Anonymous Lattice Identity-Based Encryption with Traceable Identities

被引:4
作者
Boyen, Xavier [1 ]
Foo, Ernest [2 ]
Li, Qinyi [2 ]
机构
[1] QUT, Brisbane, Qld, Australia
[2] Griffith Univ, Brisbane, Qld, Australia
来源
INFORMATION SECURITY AND PRIVACY, ACISP 2021 | 2021年 / 13083卷
关键词
Identity-based encryption; Anonymity; Lattice;
D O I
10.1007/978-3-030-90567-5_32
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
An anonymous identity-based encryption with tracing identities (AIBET) system enjoys that same strong privacy for receivers as a normal anonymous identity-based encryption system. Additionally, an AIBET system offers an identity tracing mechanism, which allows a tracer, who has an identity-associated tracing key, to uncover the recipient's identity from the ciphertext. In this paper, we present an AIBET system based on plain lattices by exploiting a hierarchical power of lattice trapdoors in a novel way. We prove the security of the system under the conservative learning-with-errors assumption in the standard model. This is the first AIBET system provably secure under quantum-resistant assumptions. Our construction's efficiency is comparable to the state-of-the-art lattice anonymous identity-based encryption system.
引用
收藏
页码:630 / 649
页数:20
相关论文
共 50 条
[21]   Novel identity-based fully homomorphic encryption scheme from lattice [J].
Tang Y.-L. ;
Hu M.-X. ;
Liu K. ;
Ye Q. ;
Yan X.-X. .
Tongxin Xuebao/Journal on Communications, 2017, 38 (05) :39-47
[22]   Provably Secure Anonymous Multi-Receiver Identity-Based Encryption with Shorter Ciphertext [J].
Wang, Huaqun .
2014 IEEE 12TH INTERNATIONAL CONFERENCE ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING (DASC)/2014 IEEE 12TH INTERNATIONAL CONFERENCE ON EMBEDDED COMPUTING (EMBEDDEDCOM)/2014 IEEE 12TH INTERNATIONAL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING (PICOM), 2014, :85-90
[23]   Identity-Based Outsider Anonymous Broadcast Encryption with Simultaneous Individual Messaging [J].
Mandal, Mriganka ;
Nuida, Koji .
NETWORK AND SYSTEM SECURITY, NSS 2020, 2020, 12570 :167-186
[24]   Anonymous hierarchical identity-based encryption without key delegation in decryption [J].
Luo, Song .
INTERNATIONAL JOURNAL OF EMBEDDED SYSTEMS, 2015, 7 (3-4) :306-317
[25]   An improved anonymous multi-receiver identity-based encryption scheme [J].
Zhang, Jianhong ;
Mao, Jian .
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2015, 28 (04) :645-658
[26]   Deja Q Encore RIBE: Anonymous Revocable Identity-based Encryption with Short Parameters [J].
Xing, Qianqian ;
Wang, Baosheng ;
Wang, Xiaofeng ;
Tang, Yong ;
Wang, Yi .
GLOBECOM 2017 - 2017 IEEE GLOBAL COMMUNICATIONS CONFERENCE, 2017,
[27]   Novel hierarchical identity-based encryption scheme from lattice [J].
Ye Q. ;
Hu M.-X. ;
Tang Y.-L. ;
Liu K. ;
Yan X.-X. .
Tongxin Xuebao/Journal on Communications, 2017, 38 (11) :54-64
[28]   Adaptively Secure Hierarchical Identity-Based Encryption over Lattice [J].
Zhang, Leyou ;
Wu, Qing .
NETWORK AND SYSTEM SECURITY, 2017, 10394 :46-58
[29]   Lattice-based identity-based resplittable threshold public key encryption scheme [J].
Singh, Kunwar ;
Rangan, C. Pandu ;
Banerjee, A. K. .
INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 2016, 93 (02) :289-307
[30]   Anonymous identity-based broadcast encryption technology for smart city information system [J].
Kai He ;
Jian Weng ;
Yijun Mao ;
Huaqiang Yuan .
Personal and Ubiquitous Computing, 2017, 21 :841-853