Anonymous Lattice Identity-Based Encryption with Traceable Identities

被引:4
作者
Boyen, Xavier [1 ]
Foo, Ernest [2 ]
Li, Qinyi [2 ]
机构
[1] QUT, Brisbane, Qld, Australia
[2] Griffith Univ, Brisbane, Qld, Australia
来源
INFORMATION SECURITY AND PRIVACY, ACISP 2021 | 2021年 / 13083卷
关键词
Identity-based encryption; Anonymity; Lattice;
D O I
10.1007/978-3-030-90567-5_32
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
An anonymous identity-based encryption with tracing identities (AIBET) system enjoys that same strong privacy for receivers as a normal anonymous identity-based encryption system. Additionally, an AIBET system offers an identity tracing mechanism, which allows a tracer, who has an identity-associated tracing key, to uncover the recipient's identity from the ciphertext. In this paper, we present an AIBET system based on plain lattices by exploiting a hierarchical power of lattice trapdoors in a novel way. We prove the security of the system under the conservative learning-with-errors assumption in the standard model. This is the first AIBET system provably secure under quantum-resistant assumptions. Our construction's efficiency is comparable to the state-of-the-art lattice anonymous identity-based encryption system.
引用
收藏
页码:630 / 649
页数:20
相关论文
共 50 条
[1]   Anonymous Identity Based Encryption with Traceable Identities [J].
Blazy, Olivier ;
Brouilhet, Laura ;
Duong Hieu Phan .
14TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2019), 2019,
[2]   Quantum-safe Anonymous Hierarchical Identity-Based Encryption with Traceable Identities [J].
Nguyen, Ngoc Ai Van ;
Pham, Minh Thuy Truc .
COMPUTER STANDARDS & INTERFACES, 2023, 84
[3]   Anonymous Multireceiver Identity-Based Encryption [J].
Fan, Chun-I ;
Huang, Ling-Ying ;
Ho, Pei-Hsiu .
IEEE TRANSACTIONS ON COMPUTERS, 2010, 59 (09) :1239-1249
[4]   Traceable and retrievable Identity-based Encryption [J].
Au, Man Ho ;
Huang, Qiong ;
Liu, Joseph K. ;
Susilo, Willy ;
Wong, Duncan S. ;
Yang, Guomin .
APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2008, 5037 :94-+
[5]   Quantum-resistant anonymous identity-based encryption with trable identities [J].
Liu, Zi-Yuan ;
Tseng, Yi-Fan ;
Tso, Raylin ;
Mambo, Masahiro ;
Chen, Yu-Chi .
IET INFORMATION SECURITY, 2022, 16 (02) :111-126
[6]   Anonymous Key Issuing Protocol with Certified Identities in Identity-Based Encryption [J].
Yang, Yanqing ;
Wang, Jian .
SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, PT I, SECURECOMM 2023, 2025, 567 :309-328
[7]   Aitac: an identity-based traceable anonymous communication model [J].
Fengyin Li ;
Zhongxing Liu ;
Yilei Wang ;
Nan Wu ;
Jiguo Yu ;
Chongzhi Gao ;
Huiyu Zhou .
Journal of Ambient Intelligence and Humanized Computing, 2022, 13 :1353-1362
[8]   Aitac: an identity-based traceable anonymous communication model [J].
Li, Fengyin ;
Liu, Zhongxing ;
Wang, Yilei ;
Wu, Nan ;
Yu, Jiguo ;
Gao, Chongzhi ;
Zhou, Huiyu .
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2022, 13 (03) :1353-1362
[9]   Efficient Identity-based Encryption from Lattice [J].
Chen, Huiyan ;
Chen, Dongmei ;
Zhang, Yanshuo .
PROCEEDINGS OF 2013 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND CLOUD COMPUTING COMPANION (ISCC-C), 2014, :84-90
[10]   An identity-based traceable ring signatures based on lattice [J].
Liang, Junbin ;
Huang, Qiong ;
Huang, Jianye ;
Lan, Liantao ;
Au, Man Ho Allen .
PEER-TO-PEER NETWORKING AND APPLICATIONS, 2023, 16 (02) :1270-1285