Paper 2010/374
Efficient Generation of Linear Secret Sharing Scheme Matrices from Threshold Access Trees
Zhen Liu, Zhenfu Cao, and Duncan S. Wong
Abstract
Linear Secret Sharing Scheme (LSSS) matrices are commonly used for implementing monotone access structures in highly expressive Ciphertext-Policy Attribute-Based Encryption (CP-ABE) schemes. However, LSSS matrices are much less intuitive to use when compared with other approaches such as boolean formulas or access trees. To bridge the gap between the usability of an access structure representation method and the implementation technique required in a concrete CP-ABE construction, Lewko and Waters proposed an algorithm which can convert any monotone boolean formulas to LSSS matrices. This algorithm is very useful in practice as a ciphertext policy can now be intuitively expressed using a monotone boolean formula, which has good usability, and the corresponding LSSS for an actual CP-ABE construction can then be generated accordingly using this algorithm. However, in this algorithm, the non-leaf nodes of a monotone boolean formula, when viewed as an access tree, can only be \textsf{AND} or \textsf{OR} gates. For general monotone access structures, for example, in a
Metadata
- Available format(s)
-
PDF
- Publication info
- Preprint. MINOR revision.
- Keywords
- Attribute-Based EncryptionAccess PolicyMonotone Access StructureLinear Secret Sharing Scheme
- Contact author(s)
-
liuzhensjtu @ gmail com
duncanwong @ astri org - History
- 2016-05-04: last of 2 revisions
- 2010-07-02: received
- See all versions
- Short URL
- https://ia.cr/2010/374
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2010/374, author = {Zhen Liu and Zhenfu Cao and Duncan S. Wong}, title = {Efficient Generation of Linear Secret Sharing Scheme Matrices from Threshold Access Trees}, howpublished = {Cryptology {ePrint} Archive, Paper 2010/374}, year = {2010}, url = {https://eprint.iacr.org/2010/374} }