |
Output: |
do |
then |
then |
then |
10 else |
12 end if |
13 end for |
15 if true then |
16 return M |
17 else |
18 return Error |
19 end if |
3.4. Trapdoor
As shown in Algorithm 2, . Consider a vector , where . Assume is prime. There are , , , where is a security parameter and is the cardinality of vector , while is at least 2. Give an output vector and a trapdoor , where the size of A is . Define and , where . The security of this algorithm relies on the RLWEs assumption, where is secret, and is generated by a Gaussian distribution [12].
Algorithm 2: Trapdoor Generation |
Input: |
Output: |
with |
6 for i = 1,2,...,k do |
8 end for |
3.5. Security Assumptions
In the field of cryptography, we assume that the security model consists of a series of games between a Probabilistic Polynomial Time (PPT) adversary and a challenger . As the adversary, its attacks include launching traditional number-theoretic attacks and quantum attacks against RLWE-based systems simultaneously. These attacks include replay attacks, man-in-the-middle attacks, temporary secret leakage attacks, signal leakage attacks, and so on. The security model described in this paper is considered secure against selectively ciphertext attacks (sCPA).
During the initialization phase, adversary will attempt to attack and disrupt the access structure or permissions and declare two internal challenges: access structure challenge and a set of compromised permissions . These challenges are then sent to . Challenger executes Setup and AASetup algorithms to generate public parameters and the public–private key pairs corresponding to each compromised institution in the list. forwards the generated parameters to adversary .
Phase 1: Adversary attempts to obtain private key information for compromised permissions. Adversary generates and sends it to . Meanwhile, frequently sends queries for private key generation to . Here, represents the attribute set of user . represents the attribute set associated with the compromised permissions. Since does not satisfy the challenge access structure , the key generation algorithm keyGen is executed by , and forwards the generated private key to adversary .
Challenge: Adversary randomly selects two messages, and , which can be seen as choices of plaintext to be encrypted. These two messages are sent to , which simulates a step of requesting encryption for . selects a value from that represents the message encrypted by challenger . According to the challenge access structure , challenger encrypts message using the selected . sends the generated ciphertext to adversary .
Phase 2: In this stage, adversary frequently requests key queries.
Conjecture: Adversary engages in a game where guesses about variable . If , adversary wins the game. The probability of winning is defined as the advantage of , namely , where . If is true, it denotes that the guess is correct. On the contrary, the guess is true. In summary, it is defined as Equation (1).
(1)
Therefore, this assumption is not feasible, but it has an undeniable advantage in solving the above conjecture. Our proposed lattice-based CP-ABE scheme with multiple authorities is secure in the sCPA model. Specifically, if there exists an adversary who can successfully break IND-sCPA security (i.e., with a non-negligible success probability ), we can deduce that another adversary can solve the RLWEs problem with a corresponding advantage (at least ). It demonstrates that the security of the CP-ABE scheme is closely related to the difficulty of the RLWEs problem.
3.6. Formal Definition for CP-ABE
Setup. The implicit security parameter is given to the setup algorithm as the input. It outputs public parameters .
AASetup . Each authorization authority runs RTrapGen by , outputs a key pair , selects an attribute set , chooses a polynomial , and finally generates a public key and private key .
KenGen . The KenGen algorithm takes the attribute set and the public parameters from the Gaussian image sampling algorithm as inputs and outputs the private key .
Encryption . The public key , access structure , plain text , matrix , and attribute vector are all inputted to the KenGen algorithm. The algorithm will encrypt and produce a ciphertext so that only a user that possesses a set of attributes that satisfy the access structure can decrypt the message.
Decryption . The matrix , ciphertext , and the private key , which is regarded as a private key for a set of attributes, are described as the inputs of the decryption algorithm. The decrypted ciphertext is obtained in the condition of satisfying different access structures.
4. Lattice-Based Multi-Authority CP-ABE
In this section, security assumption is discussed, and the multi-authority CP-ABE proposal based on lattice is implemented. The meanings of the symbols in the scheme are shown in Table 1.
4.1. System Model
The description of the system model is as follows: Firstly, the trusted key generation center KGC generates public parameters, permissions, and unique identities corresponding to legitimate users by executing the Setup and AASetup stages. The access policy is set based on the general attributes of the data owner. Secondly, during the encryption phase, the ciphertext is uploaded to the cloud server. Data users download ciphertext from cloud servers. For this purpose, data users must send requests to various institutions to publish their private keys. Data users can decrypt the ciphertext only when their private keys meet the access policy.
4.2. Scheme Design
The overall scheme, as depicted in Figure 1, comprises five stages: initialization setup (Setup), attribute authority setup (AASetup), key generation (KenGen), encryption, and decryption. Then, a detailed description of each stage is provided as follows.
4.2.1. Setup
A trusted key generation center (KGC) inputs security parameter during the initialization phase. A polynomial is selected, and the public parameter is outputted. Assuming that the number of authorization agencies is represented as , the set of authorization agencies is described as , where . KGC uniformly selects the polynomial of degree N − 1, where , . During the process of selecting polynomial , KGC signs named as and obtains . KGC obtains temporary private key through a random number generator and then calculates temporary public key . And the signature of KGC is generated as . Users obtain the temporary private key through a random number generator and then calculate temporary public key . When users choose , where is a weight of permission, they digitally sign the relevant information , where . Before transmitting and to the corresponding authority , the temporary public key and are transformed through a secure channel.
4.2.2. AASetup
first runs the RTrapGen algorithm that can output a pair of parameters , where , and , . If represents the attribute set managed by , for each attribute , is uniformly selected from at random. The affiliation relationship of the attribute (shared attribute or non-shared attribute set) is determined, i.e., . The determination formula is the following Equation (2).
(2)
The three cases are obtained as follows: (a) the elements in the attribute set belong to the access structure , i.e., . (b) The elements in the attribute set do not belong to the access structure , i.e., . (c) The elements in the attribute set are not allowed to access structure . Then, selects . For each , there is , where . It is worth noting that for all , , , and , they are linearly distributed on . Thus, the public key and private key for are derived, respectively, as and .
4.2.3. KenGen
For each attribute of authority , where , the authority randomly selects vectors from . Then, by computing polynomial , it obtains vector . This process is aimed at generating polynomial values associated with the attributes of authority . For , , , the authority calculates the difference vector based on the judgments in AASetup and runs the RSamplePre algorithm to obtain . This step is intended to generate encrypted vectors of user attribute values based on the specified distribution to enhance the security of the keys. As a result, the authority includes the output vector as part of the private key, i.e., , where .
4.2.4. Encryption
The user receives public keys provided by the authority , where θ() includes the access structure denoted as . And attribute assignments relate to each authority. The user constructs the overall access structure . These attributes are merged when constructing the access structure, denoted as . The plaintext message is represented as , in which it is expressed as a polynomial . The user selects an attribute vector and , where is a shared secret and . Then, random error term is selected from the same Gaussian distribution . The ciphertext is computed, where is a constant, is the shared secret, quantifies the plaintext, and is a large prime. Random samples from are then encrypted to obtain by . There are three kinds of correspondence between the user and the authority’s attributes. Accordingly, three different encryption schemes are accomplished.
(1). The two samples and constitute confusion factors and accordingly, where and .
(2). The two samples and constitute confusion factors and accordingly.
(3). Sample and sample . For attribute , there is , and attribute , there is , as well as the standard item ; the form of the ciphertext is denoted as .
4.2.5. Decryption
Taking a set of scalars , there is , where represents the -th row of matrix . LLL is performed on the shared matrix that replaced the LSSS of [5], where is transformed into the set of shortest vectors (SVP) through basis transformation. If vector is true, where , it indicates that there exists a shortest vector after the LLL operation. And decryption will be successful. That is, each authority calculates . According to the correspondence between user attributes and the attributes authorized by the authority, and are computed as below:
(1). When is true, compute , .
(2). For other , compute , .
(3). When is true, compute , , .
Finally, the ciphertext parts are combined to obtain the final plaintext message , where is a Lagrange polynomial. At this point, for each , it is necessary to determine whether the Lagrange interpolation polynomial holds. If true, is outputted; otherwise, is outputted. This process converts the real value obtained from interpolation into binary values. The basic idea of this method is as follows. A threshold is chosen. By comparing the threshold with the magnitude of , the binary information of is determined that can effectively extract useful plaintext information from noise.
5. Secure Analysis and Performance Verification
In this section, the correctness is defined firstly from the view of probability of correctly recovered plaintext. Meanwhile, parameters are selected to ensure the correctness. Then, the secure proposed scheme is analyzed and the performance is verified.
5.1. Correctness and Parameter Selection
For all , the receiving party who held the attributes is considered secure if it satisfies the following two conditions: . That is, the receiving party has sufficient attributes to meet the access policy of . Meanwhile, no excess attributes intersect with . For ensuring the generation of a vector satisfying a specific distribution to enhance security, we perform the following calculation described as Equation (3).
(3)
In summary, the plaintext is computed as Equation (4), which can ensure the precision of the scheme.
(4)
The error term must be constrained that can ensure the correct decryption. According to security constraints and parameter selection, the probability of the correct decryption depends on the norm of the private key generated by the Gaussian preimage sampling algorithm and the error term introduced during encryption. As stated in Section 4.1, they are set to 2 and 3, respectively.
Let the upper limit of and be and , respectively. The central limit theorem estimates the noise factor as , and parameters , are set based on the literature [19]. Therefore, the correctness constraint is .
5.2. Security Analysis
The proposed scheme relies on assumptions made in the security model to analyze the mainstream attacks that may be faced in modern networks, traditional number theory cryptography, and quantum cryptography.
Replay Attack: In the setup stage, KGC selects a polynomial when using random and conducts a random selection for both and at each authority . Even if the same user or organization performs the same operation again, it will obtain a different value. Therefore, the proposed scheme effectively prevents replay attacks.
Man-in-the-Middle Attack: In the setup stage, KGC introduces a digital signature during the uniform random selection process of polynomial . KGC signs each authority with a hash function and sends the signature and together. Users also need to generate their digital signatures to prove their identity. During the user’s selection of , they combine a temporary public key with their ID as their identity, sign identity, and integrate the signature with before sending it. Upon receiving the integrated data, the recipient performs corresponding verification calculations, such as the function, to verify authenticity. If both identity authenticity and data integrity pass verification, this indicates no man-in-the-middle attack.
Temporary Secret Leakage Attack: In defining the n-dimensional Gaussian function on lattice , noise is introduced at each point. For example, when selecting parameter , a more significant parameter results in a smoother Gaussian function. A smooth Gaussian function helps improve the quality of noise. In the exponential function, the multiple different values involved in the calculation of result in noise. This noise interferes with adversaries when they attempt to analyze the trapdoor, meaning that the difficulty of temporary secret leakage is increased. Additionally, since the generation of ciphertext use multiple parameters and multi-party computation, such as , , , , , and , in which each calculation is independent, temporary secret leakage of one user will not affect others. In other words, even if the ciphertext of one user is leaked, the ciphertext of other users should still be secure.
Side-Channel Attack: In the RTrapGen algorithm, parameter is introduced and generated through a Gaussian distribution, so the generated threshold is random that can increase the difficulty for adversaries in analyzing the trapdoor. Adversaries cannot know the exact value of the trapdoor in advance. Furthermore, since the security of the algorithm relies on the assumption of RLWEs, it is difficult for adversaries to infer partial ciphertext from the encrypted trapdoor. The difficulty of the RLWEs problem is based on a theoretical mathematical problem that adversaries solve hardly within a finite time. Overall, the proposed scheme effectively prevents side-channel attacks.
The performance of the scheme is compared with those of other CP-ABE schemes. Through analysis of the number of authorities, system architecture, security, efficiency, and privacy protection, it is found that the proposed scheme outperforms the compared schemes in these aspects, as shown in Table 2.
The resistance to attacks is compared with references [5,8,10,13,20] in Table 3, which demonstrates their capabilities of addressing mainstream attacks in today’s network, traditional number theory cryptography, and quantum cryptography fields.
5.3. Performance Analysis
We rely on the Ubuntu 20.04.6 LTS platform 12th Gen Intel® Core™ i7-12700H × 12 64 bit version using Python 3.10 to simulate the proposed scheme. The experiment consists of five stages: (a) setup; (b) AASetup; (c) KeyGen; (d) encryption; (e) decryption. As shown in Figure 2, different user attributes are set to reflect the time expenditure of each stage.
As shown in Figure 3 and Table 4, compared with Prithwi et al. [5], the time gap between the two parties becomes more prominent as the number of user attributes increases, especially during the encryption and decryption processes. This further highlights the robustness of the proposed scheme in this paper. In Table 4, the computational costs of the various literature are compared, which leads to the conclusion that our protocol has more advantages. All experimental results represent the average time that the scheme run 20 times.
6. Summary
In this paper, an enhanced lattice-based post-quantum multi-authority CP-ABE and identity authentication scheme is presented based on the RLWEs problem. The deterministic standard deviation parameters in Gaussian sampling are adopted to improve algorithm efficiency compared with the original scheme. The scheme performance is optimized by judging different attribute sets, and the LLL algorithm resolves a set of scalar problems in linear algebra to reduce the computational cost of linear space checks. Due to the scheme support for multi-authority authorization, multi-authority authorization can be considered a distributed decentralized system. Compared with existing lattice-based CP-ABE algorithms, our improved scheme demonstrates higher efficiency.
Methodology, Q.Y. and H.Y.; writing—review and editing, H.Y., Q.Y., M.Z., J.Z., Y.W., S.Z. and Y.S. All authors have read and agreed to the published version of the manuscript.
Not applicable.
Data are contained within the article.
The authors declare no conflicts of interest.
Footnotes
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.
Symbol meanings.
Symbol | Description |
---|---|
KGC | trusted key generation center |
| large prime number |
| total number of attributes in the system |
| total number of attributes in the access policy |
| number of attributes satisfying the access policy |
| total number of authorities |
| degree of irreducible polynomial over a field of characteristic 2 |
| generator(s) of group G |
| random large prime number(s) in number theory |
| belongs to a positive integer |
| Type |
| positive integer form |
| the public key portion used to generate |
| the private key portion used to generate |
Performance comparisons.
Scheme | Number of Authorities | Organization | Security | Efficiency | Privacy Protection |
---|---|---|---|---|---|
Reference [ | Multi-authority | Distributed | High | High | High |
Reference [ | Single | Centralized | General | LOW | LOW |
Reference [ | Multi-authority | Distributed | General | General | General |
Reference [ | Multi-authority | Distributed | High | General | High |
Reference [ | Multi-authority | Distributed | General | High | General |
This article | Multi-authority | Distributed | Higher | Higher | Higher |
Resistance to attacks. (√ represents yes, × represents no).
Scheme | Replay Attack | Man-in-the-Middle Attack | Temporary Secret Leakage Attack | Signal Leakage Attack |
---|---|---|---|---|
Reference [ | √ | × | √ | √ |
Reference [ | √ | √ | × | × |
Reference [ | √ | √ | √ | × |
Reference [ | √ | √ | √ | × |
Reference [ | √ | √ | √ | × |
This article | √ | √ | √ | √ |
Comparison of time costs for each proposal.
Scheme | Encryption Time Complexity | Decryption Time Complexity | Key Generation Time Complexity |
---|---|---|---|
Reference [ | | | |
Reference [ | | | |
Reference [ | | | |
Reference [ | | | |
Reference [ | | | |
This article | | | |
References
1. Ajtai, M. Generating hard instances of lattice problems. Proceedings of the Twenty-Eighth Annual ACM Symposium on Theory of Computing; Philadelphia, PA, USA, 22–24 May 1996; pp. 99-108.
2. Dharminder, D.; Reddy, C.B.; Das, A.K.; Park, Y.; Jamal, S.S. Post-Quantum Lattice-Based Secure Reconciliation Enabled Key Agreement Protocol for IoT. IEEE Internet Things J.; 2023; 10, pp. 2680-2692. [DOI: https://dx.doi.org/10.1109/JIOT.2022.3213990]
3. Guo, J.H.; Bai, M.Q.; Lei, X.Y.; Xie, J.X.; Mo, Z.W. Improved quantum key agreement protocol with authentication. Chin. Phys. B; 2023; 32, 050310. [DOI: https://dx.doi.org/10.1088/1674-1056/ac9b31]
4. Gür, K.D.; Polyakov, Y.; Rohloff, K.; Ryan, G.W.; Sajjadpour, H.; Savaş, E. Practical applications of improved gaussian sampling for trapdoor lattices. IEEE Trans. Comput.; 2019; 68, pp. 570-584. [DOI: https://dx.doi.org/10.1109/TC.2018.2874479]
5. Bagchi, P.; Bera, B.; Maheshwari, R.; Das, A.K.; Yau, D.K.Y.; Sikdar, B. An Efficient and Secure Post-Quantum Multi-Authority Ciphertext-Policy Attribute-Based Encryption Method Using Lattice. Proceedings of the IEEE INFOCOM 2023-IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS); Hoboken, NJ, USA, 20–20 May 2023; pp. 1-6. [DOI: https://dx.doi.org/10.1109/INFOCOMWKSHPS57453.2023.10225757]
6. Zhang, L.; Gao, X.; Guo, F.; Hu, G. Improving the Leakage Rate of Ciphertext-Policy Attribute-Based Encryption for Cloud Computing. IEEE Access; 2020; 8, pp. 94033-94042. [DOI: https://dx.doi.org/10.1109/ACCESS.2020.2995480]
7. Huang, J.J.; Tseng, Y.F.; Yang, Q.L.; Fan, C.I. A Lattice-Based Group Authentication Scheme. Appl. Sci.; 2018; 8, 987. [DOI: https://dx.doi.org/10.3390/app8060987]
8. Akleylek, S.; Soysaldı, M. A new lattice-based authentication scheme for IoT. J. Inf. Secur. Appl.; 2022; 64, 103053. [DOI: https://dx.doi.org/10.1016/j.jisa.2021.103053]
9. Fu, X.; Wang, Y.; You, L.; Ning, J.; Hu, Z.; Li, F. Offline/Online lattice-based ciphertext policy attribute-based encryption. J. Syst. Archit.; 2022; 130, 102684. [DOI: https://dx.doi.org/10.1016/j.sysarc.2022.102684]
10. Zhao, S.; Jiang, R.; Bhargava, B. RL-ABE: A Revocable Lattice Attribute Based Encryption Scheme Based on R-LWE Problem in Cloud Storage. IEEE Trans. Serv. Comput.; 2022; 15, pp. 1026-1035. [DOI: https://dx.doi.org/10.1109/TSC.2020.2973256]
11. Bert, P.; Eberhart, G.; Prabel, L.; Roux-Langlois, A.; Sabt, M. Implementation of Lattice Trapdoors on Modules and Applications. Post-Quantum Cryptography: 12th International Workshop, PQCrypto 2021, Daejeon, South Korea, 20–22 July 2021; Springer International Publishing: Cham, Switzerland, 2021; pp. 195-214.
12. El Bansarkhani, R.; Buchmann, J. Improvement and Efficient Implementation of a Lattice-Based Signature Scheme. Selected Areas in Cryptography—SAC 2013: 20th International Conference, Burnaby, BC, Canada, 14–16 August 2013; Springer: Berlin/Heidelberg, Germany, 2014; pp. 48-67.
13. Yang, Y.; Sun, J.; Liu, Z.; Qiao, Y. Practical revocable and multi-authority CP-ABE scheme from RLWE for Cloud Computing. J. Inf. Secur. Appl.; 2022; 65, pp. 103-108. [DOI: https://dx.doi.org/10.1016/j.jisa.2022.103108]
14. Shahidinejad, A.; Abawajy, J. Decentralized Lattice-Based Device-to-Device Authentication for the Edge-Enabled IoT. IEEE Syst. J.; 2023; 17, pp. 6623-6633. [DOI: https://dx.doi.org/10.1109/JSYST.2023.3319280]
15. Jose, A.C.; Malekian, R. Improving Smart Home Security: Integrating Logical Sensing Into Smart Home. IEEE Sensors J.; 2017; 17, pp. 4269-4286. [DOI: https://dx.doi.org/10.1109/JSEN.2017.2705045]
16. Patil, K.A.; Kale, N.R. A model for smart agriculture using IoT. Proceedings of the International Conference on Global Trends in Signal Processing, Information Computing and Communication (ICGTSPICC); Jalgaon, India, 22–24 December 2016; pp. 543-545.
17. Chaudhary, R.; Jindal, A.; Aujla, G.S.; Kumar, N.; Das, A.K.; Saxena, N. LSCSH: Lattice-Based Secure Cryptosystem for Smart Healthcare in Smart Cities Environment. IEEE Commun. Mag.; 2018; 56, pp. 24-32. [DOI: https://dx.doi.org/10.1109/MCOM.2018.1700787]
18. Rosca, M.; Stehle, D.; Wallet, A. On the Ring-LWE and Polynomial-LWE Problems. Annual International Conference on the Theory and Applications of Cryptographic Techniques; Springer International Publishing: Cham, Switzerland, 2018; pp. 146-173.
19. Howe, J.; Khalid, A.; Rafferty, C.; Regazzoni, F.; O’Neill, M. On Practical Discrete Gaussian Samplers for Lattice-Based Cryptography. IEEE Trans. Comput.; 2018; 67, pp. 322-334. [DOI: https://dx.doi.org/10.1109/TC.2016.2642962]
20. Sun, J.; Qiao, Y.; Liu, Z.; Chen, Y.; Yang, Y. Practical Multi-Authority Ciphertext Policy Attribute-Based Encryption from R-LWE. Proceedings of the IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking; New York, NY, USA, 30 September–3 October 2021; pp. 1435-1443.
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
Abstract
In recent years, research on attribute-based encryption (ABE) has expanded into the quantum domain. Because a traditional single authority can cause the potential single point of failure, an improved lattice-based quantum-resistant identity authentication and policy attribute encryption scheme is proposed, in which the generation of random values is optimized by adjusting parameters in the Gaussian sampling algorithm to improve overall performance. Additionally, in the key generation phase, attributes are processed according to their shared nature, which reduces the computational overhead of the authorization authority. In the decryption phase, the basis transformation of the Lenstra–Lenstra–Lovász (LLL) lattice reduction algorithm is utilized to rapidly convert shared matrices into the shortest vector form, which can reduce the computational cost of linear space checks. The experimental results demonstrate that the proposed method not only improves efficiency but also enhances security compared with related schemes.
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer
Details
1 Faculty of Communication and Electronic Engineering, Qiqihar University, Qiqihar 161000, China;
2 State Grid Information Communication Branch, Beijing 100032, China;
3 Network Information Center, Qiqihar University, Qiqihar 161006, China;