Turing machines with shortcuts: Efficient attribute-based encryption for bounded functions

2Citations
Citations of this article
24Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

We propose a direct construction of attribute-based encryp- tion (ABE) scheme for bounded multi-stack deterministic pushdown automata (DPDAs) and Turing machines that have polynomial runtime in the security parameter. Particularly, we show how to extend our con- struction to handle bounded DPDAs with two or more stacks, which leads to an ABE scheme for deterministic Turing machines (DTMs) with polynomial runtime. Our ABE schemes have "input-specific" decryption runtime meaning that the decryption time depends on the semantics of attributes. If a machine halts prematurely on a certain input, its execution can be cut short. To the best of our knowledge, our ABE scheme is the first one that achieves this property and has security proofs based on standard cryptographic assumption. The key technical ingredient we apply is a special graph encoding on the executions of bounded DPDAs with multi-stacks, allowing us to remember just enough of the execution history to enforce correct evalu- ation. The security of our scheme is shown to be based on the learning with errors (LWE) problem in the selective security model.

Cite

CITATION STYLE

APA

Boyen, X., & Li, Q. (2016). Turing machines with shortcuts: Efficient attribute-based encryption for bounded functions. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 9696, pp. 267–284). Springer Verlag. https://doi.org/10.1007/978-3-319-39555-5_15

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free