Journal of Information Security Reserach ›› 2024, Vol. 10 ›› Issue (4): 318-.

Previous Articles     Next Articles

Research on the Latticebased Access Control Encryption Technology

Tan Gaosheng1, Li Wei1, Ma Jingjing2, Wang Weizhong3, Xing Jianhua1, and Ma Mingjie1#br#

#br#
  

  1. 1(Beijing Jinghang Computation and Communication Research Institute, Beijing 100074)
    2(Systems Engineering Institute, Academy of Military Sciences, Beijing 100101)
    3(China Academy of Industrial Internet, Beijing 100102)

  • Online:2024-04-20 Published:2024-04-21

基于格的访问控制加密技术研究

谭高升1李伟1马静静2王伟忠3邢建华1马明杰1


  

  1. 1(北京京航计算通讯研究所北京100074)
    2(军事科学院系统工程研究院北京100101)
    3(中国工业互联网研究院北京100102)

  • 通讯作者: 王伟忠 博士,高级工程师.主要研究方向为工业互联网安全、车联网安全、密码应用技术. wangweizhong@chinaaii.com
  • 作者简介:谭高升 博士,工程师.主要研究方向为信息安全、网络安全. tan201391@163.com 李伟 博士,高级工程师.主要研究方向为密码学、工控安全技术. weili304@126.com 马静静 博士,助理研究员.主要研究方向为算法设计、人工智能. mjjdha@163.com 王伟忠 博士,高级工程师.主要研究方向为工业互联网安全、车联网安全、密码应用技术. wangweizhong@chinaaii.com 邢建华 硕士,工程师.主要研究方向为信息安全. 13260280856@163.com 马明杰 博士,工程师.主要研究方向为信息安全、网络安全. xiexiethankyou@163.com

Abstract: Access Control Encryption is a novel publickey encryption concept. It can not only protect the confidentiality of data, but also realize the control of information direction. The early scheme based on the DDH (decisional DiffieHellman) assumption suffers from the ciphertext leakage attack and only satisfies the chosen plaintext attack (CPA) security. For such problems, cryptologists proposed a security definition of the chosen ciphertext attack (CCA) and constructed a CCA security scheme based on NaorYung construction strategy. However, cryptologists have not fixed the security flaw of the DDH scheme, and their CCA scheme has shortcomings such as the low efficiency, complex construction and limited communication strategy. In this paper, the DDH scheme is designed generically, and the flaw of the DDH scheme subjected to the ciphertext leakage attack is remedied in an efficient way. Furthermore, a CCA secure access control encryption scheme is constructed, which is efficient, simple in design and based on the standard difficulty assumption. Finally, based on the lattice difficulty assumption and the decisional bilinear DiffieHellman (DBDH) assumption respectively, two kinds of CCA security schemes are instantiated.

Key words: access control encryption, CCA security, efficient, lattice, standard assumption

摘要: 访问控制加密(access control encryption, ACE)是一种新颖的公钥加密概念,不仅可以保护数据的机密性,还实现了信息流向的控制.早期基于DDH(decisional DiffieHellman)假设的方案(DDH方案)存在密文泄露攻击且仅满足选择明文攻击(chosen plaintext attack, CPA)安全,针对此类问题,密码学家提出了访问控制加密选择密文攻击(chosen ciphertext attack, CCA)安全性定义,并基于NaorYung的构造策略构造了CCA安全的方案.但密码学家未修补DDH方案的安全瑕疵,且其CCA方案存在效率较低、构造复杂、通信策略受限等不足.将DDH方案进行了通用化设计,并以高效的方式修补了DDH方案遭受密文攻击的瑕疵,进一步,构造了CCA安全的访问控制加密方案,具有高效、设计简单、基于标准困难性假设的特点.最后,分别基于格上困难性假设和判定性双线性DiffieHellman(decisional binlinear DiffieHellman, DBDH)假设,给出了2种CCA安全方案的实例化设计.

关键词: 访问控制加密, CCA安全性, 高效, 格, 标准假设

CLC Number: