Wildcarded identity-based encryption from lattices

被引:2
作者
Minh Thuy Truc Pham [1 ]
Ngoc Ai Van Nguyen [2 ]
Jiang, Mei [1 ]
Dung Hoang Duong [1 ]
Susilo, Willy [1 ]
机构
[1] Univ Wollongong, Sch Comp & Informat Technol, Inst Cybersecur & Cryptol, Northfields Ave, Wollongong, NSW 2522, Australia
[2] Vietnam Natl Univ, Univ Informat Technol, Dept Math & Phys, Ho Chi Minh City, Vietnam
关键词
Identity-based encryption; Wildcard; Standard model; Lattices; Learning with errors; CHALLENGES; INTERNET; THINGS;
D O I
10.1016/j.tcs.2021.12.007
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Wildcard identity-based encryption (WIRE) is a generalization of hierarchical identity-based encryption (HIRE) where a sender can simultaneously encrypt messages to a group of users matching a certain pattern, defined as a sequence of identities and wildcards. This special feature makes WIRE a promising solution to distributed IoT data security. In this paper, we propose the first construction of a post-quantum WIRE scheme. Our scheme is proven secure in the standard model, and it enjoys the security in the future quantum computer era. (C) 2021 Elsevier B.V. All rights reserved.
引用
收藏
页码:41 / 53
页数:13
相关论文
共 30 条
  • [1] Abdalla M, 2006, LECT NOTES COMPUT SC, V4052, P300
  • [2] Wildcarded Identity-Based Encryption
    Abdalla, Michel
    Birkett, James
    Catalano, Dario
    Dent, Alexander W.
    Malone-Lee, John
    Neven, Gregory
    Schuldt, Jacob C. N.
    Smart, Nigel P.
    [J]. JOURNAL OF CRYPTOLOGY, 2011, 24 (01) : 42 - 82
  • [3] Agrawal S, 2010, LECT NOTES COMPUT SC, V6223, P98, DOI 10.1007/978-3-642-14623-7_6
  • [4] Agrawal S, 2010, LECT NOTES COMPUT SC, V6110, P553
  • [5] Ajtai M., 1999, Automata, Languages and Programming. 26th International Colloquium, ICALP'99. Proceedings (Lecture Notes in Computer Science Vol.1644), P1
  • [6] Generating Shorter Bases for Hard Random Lattices
    Alwen, Joel
    Peikert, Chris
    [J]. THEORY OF COMPUTING SYSTEMS, 2011, 48 (03) : 535 - 553
  • [7] Hierarchical identity based encryption with constant size ciphertext
    Boneh, D
    Boyen, X
    Goh, EJ
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2005,PROCEEDINGS, 2005, 3494 : 440 - 456
  • [8] Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P223
  • [9] Identity-based encryption from the Weil pairing
    Boneh, D
    Franklin, M
    [J]. SIAM JOURNAL ON COMPUTING, 2003, 32 (03) : 586 - 615
  • [10] Chosen-ciphertext security from identity-based encryption
    Canetti, R
    Halevi, S
    Katz, J
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2004, PROCEEDINGS, 2004, 3027 : 207 - 222