Rocksolid Light

Welcome to Rocksolid Light

mail  files  register  newsreader  groups  login

Message-ID:  

echo "Your stdio isn't very std." -- Larry Wall in Configure from the perl distribution


devel / sci.crypt / [digest] 2023 Week 45

SubjectAuthor
o [digest] 2023 Week 45IACR ePrint Archive

1
[digest] 2023 Week 45

<wA2d3C4mh4WuOvvpe6vo1b8lfqs-5dUt@eprint.iacr.org.invalid>

  copy mid

http://rslight.i2p/devel/article-flat.php?id=674&group=sci.crypt#674

  copy link   Newsgroups: sci.crypt
Path: i2pn2.org!i2pn.org!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: noreply@example.invalid (IACR ePrint Archive)
Newsgroups: sci.crypt
Subject: [digest] 2023 Week 45
Date: Mon, 13 Nov 2023 03:27:10 -0000
Organization: A noiseless patient Spider
Lines: 63
Message-ID: <wA2d3C4mh4WuOvvpe6vo1b8lfqs-5dUt@eprint.iacr.org.invalid>
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: quoted-printable
Injection-Info: dont-email.me; posting-host="bf4ccdf75897f345caa9b4064b9e065d";
logging-data="507542"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX192yxcCopbqlnTLsZW94hIFpL1ltuhk628="
Cancel-Lock: sha1:1c7eE71Qy+uNUXhhqWapHPS6zF8=
 by: IACR ePrint Archive - Mon, 13 Nov 2023 03:27 UTC

## In this issue

1. [2022/1415] FABEO: Fast Attribute-Based Encryption with Optimal ...
2. [2023/1715] Lattice-based Public Key Encryption with Authorized ...

## 2022/1415

* Title: FABEO: Fast Attribute-Based Encryption with Optimal Security
* Authors: Doreen Riepel, Hoeteck Wee
* [Permalink](https://eprint.iacr.org/2022/1415)
* [Download](https://eprint.iacr.org/2022/1415.pdf)

### Abstract

Attribute-based encryption (ABE) enables fine-grained access control on encrypted data and has a large number of practical applications. This paper presents FABEO: faster pairing-based ciphertext-policy and key-policy ABE schemes that support expressive policies and put no restriction on policy type or attributes, and the first to achieve optimal, adaptive security with multiple challenge ciphertexts. We implement our schemes and demonstrate that they perform better than the state-of-the-art (Bethencourt et al. S&P 2007, Agrawal et al., CCS 2017 and Ambrona et al., CCS 2017) on all parameters of practical interest.

## 2023/1715

* Title: Lattice-based Public Key Encryption with Authorized Keyword Search: Construction, Implementation, and Applications
* Authors: Shiyuan Xu, Yibo Cao, Xue Chen, Yuer Yang, Siu-Ming Yiu
* [Permalink](https://eprint.iacr.org/2023/1715)
* [Download](https://eprint.iacr.org/2023/1715.pdf)

### Abstract

Public key encryption with keyword search (PEKS), formalized by Boneh et al. [EUROCRYPT' 04], enables secure searching for specific keywords in the ciphertext. Nevertheless, in certain scenarios, varying user tiers are granted disparate data searching privileges, and administrators need to restrict the searchability of ciphertexts to select users exclusively. To address this concern, Jiang et al. [ACISP' 16] devised a variant of PEKS, namely public key encryption with authorized keyword search (PEAKS), wherein solely authorized users possess the ability to conduct targeted keyword searches. Nonetheless, it is vulnerable to resist quantum computing attacks. As a result, research focusing on authorizing users to search for keywords while achieving quantum security is far-reaching.
In this work, we present a novel construction, namely lattice-based PEAKS (L-PEAKS), which is the first mechanism to permit the authority to authorize users to search different keyword sets while ensuring quantum-safe properties. Specifically, the keyword is encrypted with a public key, and each authorized user needs to obtain a search privilege from an authority. The authority distributes an authorized token to a user within a time period and the user will generate a trapdoor for any authorized keywords. Technically, we utilize several lattice sampling and basis extension algorithms to fight against attacks from quantum adversaries. Moreover, we leverage identity-based encryption (IBE) to alleviate the bottleneck of public key management. Furthermore, we conduct parameter analysis, rigorous security reduction, and theoretical complexity comparison of our scheme and perform comprehensive evaluations at a commodity machine for completeness. Our L-PEAKS satisfies IND-sID-CKA and T-EUF security and is efficient in terms of space and computation complexity compared to other existing primitives. Finally, we provide two potential applications to show its versatility.


devel / sci.crypt / [digest] 2023 Week 45

1
server_pubkey.txt

rocksolid light 0.9.81
clearnet tor