Anonymous Lattice Identity-Based Encryption with Traceable Identities

被引:4
作者
Boyen, Xavier [1 ]
Foo, Ernest [2 ]
Li, Qinyi [2 ]
机构
[1] QUT, Brisbane, Qld, Australia
[2] Griffith Univ, Brisbane, Qld, Australia
来源
INFORMATION SECURITY AND PRIVACY, ACISP 2021 | 2021年 / 13083卷
关键词
Identity-based encryption; Anonymity; Lattice;
D O I
10.1007/978-3-030-90567-5_32
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
An anonymous identity-based encryption with tracing identities (AIBET) system enjoys that same strong privacy for receivers as a normal anonymous identity-based encryption system. Additionally, an AIBET system offers an identity tracing mechanism, which allows a tracer, who has an identity-associated tracing key, to uncover the recipient's identity from the ciphertext. In this paper, we present an AIBET system based on plain lattices by exploiting a hierarchical power of lattice trapdoors in a novel way. We prove the security of the system under the conservative learning-with-errors assumption in the standard model. This is the first AIBET system provably secure under quantum-resistant assumptions. Our construction's efficiency is comparable to the state-of-the-art lattice anonymous identity-based encryption system.
引用
收藏
页码:630 / 649
页数:20
相关论文
共 50 条
[31]   Anonymous identity-based broadcast encryption technology for smart city information system [J].
Kai He ;
Jian Weng ;
Yijun Mao ;
Huaqiang Yuan .
Personal and Ubiquitous Computing, 2017, 21 :841-853
[32]   Compact Anonymous Hierarchical Identity-Based Encryption with Constant Size Private Keys [J].
Zhang, Leyou ;
Mu, Yi ;
Wu, Qing .
COMPUTER JOURNAL, 2016, 59 (04) :452-461
[33]   Identity-based proxy matchmaking encryption for cloud-based anonymous messaging systems [J].
Yan, Zhen ;
Qu, Haipeng ;
Zhang, Xiaoshuai ;
Xu, Jian-Liang ;
Lin, Xi-Jun .
JOURNAL OF SYSTEMS ARCHITECTURE, 2023, 142
[34]   Wildcarded Identity-Based Encryption [J].
Michel Abdalla ;
James Birkett ;
Dario Catalano ;
Alexander W. Dent ;
John Malone-Lee ;
Gregory Neven ;
Jacob C. N. Schuldt ;
Nigel P. Smart .
Journal of Cryptology, 2011, 24 :42-82
[35]   Idealizing Identity-Based Encryption [J].
Hofheinz, Dennis ;
Matt, Christian ;
Maurer, Ueli .
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2015, PT I, 2015, 9452 :495-520
[36]   Wildcarded Identity-Based Encryption [J].
Abdalla, Michel ;
Birkett, James ;
Catalano, Dario ;
Dent, Alexander W. ;
Malone-Lee, John ;
Neven, Gregory ;
Schuldt, Jacob C. N. ;
Smart, Nigel P. .
JOURNAL OF CRYPTOLOGY, 2011, 24 (01) :42-82
[37]   Verifiable Identity-Based Encryption with Keyword Search for IoT from Lattice [J].
Mei, Lin ;
Xu, Chungen ;
Xu, Lei ;
Yu, Xiaoling ;
Zuo, Cong .
CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 68 (02) :2299-2314
[38]   LMIBE: Lattice-Based Matchmaking Identity-Based Encryption for Internet of Things [J].
Tao, Xufeng ;
Qiang, Yan ;
Wang, Peng ;
Wang, Yingsen .
IEEE ACCESS, 2023, 11 :9851-9858
[39]   Efficient Identity-Based Encryption from LWR [J].
Cheon, Jung Hee ;
Cho, Haejin ;
Jung, Jaewook ;
Lee, Joohee ;
Lee, Keewoo .
INFORMATION SECURITY AND CRYPTOLOGY, ICISC 2019, 2020, 11975 :225-241
[40]   Constructing Forward-Secure Identity-Based Encryption from Identity-Based Binary Tree Encryption [J].
Lu, Yang ;
Li, Jiguo .
2012 INTERNATIONAL SYMPOSIUM ON INFORMATION SCIENCE AND ENGINEERING (ISISE), 2012, :199-202