Visible to the public Access Control Encryption Based on LWE

TitleAccess Control Encryption Based on LWE
Publication TypeConference Paper
Year of Publication2017
AuthorsTan, Gaosheng, Zhang, Rui, Ma, Hui, Tao, Yang
Conference NameProceedings of the 4th ACM International Workshop on ASIA Public-Key Cryptography
PublisherACM
Conference LocationNew York, NY, USA
ISBN Number978-1-4503-4973-4
Keywordsaccess control encryption, fully homomorphic encryption, Human Behavior, lattice, Metrics, pubcrawl, random key generation, resilience, Resiliency, Scalability
Abstract

Damgard et al. proposed a new primitive called access control encryption (ACE) [6] which not only protects the privacy of the message, but also controls the ability of the sender to send the message. We will give a new construction based on the Learning with Error (LWE) assumption [12], which is one of the two open problems in [6]. Although there are many public key encryption schemes based on LWE and supporting homomorphic operations. We find that not every scheme can be used to build ACE. In order to keep the security and correctness of ACE, the random constant chosen by the sanitizer should satisfy stricter condition. We also give a different security proof of ACE based on LWE from it based on DDH. We will see that although the modulus of LWE should be super-polynomial, the ACE scheme is still as secure as the general public key encryption scheme based on the lattice [5].

URLhttps://dl.acm.org/doi/10.1145/3055504.3055509
DOI10.1145/3055504.3055509
Citation Keytan_access_2017