Log in

Designing quantum-secure attribute-based encryption

  • Published:
Cluster Computing Aims and scope Submit manuscript

Abstract

In the last couple of decades, Attribute-Based Encryption (ABE) has been a promising encryption technique to realize fine-grained access control over encrypted data. ABE has appealing functionalities such as (i) access control through encryption and (ii) encrypting a message to a group of recipients without knowing their actual identities. However, the existing state-of-the-art ABEs are based on number-theoretic hardness assumptions. These designs are not secure against attacks by quantum algorithms such as Shor algorithm. Moreover, existing Post-Quantum Cryptography (PQC)-based ABEs fail to provide long-term security. Therefore, there is a need for quantum secure ABE that can withstand quantum attacks and provides long-term security. In this work, for the first time, we introduce the notion of a quantum-secure ABE (qABE) framework that preserves the classical ABE’s functionalities and resists quantum attacks. Next, we provide a generic construction of qABE which is able to transform any existing ABE into qABE scheme. Thereafter, we illustrate a concrete construction of a quantum ABE based on our generic transformation qABE and the Waters’ ciphertext-policy ABE scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price includes VAT (France)

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

Data availability statement

Data sharing is not applicable to this article as no new data were generated or analyzed to support this research.

Notes

  1. In the semi-honest security model [43], an adversary follows the protocol correctly but they may try to obtain some additional information by analyzing the transmitted information that are obtained during the execution of the protocol.

References

  1. Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Advances in Cryptology—EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22–26, 2005. Proceedings 24, pp. 457–473. Springer, Berlin (2005)

  2. Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: 2007 IEEE Symposium on Security and Privacy (SP’07), pp. 321–334. IEEE, Berkeley, CA, USA (2007)

  3. Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 89–98. Association for Computing Machinery, Alexandria, Virginia, USA (2006)

  4. Ezhilarasi, T., Sudheer Kumar, N., Latchoumi, T., Balayesu, N.: A secure data sharing using IDSS CP-ABE in cloud storage. In: Advances in Industrial Automation and Smart Manufacturing: Select Proceedings of ICAIASM 2019, pp. 1073–1085. Springer, Berlin (2021)

  5. Banerjee, S., Roy, S., Odelu, V., Das, A.K., Chattopadhyay, S., Rodrigues, J.J., Park, Y.: Multi-authority CP-ABE-based user access control scheme with constant-size key and ciphertext for IoT deployment. J. Inf. Secur. Appl. 53, 102503 (2020)

    Google Scholar 

  6. Ma, J., Wang, M., **ong, J., Hu, Y.: CP-ABE-based secure and verifiable data deletion in cloud. Secur. Commun. Netw. 2021, 1–14 (2021)

    Google Scholar 

  7. Guo, R., Yang, G., Shi, H., Zhang, Y., Zheng, D.: O\(^{3}\)-R-CP-ABE: an efficient and revocable attribute-based encryption scheme in the cloud-assisted IoMT system. IEEE Internet Things J. 8(11), 8949–8963 (2021)

    Article  Google Scholar 

  8. Das, S., Namasudra, S.: Multiauthority CP-ABE-based access control model for IoT-enabled healthcare infrastructure. IEEE Trans. Ind. Inform. 19(1), 821–829 (2022)

    Article  Google Scholar 

  9. Wang, S., Wang, H., Li, J., Wang, H., Chaudhry, J., Alazab, M., Song, H.: A fast CP-ABE system for cyber-physical security and privacy in mobile healthcare network. IEEE Trans. Ind. Appl. 56(4), 4467–4477 (2020)

    Google Scholar 

  10. Chen, N., Li, J., Zhang, Y., Guo, Y.: Efficient CP-ABE scheme with shared decryption in cloud storage. IEEE Trans. Comput. 71(1), 175–184 (2020)

    Article  Google Scholar 

  11. Banerjee, S., Bera, B., Das, A.K., Chattopadhyay, S., Khan, M.K., Rodrigues, J.J.: Private blockchain-envisioned multi-authority CP-ABE-based user access control scheme in IIoT. Comput. Commun. 169, 99–113 (2021)

    Article  Google Scholar 

  12. **e, M., Ruan, Y., Hong, H., Shao, J.: A CP-ABE scheme based on multi-authority in hybrid clouds for mobile devices. Future Gener. Comput. Syst. 121, 114–122 (2021)

    Article  Google Scholar 

  13. Sethi, K., Pradhan, A., Bera, P.: Practical traceable multi-authority CP-ABE with outsourcing decryption and access policy updation. J. Inf. Secur. Appl. 51, 102435 (2020)

    Google Scholar 

  14. Rao, Y.S., Dutta, R.: Computational friendly attribute-based encryptions with short ciphertext. Theor. Comput. Sci. 668, 1–26 (2017)

    Article  MathSciNet  Google Scholar 

  15. Rao, Y.S.: A secure and efficient ciphertext-policy attribute-based signcryption for personal health records sharing in cloud computing. Future Gener. Comput. Syst. 67, 133–151 (2017)

    Article  Google Scholar 

  16. Chen, L., Chen, L., Jordan, S., Liu, Y.-K., Moody, D., Peralta, R., Perlner, R.A., Smith-Tone, D.: Report on Post-quantum Cryptography, vol. 12. US Department of Commerce, National Institute of Standards and Technology (2016)

  17. Shor, P.W.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Rev. 41(2), 303–332 (1999)

    Article  MathSciNet  Google Scholar 

  18. Institute, E.T.S.: ETSI EG 203 310 V1.0.0 (2016-04): CYBER Post Quantum Computing Impact on ICT Systems: Recommendations on Business Continuity and Algorithm Selection. https://www.etsi.org/deliver/etsi_eg/203300_203399/203310/01.00.00_50/eg_203310v010000m.pdf (2016). Online. Accessed 29 Jan 2024

  19. Buchmann, J., May, A., Vollmer, U.: Perspectives for cryptographic long-term security. Commun. ACM 49(9), 50–55 (2006)

    Article  Google Scholar 

  20. Hesse, J., Hofheinz, D., Rupp, A.: Reconfigurable cryptography: a flexible approach to long-term security. In: Theory of Cryptography Conference, pp. 416–445. Springer, Berlin (2015)

  21. Kretschmer, W., Qian, L., Sinha, M., Tal, A.: Quantum cryptography in algorithmica. In: Proceedings of the 55th Annual ACM Symposium on Theory of Computing, pp. 1589–1602. Association for Computing Machinery, Orlando, FL, USA (2023)

  22. Wu, F., Zhou, B., Zhang, X.: Identity-based proxy signature with message recovery over NTRU lattice. Entropy 25(3), 454 (2023)

    Article  MathSciNet  Google Scholar 

  23. Dam, D.-T., Tran, T.-H., Hoang, V.-P., Pham, C.-K., Hoang, T.-T.: A survey of post-quantum cryptography: start of a new race. Cryptography 7(3), 40 (2023)

    Article  Google Scholar 

  24. Weger, V., Gassner, N., Rosenthal, J.: A survey on code-based cryptography (2022). ar**v preprint. ar**v:2201.07119

  25. Ravi, P., Howe, J., Chattopadhyay, A., Bhasin, S.: Lattice-based key-sharing schemes: a survey. ACM Comput. Surv. (CSUR) 54(1), 1–39 (2021)

    Article  Google Scholar 

  26. Srivastava, V., Baksi, A., Debnath, S.K.: An overview of hash based signatures. Cryptology ePrint Archive (2023). https://eprint.iacr.org/2023/411

  27. Bos, J., Ducas, L., Kiltz, E., Lepoint, T., Lyubashevsky, V., Schanck, J.M., Schwabe, P., Seiler, G., Stehlé, D.: CRYSTALS-Kyber: a CCA-secure module-lattice-based KEM. In: 2018 IEEE European Symposium on Security and Privacy (EuroS &P), pp. 353–367. IEEE, London, UK (2018)

  28. Zhang, J., Zhang, Z., Ge, A.: Ciphertext policy attribute-based encryption from lattices. In: Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security, pp. 16–17. Association for Computing Machinery, Seoul, Korea (2012)

  29. Gür, K.D., Polyakov, Y., Rohloff, K., Ryan, G.W., Sajjadpour, H., Savaş, E.: Practical applications of improved Gaussian sampling for trapdoor lattices. Cryptology ePrint Archive, Paper 2017/1254 (2017)

  30. Agrawal, S., Yamada, S.: CP-ABE for circuits (and more) in the symmetric key setting. In: Theory of Cryptography: 18th International Conference, TCC 2020, Durham, NC, USA, November 16–19, 2020, pp. 117–148. Springer, Berlin (2020)

  31. Brakerski, Z., Vaikuntanathan, V.: Lattice-inspired broadcast encryption and succinct ciphertext-policy ABE. IACR Cryptology EPrint Archive 2020/191 (2020)

  32. Tsabary, R.: Fully secure attribute-based encryption for t-CNF from LWE. In: Advances in Cryptology—CRYPTO 2019: 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18–22, 2019, Proceedings, Part I 39, pp. 62–85. Springer, Berlin (2019)

  33. Datta, P., Komargodski, I., Waters, B.: Decentralized multi-authority ABE for DNFs from LWE. In: Advances in Cryptology—EUROCRYPT 2021: 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, pp. 177–209. Springer, Berlin (2021)

  34. Waters, B.: Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In: Public Key Cryptography—PKC 2011: 14th International Conference on Practice and Theory in Public Key Cryptography, Taormina, Italy, March 6–9, 2011. Proceedings 14, pp. 53–70. Springer, Berlin (2011)

  35. Ostrovsky, R., Sahai, A., Waters, B.: Attribute-based encryption with non-monotonic access structures. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp. 195–203. Association for Computing Machinery, Alexandria, Virginia, USA (2007)

  36. Guo, F., Mu, Y., Susilo, W., Wong, D.S., Varadharajan, V.: CP-ABE with constant-size keys for lightweight devices. IEEE Trans. Inf. Forensics Secur. 9(5), 763–771 (2014)

    Article  Google Scholar 

  37. Odelu, V., Das, A.K., Rao, Y.S., Kumari, S., Khan, M.K., Choo, K.-K.R.: Pairing-based CP-ABE with constant-size ciphertexts and secret keys for cloud environment. Comput. Stand. Interfaces 54, 3–9 (2017)

    Article  Google Scholar 

  38. Rao, Y.S., Dutta, R.: Decentralized ciphertext-policy attribute-based encryption scheme with fast decryption. In: Communications and Multimedia Security: 14th IFIP TC 6/TC 11 International Conference, CMS 2013, Magdeburg, Germany, September 25–26, 2013. Proceedings 14, pp. 66–81. Springer, Berlin (2013)

  39. Wang, S., Liang, K., Liu, J.K., Chen, J., Yu, J., **e, W.: Attribute-based data sharing scheme revisited in cloud computing. IEEE Trans. Inf. Forensics Secur. 11(8), 1661–1673 (2016)

    Article  Google Scholar 

  40. McMahon, D.: Quantum Computing Explained. Wiley, New York (2007)

    Book  Google Scholar 

  41. Boykin, P.O., Roychowdhury, V.: Optimal encryption of quantum bits. Phys. Rev. A 67(4), 042317 (2003)

    Article  Google Scholar 

  42. Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing (2020). ar**v preprint. ar**v:2003.06557

  43. Aumann, Y., Lindell, Y.: Security against covert adversaries: efficient protocols for realistic adversaries. J. Cryptol. 23(2), 281–343 (2010)

    Article  MathSciNet  Google Scholar 

  44. He, H., Zhang, J., Gu, J., Hu, Y., Xu, F.: A fine-grained and lightweight data access control scheme for WSN-integrated cloud computing. Clust. Comput. 20, 1457–1472 (2017)

    Article  Google Scholar 

  45. Li, J., Chen, X., Chow, S.S., Huang, Q., Wong, D.S., Liu, Z.: Multi-authority fine-grained access control with accountability and its application in cloud. J. Netw. Comput. Appl. 112, 89–96 (2018)

    Article  Google Scholar 

  46. Belguith, S., Kaaniche, N., Laurent, M., Jemai, A., Attia, R.: PHOABE: securely outsourcing multi-authority attribute based encryption with policy hidden for cloud assisted IoT. Comput. Netw. 133, 141–156 (2018)

    Article  Google Scholar 

  47. Chase, M., Chow, S.S.: Improving privacy and security in multi-authority attribute-based encryption. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, pp. 121–130. Association for Computing Machinery, Chicago, Illinois, USA (2009)

  48. Attrapadung, N., Herranz, J., Laguillaumie, F., Libert, B., De Panafieu, E., Ràfols, C.: Attribute-based encryption schemes with constant-size ciphertexts. Theor. Comput. Sci. 422, 15–38 (2012)

    Article  MathSciNet  Google Scholar 

  49. Yu, S., Ren, K., Lou, W.: FDAC: toward fine-grained distributed data access control in wireless sensor networks. IEEE Trans. Parallel Distrib. Syst. 22(4), 673–686 (2010)

    Article  Google Scholar 

  50. Ruj, S., Nayak, A., Stojmenovic, I.: Distributed fine-grained access control in wireless sensor networks. In: 2011 IEEE International Parallel & Distributed Processing Symposium, pp. 352–362. IEEE, Anchorage, AK, USA (2011)

  51. Lynn, B., et al.: PBC library manual 0.5. 11. Stanford University, Stanford (2006)

  52. Yu, Y., Shi, J., Li, H., Li, Y., Du, X., Guizani, M.: Key-policy attribute-based encryption with keyword search in virtualized environments. IEEE J. Sel. Areas Commun. 38(6), 1242–1251 (2020)

    Article  Google Scholar 

  53. Lai, J., Deng, R.H., Li, Y., Weng, J.: Fully secure key-policy attribute-based encryption with constant-size ciphertexts and fast decryption. In: Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, pp. 239–248. Association for Computing Machinery, Kyoto, Japan (2014)

  54. Zhu, H., Wang, L., Ahmad, H., Niu, X.: Key-policy attribute-based encryption with equality test in cloud computing. IEEE Access 5, 20428–20439 (2017)

    Article  Google Scholar 

  55. Li, J., Yu, Q., Zhang, Y., Shen, J.: Key-policy attribute-based encryption against continual auxiliary input leakage. Inf. Sci. 470, 175–188 (2019)

    Article  MathSciNet  Google Scholar 

  56. Han, J., Susilo, W., Mu, Y., Yan, J.: Privacy-preserving decentralized key-policy attribute-based encryption. IEEE Trans. Parallel Distrib. Syst. 23(11), 2150–2162 (2012)

    Article  Google Scholar 

  57. Attrapadung, N., Libert, B., De Panafieu, E.: Expressive key-policy attribute-based encryption with constant-size ciphertexts. In: Public Key Cryptography—PKC 2011: 14th International Conference on Practice and Theory in Public Key Cryptography, Taormina, Italy, March 6–9, 2011. Proceedings 14, pp. 90–108. Springer, Berlin (2011)

Download references

Acknowledgements

The authors would like to thank the anonymous reviewers and the editor for providing their valuable suggestions and comments which helped us to improve the paper significantly.

Funding

The authors have not disclosed any funding.

Author information

Authors and Affiliations

Authors

Contributions

Y.S.R. Conceptualization and Ideas, Y.S.R and V.S and T.M.: Methodology, Validation and Investigation, Writing- Original draft preparation, Y.S.R. and S.K.D.: Supervision, Reviewing, and Editing.

Corresponding author

Correspondence to Vikas Srivastava.

Ethics declarations

Conflict of interest

The authors state that they have not known competing financial interests or personal connections that may seem to have influenced the work described in this study.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Rao, Y.S., Srivastava, V., Mohanty, T. et al. Designing quantum-secure attribute-based encryption. Cluster Comput (2024). https://doi.org/10.1007/s10586-024-04546-9

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s10586-024-04546-9

Keywords

Navigation