Quantum Resistant Ciphertext-Policy Attribute-Based Encryption Scheme with Flexible Access Structure

Shida Shamsazad
2024-01-25
Abstract:In this paper, we present a novel ciphertext-policy attribute based encryption (CP-ABE) scheme that offers a flexible access structure. Our proposed scheme incorporates an access tree as its access control policy, enabling fine-grained access control over encrypted data. The security of our scheme is provable under the hardness assumption of the decisional Ring-Learning with Errors (R-LWE) problem, ensuring robust protection against unauthorized access. CP-ABE is a cryptographic technique that allows data owners to encrypt their data with access policies defined in terms of attributes. Only users possessing the required attributes can decrypt and access the encrypted data. Our scheme extends the capabilities of CP-ABE by introducing a flexible access structure based on an access tree. This structure enables more complex and customizable access policies, accommodating a wider range of real-world scenarios. To ensure the security of our scheme, we rely on the decisional R-LWE problem, a well-established hardness assumption in cryptography. By proving the security of our scheme under this assumption, we provide a strong guarantee of protection against potential attacks. Furthermore, our proposed scheme operates in the standard model, which means it does not rely on any additional assumptions or idealized cryptographic primitives. This enhances the practicality and applicability of our scheme, making it suitable for real-world deployment. We evaluate the performance and efficiency of our scheme through extensive simulations and comparisons with existing CP-ABE schemes. The results demonstrate the effectiveness and scalability of our proposed approach, highlighting its potential for secure and flexible data access control in various domains.
Cryptography and Security
What problem does this paper attempt to address?
The main problem that this paper attempts to solve is to design a Ciphertext - Policy Attribute - Based Encryption (CP - ABE) scheme resistant to quantum attacks based on the Learning with Errors (LWE) problem, in order to provide flexible and secure data access control. Specifically, this scheme introduces access trees as access control policies, thus supporting more complex and customizable access policies. ### Main Objectives 1. **Resistance to Quantum Attacks**: With the development of quantum computing technology, the security of classical encryption methods has been seriously threatened. This paper aims to ensure that the proposed CP - ABE scheme remains secure in the face of quantum computers by using the LWE problem. 2. **Flexible Access Structure**: Traditional CP - ABE schemes usually only support simple access policies (such as AND - gate or threshold policies) and cannot meet the complex and changeable requirements in practical applications. This scheme achieves more flexible and complex access control by introducing access trees. 3. **Efficiency and Practicality**: In order to ensure the feasibility and efficiency of the scheme in practical applications, the author has carried out extensive simulations and performance evaluations on this scheme and compared it with existing CP - ABE schemes, proving its effectiveness and scalability. ### Core Innovation Points - **Security Based on R - LWE**: The security of this scheme is based on the Decisional Ring - Learning with Errors (R - LWE), which is considered a difficult problem in both classical and quantum computing environments. - **Access Tree Structure**: The introduction of access trees as access control policies enables data owners to define more complex and flexible access rules and adapt to various real - world scenarios. - **Security Proof in the Standard Model**: This scheme conducts security proof in the standard model without relying on any additional assumptions or idealized cryptographic primitives, enhancing its practicality and applicability. ### Conclusion This paper proposes a new CP - ABE scheme, which combines the security against quantum attacks and a flexible access structure, and is suitable for various application scenarios requiring fine - grained access control. Through strict theoretical analysis and experimental verification, the superiority of this scheme in terms of security and efficiency has been proven.