EconPapers    
Economics at your fingertips  
 

Revocable-Attribute-Based Encryption with En-DKER from Lattices

Qi Wang, Juyan Li, Zhedong Wang and Yanfeng Zhu ()
Additional contact information
Qi Wang: College of Data Science and Technology, Heilongjiang University, Harbin 150080, China
Juyan Li: College of Data Science and Technology, Heilongjiang University, Harbin 150080, China
Zhedong Wang: School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Shanghai 200240, China
Yanfeng Zhu: College of Data Science and Technology, Heilongjiang University, Harbin 150080, China

Mathematics, 2023, vol. 11, issue 24, 1-17

Abstract: Cloud computing offers abundant computing resources and scalable storage, but data leakage in the cloud storage environment is a common and critical concern due to inadequate protection measures. Revocable-attribute-based encryption (RABE) is introduced as an advanced form of identity-based encryption (IBE), which encrypts sensitive data while providing fine-grained access control and an effective user revocation mechanism. However, most existing RABE schemes are not resistant to quantum attacks and are limited in their application scenarios due to the revocation model. In this paper, we propose a RABE scheme constructed from lattices. Our scheme has several advantages, including a near-zero periodic workload for the key generation center (KGC), ensuring scalability as the number of users increases. Additionally, the encryptor is relieved from managing a revocation list. Moreover, our scheme guarantees the confidentiality and privacy of other ciphertexts even if the decryption key for a specific period is compromised. We validated the correctness of our scheme and demonstrated its security under the assumption of learning with errors (LWE), which is widely believed to be resistant to quantum attacks. Finally, we provide an application example of our RABE scheme in the electronic healthcare scenario.

Keywords: revocable-attribute-based encryption; enhanced decryption key exposure; lattice-based cryptography (search for similar items in EconPapers)
JEL-codes: C (search for similar items in EconPapers)
Date: 2023
References: View complete reference list from CitEc
Citations:

Downloads: (external link)
https://www.mdpi.com/2227-7390/11/24/4986/pdf (application/pdf)
https://www.mdpi.com/2227-7390/11/24/4986/ (text/html)

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:gam:jmathe:v:11:y:2023:i:24:p:4986-:d:1301918

Access Statistics for this article

Mathematics is currently edited by Ms. Emma He

More articles in Mathematics from MDPI
Bibliographic data for series maintained by MDPI Indexing Manager ().

 
Page updated 2025-03-19
Handle: RePEc:gam:jmathe:v:11:y:2023:i:24:p:4986-:d:1301918