Lattice-based hierarchical identity-based broadcast encryption scheme in the standard model

被引:0
作者
Yongli T. [1 ]
Mingming W. [1 ]
Qing Y. [1 ]
Panke Q. [1 ]
Zongqu Z. [1 ]
机构
[1] Institute of Computer Science and Technology, Henan Polytechnic University, Jiaozuo
来源
Journal of China Universities of Posts and Telecommunications | 2019年 / 26卷 / 04期
基金
中国国家自然科学基金;
关键词
Fixed dimension; H-IBBE; Lattice-based cryptography; Standard model;
D O I
10.19682/j.cnki.1005-8885.2019.1019
中图分类号
学科分类号
摘要
Lattice-based hierarchical identity-based broadcast encryption (H-IBBE) schemes have broad application prospects in the quantum era,because it reduces the burden of private key generator (PKG) and is suitable for one-to-many communication. However, previous lattice-based H-IBBE schemes are mostly constructed in the random oracle model with more complex trapdoor delegation process and have lower practical application. A lattice-based H-IBBE is proposed in the fixed dimension under the standard model, which mainly consists of binary tree encryption (BTE) system, MP12 trapdoor function and ABB10b trapdoor delegation algorithm. First, this paper uses BTE system to eliminate the random oracle so that the scheme can be implemented under the standard model, and it also uses MP12 trapdoor function to reduce trapdoor generation complexity and obtains a safe and efficient trapdoor matrix; Second, this paper uses ABB10b trapdoor delegation algorithm to delegate user' s private key, and the trapdoor matrices ' dimensions are the same before and after the trapdoor delegation. Comparative analysis shows that trapdoor delegation process reduces complexity, and the size of cipher-text and trapdoor matrix does not increase with deeper trapdoor delegation process. This paper achieves indistinguishability of cipher-texts under a selective chosen-cipher-text and chosen-identity attack (INDr-sID-CCA) security in the standard model based on learning with errors (LWE) hard assumption. © 2019, Beijing University of Posts and Telecommunications. All rights reserved.
引用
收藏
页码:70 / 79
页数:9
相关论文
共 50 条
  • [31] Revocable identity-based encryption with bounded decryption key exposure resistance: Lattice-based construction and more.
    Takayasu, Atsushi
    Watanabe, Yohei
    [J]. THEORETICAL COMPUTER SCIENCE, 2021, 849 : 64 - 98
  • [32] Secure Identity-Based Blind Signature Scheme in the Standard Model
    Hu, Xiao-Ming
    Huang, Shang-Teng
    [J]. JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2010, 26 (01) : 215 - 230
  • [33] On the Security of an Identity-Based Proxy Signature Scheme in the Standard Model
    Sun, Ying
    Yu, Yong
    Zhang, Xiaosong
    Chai, Jiwen
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2013, E96A (03) : 721 - 723
  • [34] An Identity-based Broadcast Encryption Protocol for Ad Hoc Networks
    Zhang, Leyou
    Hu, Yupu
    Mu, Ningbo
    [J]. PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE FOR YOUNG COMPUTER SCIENTISTS, VOLS 1-5, 2008, : 1619 - +
  • [35] Hierarchical identity-based inner product functional encryption
    Song, Ge
    Deng, Yuqiao
    Huang, Qiong
    Peng, Changgen
    Tang, Chunming
    Wang, Xiaohua
    [J]. INFORMATION SCIENCES, 2021, 573 : 332 - 344
  • [36] Identity-Based Matchmaking Encryption from Standard Assumptions
    Chen, Jie
    Li, Yu
    Wen, Jinming
    Weng, Jian
    [J]. ADVANCES IN CRYPTOLOGY-ASIACRYPT 2022, PT III, 2022, 13793 : 394 - 422
  • [37] Lattice-based autonomous path proxy re-encryption in the standard model
    Xie, Wenli
    Weng, Jian
    Tong, Yao
    Liang, Xiaojian
    Yao, Lisha
    Zhao, Feixiang
    [J]. SCIENCE CHINA-INFORMATION SCIENCES, 2023, 66 (10)
  • [38] Short and provable secure lattice-based signature scheme in the standard model
    Wang Fenghe
    Liu Zhenhua
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (16) : 3627 - 3632
  • [39] Compact hierarchical identity-based encryption based on a harder decisional problem
    Galindo, David
    [J]. INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 2015, 92 (03) : 463 - 472
  • [40] An Identity-Based Proxy Signature Scheme from Lattices in the Standard Model
    Li, Wang
    [J]. 2016 8TH INTERNATIONAL CONFERENCE ON INTELLIGENT NETWORKING AND COLLABORATIVE SYSTEMS (INCOS), 2016, : 167 - 172