Decentralized Ciphertext-Policy Attribute-Based Encryption:

A Post-Quantum Construction

Mohammad Shahriar Rahman
1+, Anirban Basu2, and Shinsaku Kiyomoto2
 

1University of Asia Pacific, Dhaka, Bangladesh

shahriar.rahman@uap-bd.edu

 

2KDDI Research, Inc., Saitama, Japan

{basu, kiyomoto}@kddi-research.jp

 

Abstract

In Ciphertext Policy Attribute-Based Encryption (CP-ABE) system, a set of attributes is associated with the private keys of each user. Also, the ciphertext is attached with a policy which is defined over that set of attributes. A user can decrypt the ciphertext if the ciphertext’s policy is satisfied by the attributes associated hith her private key. Traditional CP-ABE schemes, based on number theoretic problems, rely on a trustworthy central authority. But in many distributed applications it is expected that such authorities should be decentralized to avoid the risks of single-point failure. While the number theory-based hardness problems are prone to quantum attacks, lattice-based hardness problems can resist such attacks. In this paper, we construct a Decentralized Ciphertext-Policy Attribute-Based Encryption (DCP-ABE) scheme. Under this scheme, any participating entity can act as an authority by creating a public key. The athority utilizes the users’ attributes to generate the private keys for them. Any user can encrypt data in terms of any monotone access structure over attributes issued from any chosen set of authorities. Hence the protocol does not depend on any central authority. We utilize Learning With Errors over Rings (R-LWE) as the underlying hardness assumption for te protocol. The proposed post-quantum protocol achieves security under selective-set model whereby adversaries are allowed to corrupt any authority only statically through adaptive key queries.

Keywords: Security, CP-ABE, Decentralized, Lattice

 

+: Corresponding author: Mohammad Shahriar Rahman

Department of Computer Science and Enginering, University of Asia Pacific, Dhaka 1215, Bangladesh.

Tel: +8802-58157091(Ext. 707), Web: https://sites.google.com/site/msrahman1662

 

Journal of Internet Services and Information Security (JISIS), 7(3): 1-16, August 2017 [pdf]    

DOI: 10.22667/JISIS.2017.08.31.001