Quantum-safe Anonymous Hierarchical Identity-Based Encryption with Traceable Identities

被引:3
作者
Nguyen, Ngoc Ai Van [1 ]
Pham, Minh Thuy Truc [2 ]
机构
[1] Univ Informat Technol, Vietnam Natl Univ, Dept Math & Phys, Ho Chi Minh City, Vietnam
[2] Univ Wollongong Northfields Ave, Inst Cybersecur & Cryptol, Sch Comp & Informat Technol, Wollongong, NSW 2522, Australia
关键词
Hierarchical Identity-Based Encryption; Identity traceability; Anonymity; LWE problem; SIGNATURES;
D O I
10.1016/j.csi.2022.103695
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Anonymous Identity Based Encryption (AIBET) scheme allows a tracer to use the tracing key to reveal the recipient's identity from the ciphertext while keeping other data anonymous. This special feature makes AIBET a promising solution to distributed IoT data security since it can preserve both the privacy and the anonymity of a communication network but still give the server the ability to revoke the anonymity of some specific users in necessary situations (such as when their illegal behavior are detected). In this paper, we construct an efficient quantum-safe Hierarchical Identity-Based cryptosystem with Traceable Identities (AHIBET) with fully anonymous ciphertexts. We prove the security of our AHIBET scheme under the Learning with Errors (LWE) problem in the standard model.
引用
收藏
页数:10
相关论文
共 31 条
[1]  
Agrawal S, 2010, LECT NOTES COMPUT SC, V6223, P98, DOI 10.1007/978-3-642-14623-7_6
[2]  
Agrawal S, 2010, LECT NOTES COMPUT SC, V6110, P553
[3]  
[Anonymous], 1985, P WORKSH THEOR APPL
[4]   Practical Implementation of Ring-SIS/LWE Based Signature and IBE [J].
Bert, Pauline ;
Fouque, Pierre-Alain ;
Roux-Langlois, Adeline ;
Sabt, Mohamed .
POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2018, 2018, 10786 :271-291
[5]   Anonymous Identity Based Encryption with Traceable Identities [J].
Blazy, Olivier ;
Brouilhet, Laura ;
Duong Hieu Phan .
14TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2019), 2019,
[6]   Hierarchical identity based encryption with constant size ciphertext [J].
Boneh, D ;
Boyen, X ;
Goh, EJ .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2005,PROCEEDINGS, 2005, 3494 :440-456
[7]  
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P223
[8]   Identity-based encryption from the Weil pairing [J].
Boneh, D ;
Franklin, M .
SIAM JOURNAL ON COMPUTING, 2003, 32 (03) :586-615
[9]  
Boyen X, 2006, LECT NOTES COMPUT SC, V4117, P290
[10]  
Boyen X, 2006, LECT NOTES COMPUT SC, V4004, P427