Anonymous Lattice Identity-Based Encryption with Traceable Identities

被引:4
作者
Boyen, Xavier [1 ]
Foo, Ernest [2 ]
Li, Qinyi [2 ]
机构
[1] QUT, Brisbane, Qld, Australia
[2] Griffith Univ, Brisbane, Qld, Australia
来源
INFORMATION SECURITY AND PRIVACY, ACISP 2021 | 2021年 / 13083卷
关键词
Identity-based encryption; Anonymity; Lattice;
D O I
10.1007/978-3-030-90567-5_32
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
An anonymous identity-based encryption with tracing identities (AIBET) system enjoys that same strong privacy for receivers as a normal anonymous identity-based encryption system. Additionally, an AIBET system offers an identity tracing mechanism, which allows a tracer, who has an identity-associated tracing key, to uncover the recipient's identity from the ciphertext. In this paper, we present an AIBET system based on plain lattices by exploiting a hierarchical power of lattice trapdoors in a novel way. We prove the security of the system under the conservative learning-with-errors assumption in the standard model. This is the first AIBET system provably secure under quantum-resistant assumptions. Our construction's efficiency is comparable to the state-of-the-art lattice anonymous identity-based encryption system.
引用
收藏
页码:630 / 649
页数:20
相关论文
共 50 条
[41]   HIBGE: Monitorable and Traceable Anonymous Encryption in Cloud Computing [J].
Li, Dawei ;
Liu, Jianwei ;
Wu, Qianhong ;
Guan, Zhenyu .
JOURNAL OF INTERNET TECHNOLOGY, 2019, 20 (02) :637-650
[42]   Backward Compatible Identity-Based Encryption [J].
Kim, Jongkil .
SENSORS, 2023, 23 (09)
[43]   Complete robustness in identity-based encryption [J].
Cui, Hui ;
Mu, Yi ;
Au, Man Ho .
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 8782 :342-349
[44]   Complete Robustness in Identity-Based Encryption [J].
Cui, Hui ;
Mu, Yi ;
Au, Man Ho .
PROVABLE SECURITY, PROVSEC 2014, 2014, 8782 :342-349
[45]   Lattice-Based Revocable Identity-Based Proxy Re-encryption with Re-encryption Verifiability [J].
Wang, Xiaolei ;
Wang, Yang ;
Wang, Mingqiang .
WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS (WASA 2022), PT I, 2022, 13471 :535-544
[46]   Anonymous hierarchical identity-based encryption with delegated traceability for cloud-based data sharing systems [J].
Liu, Zi-Yuan ;
Mambo, Masahiro ;
Tso, Raylin ;
Tseng, Yi-Fan .
COMPUTER STANDARDS & INTERFACES, 2024, 89
[47]   Mergeable and Revocable Identity-Based Encryption [J].
Xu, Shengmin ;
Yang, Guomin ;
Mu, Yi ;
Susilo, Willy .
INFORMATION SECURITY AND PRIVACY, ACISP 2017, PT I, 2017, 10342 :147-167
[48]   Universally composable identity-based encryption [J].
Nishimaki, Roy ;
Manabe, Yoshifumi ;
Okamoto, Tatsuaki .
PROGRESS IN CRYPTOLOGY - VIETCRYPT 2006, 2006, 4341 :337-+
[49]   Universally composable identity-based encryption [J].
Nishimaki, Ryo ;
Manabe, Yoshifumi ;
Okamoto, Tatsuaki .
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2008, E91A (01) :262-271
[50]   Identity-based Encryption with Efficient Revocation [J].
Boldyreva, Alexandra ;
Goyal, Vipul ;
Kumar, Virendra .
CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2008, :417-426