{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,13]],"date-time":"2025-10-13T01:04:46Z","timestamp":1760317486189,"version":"build-2065373602"},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,10,13]],"date-time":"2025-10-13T00:00:00Z","timestamp":1760313600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2025,10,13]],"date-time":"2025-10-13T00:00:00Z","timestamp":1760313600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"Yunnan Province Science and Technology Major Project","award":["202302AD080002"],"award-info":[{"award-number":["202302AD080002"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62302224","62202231","62202230","62302226"],"award-info":[{"award-number":["62302224","62202231","62202230","62302226"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Defense Industrial Technology Development Program","award":["JCKY2021606B013"],"award-info":[{"award-number":["JCKY2021606B013"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cybersecurity"],"abstract":"<jats:title>Abstract<\/jats:title>\n          <jats:p>Lattice-based attribute-based encryption (ABE) combines the advantages of against quantum attack and fine-grained access control. However, most existing LWE-based or RLWE-based ABE schemes from lattices have the limitations of large storage cost and lack of support for attribute privacy protection. In 2022, a new algebraically structured LWE variant-cyclic algebra LWE (CLWE), was proposed by Grover et al. in journal of cryptology (JoC). This new variant has its inherent storage and computing advantages, especially in reducing the storage overhead. Therefore, to reduce the storage cost and protect the attribute privacy, we propose a novel lattice-based ABE scheme based on CLWE. More specifically, by introducing an extended Shamir\u2019s secret sharing scheme on cyclic algebra and a two-dimensional (attribute label, attribute value) attribute structure, we extend the CLWE-based PKE scheme in JoC22 to a CLWE-based ABE scheme. The sizes of public key, master secret key, user\u2019s secret key and ciphertext of our proposal are remarkably reduced. In addition, we combines a semi access policy structure and the two-dimensional attribute structure to hide the user\u2019s attribute values, thereby preventing the leakage of user attribute privacy. Performance analysis shows that compared related lattice-based ABE schemes, our proposal is more efficient in the storage cost and it supports attribute privacy protection. Finally, our scheme is proved to be secure in the standard model.<\/jats:p>","DOI":"10.1186\/s42400-025-00367-4","type":"journal-article","created":{"date-parts":[[2025,10,13]],"date-time":"2025-10-13T00:03:10Z","timestamp":1760313790000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A novel CLWE-based attribute-based encryption scheme from lattices with privacy preserving"],"prefix":"10.1186","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3619-0099","authenticated-orcid":false,"given":"Yuan","family":"Liu","sequence":"first","affiliation":[]},{"given":"Licheng","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Yongbin","family":"Zhou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,13]]},"reference":[{"key":"367_CR1","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/978-3-030-45721-1_2","volume-title":"Advances in cryptology-EUROCRYPT 2020","author":"S Agrawal","year":"2020","unstructured":"Agrawal S, Yamada S (2020) Optimal broadcast encryption from pairings and LWE. In: Canteaut A, Ishai Y (eds) Advances in cryptology-EUROCRYPT 2020, vol 12105. LNCS. Springer, Cham, pp 13\u201343"},{"key":"367_CR2","doi-asserted-by":"publisher","first-page":"280","DOI":"10.1007\/978-3-642-30057-8_17","volume-title":"Public key cryptography-PKC 2012, LNCS","author":"S Agrawal","year":"2012","unstructured":"Agrawal S, Boyen X, Vaikuntanathan V, Voulgaris P, Wee H (2012) Functional encryption for threshold functions (or fuzzy IBE) from lattices. In: Fischlin M, Buchmann J, Manulis M (eds) Public key cryptography-PKC 2012, LNCS, vol 7293. Springer, Berlin, Heidelberg, pp 280\u2013297"},{"key":"367_CR3","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"352","DOI":"10.1007\/978-3-031-68382-4_11","volume-title":"Advances in cryptology-CRYPTO 2024","author":"S Agrawal","year":"2024","unstructured":"Agrawal S, Kumari S, Yamada S (2024) Attribute based encryption for turing machines from lattices. In: Reyzin L, Stebila D (eds) Advances in cryptology-CRYPTO 2024, vol 14922. LNCS. Springer, Cham, pp 352\u2013386"},{"key":"367_CR4","doi-asserted-by":"crossref","unstructured":"Ajtai M, Dwork C (1997) A public-key cryptosystem with worst-case\/average-case equivalence. In Proceedings of the 29th Annual ACM Symposium on Theory of Computing (STOC\u201997), El Paso, Texas, pp. 284-293","DOI":"10.1145\/258533.258604"},{"key":"367_CR5","doi-asserted-by":"publisher","first-page":"533","DOI":"10.1007\/978-3-642-55220-5_30","volume-title":"Advances in cryptology-EUROCRYPT 2014, LNCS","author":"D Boneh","year":"2014","unstructured":"Boneh D, Gentry C, Gorbunov S, Halevi S, Nikolaenko V, Vaikuntanathan V, Vinayagamurthy D (2014) Fully key-homomorphic encryption, arithmetic circuit ABE and compact garbled circuit. In: Nguyen PQ, Oswald E (eds) Advances in cryptology-EUROCRYPT 2014, LNCS, vol 8441. Springer, Berlin, Heidelberg, pp 533\u2013556"},{"key":"367_CR6","doi-asserted-by":"crossref","unstructured":"Bos J, Ducas L, Kiltz E, Lepoint T, Lyubashevsky V, Schanck JM, Schwabe P, Seiler G, Stehle D (2018) CRYSTALS-Kyber: a CCA-secure module-lattice-based KEM. In: 2018 IEEE European symposium on security and privacy (EuroS &P). pp. 353-367. IEEE","DOI":"10.1109\/EuroSP.2018.00032"},{"key":"367_CR7","doi-asserted-by":"crossref","unstructured":"Boyen X (2013) Attribute-based functional encryption on lattices. In: Sahai, A. (eds) Theory of Cryptography, LNCS, vol 7785. Springer, Berlin, Heidelberg pp. 122-142","DOI":"10.1007\/978-3-642-36594-2_8"},{"key":"367_CR8","doi-asserted-by":"crossref","unstructured":"Brakerski Z, Vaikuntanathan V (2016) Circuit-ABE from LWE: unbounded attributes and semi-adaptive security. In: Robshaw, M., Katz, J. (eds) Advances in Cryptology-CRYPTO 2016. CRYPTO 2016. LNCS, vol 9816, Springer, Berlin, Heidelberg, pp 363-384","DOI":"10.1007\/978-3-662-53015-3_13"},{"issue":"5","key":"367_CR9","doi-asserted-by":"publisher","first-page":"1169","DOI":"10.1109\/TIFS.2017.2779427","volume":"13","author":"W Dai","year":"2018","unstructured":"Dai W, Dor\u00f6z Y, Polyakov Y, Rohloff K, Sajjadpour H, Savas E, Sunar B (2018) Implementation and evaluation of a lattice-based key-policy ABE scheme. IEEE Trans Inf Forensics Secur 13(5):1169\u20131184","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"367_CR10","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1007\/978-3-030-77870-5_7","volume-title":"Advances in cryptology - EUROCRYPT 2021","author":"P Datta","year":"2021","unstructured":"Datta P, Komargodski I, Waters B (2021) Decentralized multi-authority ABE for DNFs from LWE. In: Canteaut A, Standaert FX (eds) Advances in cryptology - EUROCRYPT 2021, vol 12696. LNCS. Springer, Cham, pp 177\u2013209"},{"key":"367_CR11","doi-asserted-by":"crossref","unstructured":"Gentry C, Peikert C, Vaikuntanathan V (2008) Trapdoors for hard lattices and new cryptographic constructions. In: 40th annual ACM symposium on teory of computing (STOC 2008), pp. 197-206. Association for Computing Machinery, New York","DOI":"10.1145\/1374376.1374407"},{"key":"367_CR12","doi-asserted-by":"publisher","first-page":"550","DOI":"10.1007\/978-3-662-48797-6_23","volume-title":"Advances in cryptology-ASIACRYPT 2015, LNCS","author":"S Gorbunov","year":"2015","unstructured":"Gorbunov S, Vinayagamurthy D (2015) Riding on asymmetry: efficient ABE for branching programs. In: Iwata T, Cheon J (eds) Advances in cryptology-ASIACRYPT 2015, LNCS, vol 9452. Springer, Berlin, Heidelberg, pp 550\u2013574"},{"key":"367_CR13","doi-asserted-by":"crossref","unstructured":"Gorbunov S, Vaikuntanathan V, Wee H (2013) Attribute-based encryption for circuits. In: Proc. of the 44th annual ACM symposium on Theory of Computing (STOC\u201913), ACM Press, pp. 545-554","DOI":"10.1145\/2488608.2488677"},{"issue":"3","key":"367_CR14","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1007\/s00145-022-09430-6","volume":"35","author":"C Grover","year":"2022","unstructured":"Grover C, Mendelsohn A, Ling C, Vehkalahti R (2022) Non-Commutative ring learning with errors from cyclic algebras. J Cryptol 35(3):22","journal-title":"J Cryptol"},{"issue":"4","key":"367_CR15","doi-asserted-by":"publisher","first-page":"570","DOI":"10.1109\/TC.2018.2874479","volume":"68","author":"K G\u00fcr","year":"2019","unstructured":"G\u00fcr K, Polyakov Y, Rohloff K, Ryan G, Sajjadpour H, Savas E (2019) Practical applications of improved Gaussian sampling for trapdoor lattices. IEEE Trans Comput 68(4):570\u2013584","journal-title":"IEEE Trans Comput"},{"issue":"3","key":"367_CR16","doi-asserted-by":"publisher","first-page":"565","DOI":"10.1007\/s10623-014-9938-4","volume":"75","author":"A Langlois","year":"2015","unstructured":"Langlois A, Stehl\u00e9 D (2015) Worst-case to average-case reductions for module lattices. Des, Codes Cryptography 75(3):565\u2013599","journal-title":"Des, Codes Cryptography"},{"issue":"4","key":"367_CR17","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1049\/iet-ifs.2013.0111","volume":"8","author":"X Liu","year":"2013","unstructured":"Liu X, Ma J, Xiong J, Li Q, Zhang T, Zhu H (2013) Threshold attribute based encryption with attribute hierarchy for lattices in the standard model. IET Information Security 8(4):217\u2013223","journal-title":"IET Information Security"},{"issue":"3","key":"367_CR18","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/S1353-4858(20)30024-6","volume":"2020","author":"Y Liu","year":"2020","unstructured":"Liu Y, Wang L, Shen X, Li L, An D (2020) Space efficient KP-ABE from lattices and two-dimensional attributes. Secur Commun Netw 2020(3):1\u201311","journal-title":"Secur Commun Netw"},{"key":"367_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-13190-5_1","volume-title":"Advances in Cryptology-EUROCRYPT 2010, LNCS","author":"V Lyubashevsky","year":"2010","unstructured":"Lyubashevsky V, Peikert C, Regev O (2010) On ideal lattices and learning with errors over rings. In: Gilbert H (ed) Advances in Cryptology-EUROCRYPT 2010, LNCS, vol 6110. Springer, Berlin, Heidelberg, pp 1\u201323"},{"issue":"2","key":"367_CR20","doi-asserted-by":"publisher","first-page":"410","DOI":"10.3934\/amc.2023043","volume":"18","author":"A Mendelsohn","year":"2024","unstructured":"Mendelsohn A, Ling C (2024) Fractional non-norm elements for division algebras, and an application to cyclic learning with errors. Adv Math Commun 18(2):410\u2013424","journal-title":"Adv Math Commun"},{"issue":"4","key":"367_CR21","doi-asserted-by":"publisher","first-page":"441","DOI":"10.3934\/amc.2013.7.441","volume":"7","author":"F Oggier","year":"2013","unstructured":"Oggier F, Sethuraman BA (2013) Quotients of Orders in Cyclic Algebras and Space-Time Codes. Adv Math Commun 7(4):441\u2013461","journal-title":"Adv Math Commun"},{"key":"367_CR22","doi-asserted-by":"crossref","unstructured":"Peikert C (2009) Public-key cryptosystems from the worst-case shortest vector problem: extended abstract. In Proceedings of STOC \u201909, ACM, pp. 333-342","DOI":"10.1145\/1536414.1536461"},{"key":"367_CR23","doi-asserted-by":"crossref","unstructured":"Regev O (2005) On lattices, learning with errors, random linear codes, and cryptography. In: 37th Annual Acm Symposium on Theory of Computing (STOC 2005), pp. 84-93, Baltimore, May 2005. ACM, New York","DOI":"10.1145\/1060590.1060603"},{"key":"367_CR24","doi-asserted-by":"crossref","unstructured":"Sahai A, Waters B (2005) Fuzzy identity-based encryption. In: Cramer, R. (eds) Advances in Cryptology - EUROCRYPT 2005, LNCS, vol 3494. Springer, Berlin, Heidelberg, pp 457-473","DOI":"10.1007\/11426639_27"},{"issue":"Z1","key":"367_CR25","first-page":"125","volume":"37","author":"Z Sun","year":"2016","unstructured":"Sun Z, Zhu Y, Gu C, Zheng Y (2016) RLWE-based key-policy ABE scheme. J Commun 37(Z1):125\u2013131","journal-title":"J Commun"},{"key":"367_CR26","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1007\/978-3-030-26948-7_3","volume-title":"Advances in cryptology-CRYPTO 2019","author":"R Tsabary","year":"2019","unstructured":"Tsabary R (2019) Fully Secure attribute-based encryption for t-CNF from LWE. In: Boldyreva A, Micciancio D (eds) Advances in cryptology-CRYPTO 2019, vol 11692. LNCS. Springer, Cham, pp 62\u201385"},{"key":"367_CR27","series-title":"LNCS","first-page":"378","volume-title":"Information and communications security-ICICS 2019","author":"G Wang","year":"2020","unstructured":"Wang G, Liu Z, Gu D (2020) Ciphertext policy attribute-based encryption for circuits from lwe assumption. In: Zhou J, Luo X, Shen Q, Xu Z (eds) Information and communications security-ICICS 2019, vol 11999. LNCS. Springer, Cham, pp 378\u2013396"},{"key":"367_CR28","series-title":"LNCS","first-page":"651","volume-title":"Theory of cryptography-TCC 2022","author":"B Waters","year":"2022","unstructured":"Waters B, Wee H, Wu DJ (2022) Multi-authority ABE from lattices without random oracles. In: Kiltz E, Vaikuntanathan V (eds) Theory of cryptography-TCC 2022, vol 13747. LNCS. Springer, Cham, pp 651\u2013678"},{"key":"367_CR29","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1007\/978-3-031-07085-3_8","volume-title":"Advances in cryptology-EUROCRYPT 2022","author":"H Wee","year":"2022","unstructured":"Wee H (2022) Optimal broadcast encryption and CP-ABE from evasive lattice assumptions. In: Dunkelman O, Dziembowski S (eds) Advances in cryptology-EUROCRYPT 2022, vol 13276. LNCS. Springer, Cham, pp 217\u2013241"},{"issue":"4","key":"367_CR30","first-page":"775","volume":"38","author":"L Wu","year":"2015","unstructured":"Wu L, Yang X, Han Y (2015) An efficient FIBE scheme based on ideal lattices. Chinese J Comput 38(4):775\u2013782","journal-title":"Chinese J Comput"},{"key":"367_CR31","first-page":"324","volume-title":"Information security and cryptology-Inscrypt 2011, LNCS","author":"J Zhang","year":"2011","unstructured":"Zhang J, Zhang Z (2011) A Ciphertext policy attribute-based encryption scheme without pairings. In: Wu CK, Yung M, Lin D (eds) Information security and cryptology-Inscrypt 2011, LNCS, vol 7537. Springer, Berlin, Heidelberg, pp 324\u2013340"},{"issue":"3","key":"367_CR32","first-page":"483","volume":"21","author":"G Zhang","year":"2015","unstructured":"Zhang G, Qin J, Qazi S (2015) Multi-authority attribute-based encryption scheme from lattices. J Universal Comput Sci 21(3):483\u2013501","journal-title":"J Universal Comput Sci"},{"key":"367_CR33","doi-asserted-by":"crossref","unstructured":"Zhang J, Zhang Z, Ge A (2012) Ciphertext policy attribute-based encryption from lattices. In: Proc. of 7th ACM symposium on information, computer and communications security (ASIACCS\u201912), pp. 16-17. ACM","DOI":"10.1145\/2414456.2414464"},{"issue":"5","key":"367_CR34","doi-asserted-by":"publisher","first-page":"463","DOI":"10.1109\/TST.2014.6919822","volume":"19","author":"J Zhao","year":"2014","unstructured":"Zhao J, Gao H, Zhang J (2014) Attribute-based encryption for circuits on lattices. Tsinghua Sci Technol 19(5):463\u2013469","journal-title":"Tsinghua Sci Technol"},{"issue":"4","key":"367_CR35","doi-asserted-by":"publisher","first-page":"778","DOI":"10.23919\/CJE.2014.10851999","volume":"23","author":"W Zhu","year":"2014","unstructured":"Zhu W, Yu J, Wang T, Zhang P, Xie W (2014) Efficient attribute-based encryption from R-LWE. Chinese J Electron 23(4):778\u2013782","journal-title":"Chinese J Electron"}],"container-title":["Cybersecurity"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s42400-025-00367-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s42400-025-00367-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s42400-025-00367-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,13]],"date-time":"2025-10-13T00:03:17Z","timestamp":1760313797000},"score":1,"resource":{"primary":{"URL":"https:\/\/cybersecurity.springeropen.com\/articles\/10.1186\/s42400-025-00367-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,13]]},"references-count":35,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["367"],"URL":"https:\/\/doi.org\/10.1186\/s42400-025-00367-4","relation":{},"ISSN":["2523-3246"],"issn-type":[{"value":"2523-3246","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,13]]},"assertion":[{"value":"3 October 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 January 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 October 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no relevant financial or non-financial interests to disclose.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"76"}}