Trapdoors for Ideal Lattices with Applications

被引:10
作者
Lai, Russell W. F. [1 ]
Cheung, Henry K. F. [2 ]
Chow, Sherman S. M. [1 ]
机构
[1] Chinese Univ Hong Kong, Dept Informat Engn, Shatin, Hong Kong, Peoples R China
[2] Chinese Univ Hong Kong, Dept Syst Engn & Engn Management, Shatin, Hong Kong, Peoples R China
来源
INFORMATION SECURITY AND CRYPTOLOGY (INSCRYPT 2014) | 2015年 / 8957卷
关键词
Ideal lattices; Trapdoors; Identity-based encryption; FULLY HOMOMORPHIC ENCRYPTION; IDENTITY-BASED ENCRYPTION; SECURITY;
D O I
10.1007/978-3-319-16745-9_14
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
There is a lack of more complicated ideal-lattice-based cryptosystems which require the use of lattice trapdoors, for the reason that currently known trapdoors are either only applicable to general lattices or not well-studied in the ring setting. To facilitate the development of such cryptosystems, we extend the notion of lattice trapdoors of Micciancio and Peikert (Eurocrypt '12) into the ring setting with careful justification. As a demonstration, we use the new trapdoor to construct a new hierarchical identity-based encryption scheme, which allows us to construct public-key encryption with chosen-ciphertext security, signatures, and public-key searchable encryption.
引用
收藏
页码:239 / 256
页数:18
相关论文
共 22 条
[1]   Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions [J].
Abdalla, Michel ;
Bellare, Mihir ;
Catalano, Dario ;
Kiltz, Eike ;
Kohno, Tadayoshi ;
Lange, Tanja ;
Malone-Lee, John ;
Neven, Gregory ;
Paillier, Pascal ;
Shi, Haixia .
JOURNAL OF CRYPTOLOGY, 2008, 21 (03) :350-391
[2]  
Agrawal S, 2010, LECT NOTES COMPUT SC, V6223, P98, DOI 10.1007/978-3-642-14623-7_6
[3]  
Agrawal S, 2010, LECT NOTES COMPUT SC, V6110, P553
[4]   Generating Shorter Bases for Hard Random Lattices [J].
Alwen, Joel ;
Peikert, Chris .
THEORY OF COMPUTING SYSTEMS, 2011, 48 (03) :535-553
[5]  
[Anonymous], P 12 INT C PRACT THE
[6]  
[Anonymous], THESIS NEW YORK U
[7]  
BABAI L, 1985, LECT NOTES COMPUT SC, V182, P13
[8]   Identity-based encryption from the Weil pairing [J].
Boneh, D ;
Franklin, M .
SIAM JOURNAL ON COMPUTING, 2003, 32 (03) :586-615
[9]   Chosen-ciphertext security from identity-based encryption [J].
Boneh, Dan ;
Canetti, Ran ;
Halevi, Shai ;
Katz, Jonathan .
SIAM JOURNAL ON COMPUTING, 2006, 36 (05) :1301-1328
[10]  
Boneh D, 2011, LECT NOTES COMPUT SC, V6632, P149, DOI 10.1007/978-3-642-20465-4_10