一级黄色片免费播放|中国黄色视频播放片|日本三级a|可以直接考播黄片影视免费一级毛片

高級(jí)搜索

留言板

尊敬的讀者、作者、審稿人, 關(guān)于本刊的投稿、審稿、編輯和出版的任何問題, 您可以本頁(yè)添加留言。我們將盡快給您答復(fù)。謝謝您的支持!

姓名
郵箱
手機(jī)號(hào)碼
標(biāo)題
留言內(nèi)容
驗(yàn)證碼

基于容錯(cuò)學(xué)習(xí)的屬性基加密方案的具體安全性分析

趙建 高海英 胡斌

趙建, 高海英, 胡斌. 基于容錯(cuò)學(xué)習(xí)的屬性基加密方案的具體安全性分析[J]. 電子與信息學(xué)報(bào), 2019, 41(8): 1779-1786. doi: 10.11999/JEIT180824
引用本文: 趙建, 高海英, 胡斌. 基于容錯(cuò)學(xué)習(xí)的屬性基加密方案的具體安全性分析[J]. 電子與信息學(xué)報(bào), 2019, 41(8): 1779-1786. doi: 10.11999/JEIT180824
Jian ZHAO, Haiying GAO, Bin HU. Analysis Method for Concrete Security of Attribute-based Encryption Based on Learning With Errors[J]. Journal of Electronics & Information Technology, 2019, 41(8): 1779-1786. doi: 10.11999/JEIT180824
Citation: Jian ZHAO, Haiying GAO, Bin HU. Analysis Method for Concrete Security of Attribute-based Encryption Based on Learning With Errors[J]. Journal of Electronics & Information Technology, 2019, 41(8): 1779-1786. doi: 10.11999/JEIT180824

基于容錯(cuò)學(xué)習(xí)的屬性基加密方案的具體安全性分析

doi: 10.11999/JEIT180824
基金項(xiàng)目: 國(guó)家自然科學(xué)基金(61702548, 61601515),河南省基礎(chǔ)與前沿技術(shù)課題(162300410192)
詳細(xì)信息
    作者簡(jiǎn)介:

    趙建:男,1989年生,博士生,研究方向?yàn)楣€密碼的設(shè)計(jì)與分析

    高海英:女,1978年生,教授,博士生導(dǎo)師,研究方向?yàn)槊艽a算法的設(shè)計(jì)與分析

    胡斌:男,1971年生,教授,博士生導(dǎo)師,研究方向?yàn)槊艽a算法的設(shè)計(jì)與分析

    通訊作者:

    趙建 back_zj@126.com

  • 中圖分類號(hào): TP309

Analysis Method for Concrete Security of Attribute-based Encryption Based on Learning With Errors

Funds: The National Natural Science Foundation of China (61702548, 61601515), The Fundamental and Frontier Technology Research of Henan Province (162300410192)
  • 摘要: 為了能全面研究基于容錯(cuò)學(xué)習(xí)(LWE)的屬性基加密(ABE)方案的安全性,考察其抵抗現(xiàn)有攻擊手段的能力,在綜合考慮格上算法和方案噪聲擴(kuò)張對(duì)參數(shù)的限制后,利用已有的解決LWE的算法及其可用程序模塊,該文提出了針對(duì)基于LWE的ABE方案的具體安全性分析方法。該方法可以極快地給出滿足方案限制要求的具體參數(shù)及方案達(dá)到的安全等級(jí),此外,在給定安全等級(jí)的條件下,該方法可以給出相應(yīng)的具體參數(shù)值。最后,利用該方法分析了4個(gè)典型的基于LWE的屬性基加密方案的具體安全性。實(shí)驗(yàn)數(shù)據(jù)表明,滿足一定安全等級(jí)的基于LWE的屬性基方案的參數(shù)尺寸過大,還無法應(yīng)用到實(shí)際中。
  • 表  1  符號(hào)定義

    符號(hào)意義符號(hào)意義
    $d$整數(shù)值${{\mathbb{Z}}_q}$模$q$的剩余類環(huán)
    ${{a}}$列向量${{a}}$${{\mathbb{Z}}^{n \times m}}$$n \times m$整數(shù)矩陣集合
    ${{A}}$矩陣${{A}}$$\left\lceil {q/2} \right\rceil $大于$q/2$的最小整數(shù)
    ${{A}} ^{\rm{T}}$矩陣${{A}}$的轉(zhuǎn)置$\left\lfloor {q/2} \right\rfloor $小于q/2的最大整數(shù)
    ${{A}}|{{B }}$矩陣${{A}}$和矩陣${{B }}$合并$\varTheta (n)$漸進(jìn)精確界記號(hào)
    ${\mathbb{Z}}$整數(shù)域$\omega (n)$非漸進(jìn)緊下界記號(hào)
    ${\mathbb{R}}$實(shí)數(shù)域$O(n)$漸進(jìn)上界記號(hào)
    下載: 導(dǎo)出CSV

    表  2  密碼算法的安全級(jí)別

    安全等級(jí)(${2^n}$)406480128192256
    安全級(jí)別薄弱(weak)傳統(tǒng)(legacy)基準(zhǔn)(baseline)標(biāo)準(zhǔn)(standard)較高(high)超高(ultra)
    下載: 導(dǎo)出CSV

    表  3  d, n=64時(shí)參數(shù)和最低安全等級(jí)${λ}$的關(guān)系

    $c$$q$$\log q \approx $$m$${\rm{Dis}}( \cdot )$?${λ}$
    8281474976710677 48 6144
    1173786976294838206459 66 844830.6
    1679228162514264337593543950319 961228831.1
    3262771017353866807638357894232076664161023554444640345130291922457632.0
    64394020061963944792122790401001436138050797392704654466679482934042457217714972106114142662548849156408066279903070473844872732.9
    下載: 導(dǎo)出CSV

    表  4  $q7j3ldu95 {= 1}$時(shí)參數(shù)和最低安全等級(jí)${λ}$的關(guān)系

    $n$$c$$q$$\log q \approx $$m$${\rm{Dis}}( \cdot )$?$\alpha $${λ} $
    12887205759403792793156 14336
    10 118059162071741130344970 179206.01e–1831.8
    5127922337203685477578363 64512
    8472236648286964521371172 737283.30e–1835.1
    10247118059162071741130344970143360
    81208925819614629174706189801638402.10e–2060.1
    12757547736009430541992187972184146
    86983634120239410400390599832104524.11e–2181.3
    40966472236648286964521371172589824
    719342813113834066795298819846881282.95e–21636.7
    下載: 導(dǎo)出CSV

    表  5  達(dá)到基準(zhǔn)安全等級(jí)${λ} ' \approx{80}$時(shí)方案的參數(shù)

    $d$$n$$\log q \approx $$m$$\alpha $
    1127582.52104524.11e–21
    21375104.32866941.42e–27
    42925161.29430152.04e–44
    85500285.831435801.27e–81
    1611000537.011814906.32e–157
    下載: 導(dǎo)出CSV

    表  6  方案數(shù)據(jù)量大小(GB)

    $d$公鑰主密鑰密文密鑰
    112.961719.550.0060982138.19
    243.398044.950.0175309050.57
    41716.67536681.890.302340553453.20
    8295332.43168482949.3726.900739168812017.63
    161064847265.921143637238342.2948402.5177271143645963601.98
    下載: 導(dǎo)出CSV

    表  7  方案中參數(shù)和最低安全等級(jí)${λ} $的關(guān)系

    方案AF$n$$\log q \approx $$m$$\alpha $$\lambda $
    文獻(xiàn)[9]d = 1128103263684.28e–2532.5
    k = 210241202457603.71e–2940.6
    p = 10409613210813444.46e–32335.3
    文獻(xiàn)[16]$r = 2$1289388364.46e–2231.9
    1024102106092.94e–2450.3
    4096108118811.03e–25511.2
    文獻(xiàn)[17]$l = 3$12887676322.91e–2831.7
    1024965910003.48e–3137.8
    409610124836464.18e–33185.8
    下載: 導(dǎo)出CSV

    表  8  方案達(dá)到基準(zhǔn)安全等級(jí)${λ} ' \approx {80}$時(shí)方案的參數(shù)

    方案$n$$\log q \approx $$m$$\alpha $
    文獻(xiàn)[9]1750125 4375002.16e–30
    文獻(xiàn)[16]1380104 110248.86e–25
    文獻(xiàn)[17]2500 9914863592.03e–32
    下載: 導(dǎo)出CSV

    表  9  方案數(shù)據(jù)量大小(GB)

    方案公鑰密文密鑰
    文獻(xiàn)[9]44.56520.02555570.6550
    文獻(xiàn)[16] 1.10121.83541.4683
    文獻(xiàn)[17]342.6093 0.13700.2056
    下載: 導(dǎo)出CSV
  • SAHAI A and WATERS B. Fuzzy identity-based encryption[C]. The 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, 2005: 457–473. doi: 10.1007/11426639_27.
    AJTAI M. Generating hard instances of lattice problems (extended abstract)[C]. The 28th Annual ACM Symposium on Theory of Computing, Philadelphia, Pennsylvania, USA, 1996: 99–108. doi: 10.1145/237814.237838.
    REGEV O. On lattices, learning with errors, random linear codes, and cryptography[C]. The 37th Symposium on Theory of Computing, Baltimore, USA, 2005: 84–93. doi: 10.1145/1060590.1060603.
    LYUBASHEVSKY V, PEIKERT C, and REGEV O. On ideal lattices and learning with errors over rings[J]. Journal of the ACM, 2010, 60(6): 43. doi: 10.1145/2535925
    ALBRECHT M R, PLAYER R, and SCOTT S. On the concrete hardness of learning with Errors[J]. Journal of Mathematical Cryptology, 2015, 9(3): 169–203. doi: 10.1515/jmc-2015-0016
    BECKER A, DUCAS L, GAMA N, et al. New directions in nearest neighbor searching with applications to lattice sieving[C]. The Twenty-Seventh Annual ACM-SIAM Symposium on Discrete Algorithms, Arlington, Virginia, 2016: 10–24. doi: 10.1137/1.9781611974331.ch2.
    SCHNEIDER M. Sieving for shortest vectors in ideal lattices[C]. The 6th International Conference on Cryptology in Africa, Cairo, Egypt, 2013: 375–391. doi: 10.1007/978-3-642-38553-7_22.
    AGRAWAL S, BONEH D, and BOYEN X. Efficient lattice (H)IBE in the standard model[C]. The 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, French Riviera, France, 2010: 553–572. doi: 10.1007/978-3-642-13190-5_28.
    BONEH D, NIKOLAENKO V, and SEGEV G. Attribute-based encryption for arithmetic circuits[EB/OL]. http://eprint.iacr.org/2013/669, 2013.
    CHEN Yuanmi and NGUYEN P Q. BKZ 2.0: Better lattice security estimates[C]. The 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, 2011: 1–20. doi: 10.1007/978-3-642-25385-0_1.
    BAI Shi and GALBRAITH S D. Lattice decoding attacks on binary LWE[C]. The 19th Australasian Conference on Information Security and Privacy, Wollongong, NSW, Australia, 2014: 322–337. doi: 10.1007/978-3-319-08344-5_21.
    PAAR C and PELZL J. Understanding Cryptography: A Textbook for Students and Practitioners[M]. Berlin Heidelberg: Springer, 2010: 156.
    LINDNER R and PEIKERT C. Better key sizes (and attacks) for LWE-based encryption[C]. The Cryptographers’ Track at the RSA Conference 2011 Topics in Cryptology, San Francisco, USA, 2011: 319–339. doi: 10.1007/978-3-642-19074-2_21.
    ALBRECHT M R, CID C, FAUGèRE J, et al. On the complexity of the BKW algorithm on LWE[J]. Designs, Codes and Cryptography, 2015, 74(2): 325–354. doi: 10.1007/s10623-013-9864-x
    ZHAO Jian, GAO Haiying, and ZHANG Junqi. Attribute-based encryption for circuits on lattices[J]. Tsinghua Science and Technology, 2014, 19(5): 463–469. doi: 10.3969/j.issn.1007-0214.2014.05.005
    趙建, 高海英, 胡斌. 基于理想格的高效密文策略屬性基加密方案[J]. 電子與信息學(xué)報(bào), 2018, 40(7): 1652–1660. doi: 10.11999/JEIT170863

    ZHAO Jian, GAO Haiying, and HU Bin. An efficient ciphertext-policy attribute-based encryption on ideal lattices[J]. Journal of Electronics &Information Technology, 2018, 40(7): 1652–1660. doi: 10.11999/JEIT170863
    ZHANG Jiang, ZHANG Zhenfeng, and GE Aijun. Ciphertext policy attribute-based encryption from lattices[C]. The 7th ACM Symposium on Information, Computer and Communications Security, Seoul, Korea, 2012: 16–17. doi: 10.1145/2414456.2414464.
  • 加載中
表(9)
計(jì)量
  • 文章訪問數(shù):  3150
  • HTML全文瀏覽量:  1311
  • PDF下載量:  101
  • 被引次數(shù): 0
出版歷程
  • 收稿日期:  2018-08-22
  • 修回日期:  2019-01-23
  • 網(wǎng)絡(luò)出版日期:  2019-02-15
  • 刊出日期:  2019-08-01

目錄

    /

    返回文章
    返回