Revocable Identity-Based Encryption Scheme Under LWE Assumption the Standard Model

被引:4
作者
Zhang, Yaling [1 ]
Wang, Shangping [1 ]
Du, Qing [2 ]
机构
[1] Xian Univ Technol, Shaanxi Key Lab Network Comp & Secur Technol, Xian 710048, Shaanxi, Peoples R China
[2] Xian Univ Technol, Sch Sci, Xian 710048, Shaanxi, Peoples R China
基金
中国国家自然科学基金;
关键词
Internet of Things; information security; encryption; lattices; ATTRIBUTE-BASED ENCRYPTION; SHORT CIPHERTEXTS; LATTICES;
D O I
10.1109/ACCESS.2018.2855734
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A revocable identity-based encryption (IBE) scheme under learning with error (LWE) assumption from lattice is proposed; compared with the existing IBE schemes from lattices, two improvements are available in the new scheme. First, the revocation mechanism for identity of user (or thing) is added in the new scheme to manage the dynamic user (or thing) identity in the system, and making the IBE scheme from lattice becomes more practical than ever before. Second, the security of the new scheme is based on the LWE assumption from lattice, so our construction has a solid secure foundation. The scheme is proved to be secured against adaptive-ID attacks under LWE assumption from lattice in the standard model.
引用
收藏
页码:65298 / 65307
页数:10
相关论文
共 28 条
[1]  
Agrawal S, 2010, LECT NOTES COMPUT SC, V6110, P553
[2]  
Boldyreva A, 2008, CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P417
[3]  
Boneh D, 2005, LECT NOTES COMPUT SC, V3621, P258
[4]  
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P223
[5]  
Boneh D., 2001, Advances in Cryptology - CRTPTO 2001. 21st Annual International Cryptology Conference, Proceedings (Lecture Notes in Computer Science Vol.2139), P213
[6]  
Dodis Y, 2004, LECT NOTES COMPUT SC, V3027, P523
[7]  
Gentry C, 2008, ACM S THEORY COMPUT, P197
[8]  
[江明明 Jiang Mingming], 2014, [电子与信息学报, Journal of Electronics & Information Technology], V36, P645
[9]  
Jie Chen, 2012, Information Security and Privacy. Proceedings 17th Australasian Conference, ACISP 2012, P390, DOI 10.1007/978-3-642-31448-3_29
[10]  
Lewko A, 2011, LECT NOTES COMPUT SC, V6632, P547, DOI 10.1007/978-3-642-20465-4_30