Show simple item record

dc.contributor.authorBrakerski, Zvika
dc.contributor.authorVaikuntanathan, Vinod
dc.date.accessioned2017-08-30T17:44:50Z
dc.date.available2017-08-30T17:44:50Z
dc.date.issued2016-07
dc.identifier.isbn978-3-662-53014-6
dc.identifier.isbn978-3-662-53015-3
dc.identifier.issn0302-9743
dc.identifier.issn1611-3349
dc.identifier.urihttp://hdl.handle.net/1721.1/111070
dc.description.abstractWe construct an LWE-based key-policy attribute-based encryption (ABE) scheme that supports attributes of unbounded polynomial length. Namely, the size of the public parameters is a fixed polynomial in the security parameter and a depth bound, and with these fixed length parameters, one can encrypt attributes of arbitrary length. Similarly, any polynomial size circuit that adheres to the depth bound can be used as the policy circuit regardless of its input length (recall that a depth d circuit can have as many as 2d inputs). This is in contrast to previous LWE-based schemes where the length of the public parameters has to grow linearly with the maximal attribute length. We prove that our scheme is semi-adaptively secure, namely, the adversary can choose the challenge attribute after seeing the public parameters (but before any decryption keys). Previous LWE-based constructions were only able to achieve selective security. (We stress that the “complexity leveraging” technique is not applicable for unbounded attributes). We believe that our techniques are of interest at least as much as our end result. Fundamentally, selective security and bounded attributes are both shortcomings that arise out of the current LWE proof techniques that program the challenge attributes into the public parameters. The LWE toolbox we develop in this work allows us to delay this programming. In a nutshell, the new tools include a way to generate an a-priori unbounded sequence of LWE matrices, and have fine-grained control over which trapdoor is embedded in each and every one of them, all with succinct representation.en_US
dc.description.sponsorshipNational Science Foundation (U.S.) (Award CNS-1350619)en_US
dc.description.sponsorshipNational Science Foundation (U.S.) (Grant CNS-1413964)en_US
dc.description.sponsorshipUnited States-Israel Binational Science Foundation (Grant 712307)en_US
dc.language.isoen_US
dc.publisherSpringeren_US
dc.relation.isversionofhttp://dx.doi.org/10.1007/978-3-662-53015-3_13en_US
dc.rightsCreative Commons Attribution-Noncommercial-Share Alikeen_US
dc.rights.urihttp://creativecommons.org/licenses/by-nc-sa/4.0/en_US
dc.sourceMIT Web Domainen_US
dc.titleCircuit-ABE from LWE: Unbounded Attributes and Semi-adaptive Securityen_US
dc.typeArticleen_US
dc.identifier.citationBrakerski, Zvika, and Vaikuntanathan, Vinod. “Circuit-ABE from LWE: Unbounded Attributes and Semi-Adaptive Security.” Robshaw M. and Katz J., editors. Advances in Cryptology – CRYPTO 2016. Lecture Notes in Computer Science 9816 (2016): 363–384 © 2016 International Association for Cryptologic Researchen_US
dc.contributor.departmentMassachusetts Institute of Technology. Computer Science and Artificial Intelligence Laboratoryen_US
dc.contributor.departmentMassachusetts Institute of Technology. Department of Electrical Engineering and Computer Scienceen_US
dc.contributor.mitauthorVaikuntanathan, Vinod
dc.relation.journalAdvances in Cryptology – CRYPTO 2016en_US
dc.eprint.versionAuthor's final manuscripten_US
dc.type.urihttp://purl.org/eprint/type/ConferencePaperen_US
eprint.statushttp://purl.org/eprint/status/NonPeerRevieweden_US
dspace.orderedauthorsBrakerski, Zvika; Vaikuntanathan, Vinoden_US
dspace.embargo.termsNen_US
dc.identifier.orcidhttps://orcid.org/0000-0002-2666-0045
mit.licenseOPEN_ACCESS_POLICYen_US
mit.metadata.statusComplete


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record