Lattice-Based IBE with Equality Test in Standard Model

被引:24
作者
Dung Hoang Duong [1 ]
Le, Huy Quoc [1 ]
Roy, Partha Sarathi [1 ]
Susilo, Willy [1 ]
机构
[1] Univ Wollongong, Sch Comp & Informat Technol, Inst Cybersecur & Cryptol, Northfields Ave, Wollongong, NSW 2522, Australia
来源
PROVABLE SECURITY, PROVSEC 2019 | 2019年 / 11821卷
基金
澳大利亚研究理事会;
关键词
IDENTITY-BASED ENCRYPTION;
D O I
10.1007/978-3-030-31919-9_2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Public key encryption with equality test (PKEET) allows the testing of equality of underlying messages of two ciphertexts. PKEET is a potential candidate for many practical applications like efficient data management on encrypted databases. Identity-based encryption scheme with equality test (IBEET), which was introduced by Ma (Information Science 2016), can simplify the certificate management of PKEET. Potential applicability of IBEET leads to intensive research from its first instantiation. Ma's IBEET and most of the constructions are proven secure in the random oracle model based on number-theoretic hardness assumptions which are vulnerable in the post-quantum era. Recently, Lee et al. (ePrint 2016) proposed a generic construction of IBEET schemes in the standard model and hence it is possible to yield the first instantiation of IBEET schemes based on lattices. Their method is to use a 3-level hierarchical identity-based encryption (HIBE) scheme together with a one-time signature scheme. In this paper, we propose, for the first time, a concrete construction of an IBEET scheme based on the hardness assumption of lattices in the standard model and compare the data sizes with the instantiation from Lee et al. (ePrint 2016). Further, we have modified our proposed IBEET to make it secure against insider attack.
引用
收藏
页码:19 / 40
页数:22
相关论文
共 15 条
[1]  
Agrawal S, 2010, LECT NOTES COMPUT SC, V6110, P553
[2]  
Ajtai M., 1999, Automata, Languages and Programming. 26th International Colloquium, ICALP'99. Proceedings (Lecture Notes in Computer Science Vol.1644), P1
[3]  
Alwen J., 2009, Proceedings of STACS, V09001, P75, DOI [10.4230/LIPIcs.STACS, DOI 10.4230/LIPICS.STACS]
[4]  
[Anonymous], 2008, COMPUTATIONAL INTRO
[5]   Chosen-ciphertext security from identity-based encryption [J].
Boneh, Dan ;
Canetti, Ran ;
Halevi, Shai ;
Katz, Jonathan .
SIAM JOURNAL ON COMPUTING, 2006, 36 (05) :1301-1328
[6]  
Cash D, 2010, LECT NOTES COMPUT SC, V6110, P523
[7]   A Lattice-Based Public Key Encryption with Equality Test in Standard Model [J].
Dung Hoang Duong ;
Fukushima, Kazuhide ;
Kiyomoto, Shinsaku ;
Roy, Partha Sarathi ;
Susilo, Willy .
INFORMATION SECURITY AND PRIVACY, ACISP 2019, 2019, 11547 :138-155
[8]  
Lee H.T., 2016, 20161182 CRYPT
[9]   Security Analysis and Modification of ID-Based Encryption with Equality Test from ACISP 2017 [J].
Lee, Hyung Tae ;
Wang, Huaxiong ;
Zhang, Kai .
INFORMATION SECURITY AND PRIVACY, 2018, 10946 :780-786
[10]   Semi-generic construction of public key encryption and identity-based encryption with equality test [J].
Lee, Hyung Tae ;
Ling, San ;
Seo, Jae Hong ;
Wang, Huaxiong .
INFORMATION SCIENCES, 2016, 373 :419-440