TY - JOUR
T1 - Bounded-collusion decentralized ABE with sublinear parameters
AU - Zhao, Jun
AU - Yang, Minghao
AU - Gong, Junqing
AU - Zhang, Kai
AU - Qian, Haifeng
N1 - Publisher Copyright:
© 2023 Elsevier B.V.
PY - 2023/6/7
Y1 - 2023/6/7
N2 - In this paper, we propose a decentralized ABE scheme against bounded collusion which means the number of users in the system is a-prior bounded. The scheme enjoys public key and ciphertext of sublinear sizes in the number of users in the system while all prior constructions require linear sizes. Besides, our scheme achieves semi-adaptive security under bilateral k-Lin assumption and SXDH assumption in a pairing group. Keep the same as the previous constructions, the scheme supports monotone span program as a policy and does not rely on the random oracle. Technically, we follow Wang et al.'s “linear secret sharing scheme (LSSS) + inner-product functional encryption (IPFE)” paradigm [PKC'19] and use (an extended variant of) functional encryption for quadratic functions (QFE) in the place of IPFE. By this, we encrypt with sublinear-size random coins and later expand them to linear-size entropy for security proof. Roughly, the use of QFE requires bilateral k-Lin assumption while the entropy expansion relies on SXDH.
AB - In this paper, we propose a decentralized ABE scheme against bounded collusion which means the number of users in the system is a-prior bounded. The scheme enjoys public key and ciphertext of sublinear sizes in the number of users in the system while all prior constructions require linear sizes. Besides, our scheme achieves semi-adaptive security under bilateral k-Lin assumption and SXDH assumption in a pairing group. Keep the same as the previous constructions, the scheme supports monotone span program as a policy and does not rely on the random oracle. Technically, we follow Wang et al.'s “linear secret sharing scheme (LSSS) + inner-product functional encryption (IPFE)” paradigm [PKC'19] and use (an extended variant of) functional encryption for quadratic functions (QFE) in the place of IPFE. By this, we encrypt with sublinear-size random coins and later expand them to linear-size entropy for security proof. Roughly, the use of QFE requires bilateral k-Lin assumption while the entropy expansion relies on SXDH.
KW - Attribute-based encryption
KW - Efficiency
KW - Functional encryption
KW - Multi-authority system
UR - https://www.scopus.com/pages/publications/85156100020
U2 - 10.1016/j.tcs.2023.113897
DO - 10.1016/j.tcs.2023.113897
M3 - 文章
AN - SCOPUS:85156100020
SN - 0304-3975
VL - 960
JO - Theoretical Computer Science
JF - Theoretical Computer Science
M1 - 113897
ER -