Efficient Identity-Based Encryption over NTRU Lattices

被引:0
作者
Ducas, Leo [1 ]
Lyubashevsky, Vadim [2 ]
Prest, Thomas [3 ]
机构
[1] Univ Calif San Diego, San Diego, CA 92103 USA
[2] INRIA, Ecole Normale Super, Paris, France
[3] Ecole Normale Super, Thales Commun & Secur, Paris, France
来源
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2014, PT II | 2014年 / 8874卷
基金
美国国家科学基金会;
关键词
Lattice Cryptography; Identity-Based Encryption; Digital Signatures; NTRU;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Efficient implementations of lattice-based cryptographic schemes have been limited to only the most basic primitives like encryption and digital signatures. The main reason for this limitation is that at the core of many advanced lattice primitives is a trapdoor sampling algorithm (Gentry, Peikert, Vaikuntanathan, STOC 2008) that produced outputs that were too long for practical applications. In this work, we show that using a particular distribution over NTRU lattices can make GPV-based schemes suitable for practice. More concretely, we present the first lattice-based IBE scheme with practical parameters - key and ciphertext sizes are between two and four kilobytes, and all encryption and decryption operations take approximately one millisecond on a moderately-powered laptop. As a by-product, we also obtain digital signature schemes which are shorter than the previously most-compact ones of Ducas, Durmus, Lepoint, and Lyubashevsky from Crypto 2013.
引用
收藏
页码:22 / 41
页数:20
相关论文
共 34 条
[1]  
Agrawal S, 2010, LECT NOTES COMPUT SC, V6223, P98, DOI 10.1007/978-3-642-14623-7_6
[2]   Generating Shorter Bases for Hard Random Lattices [J].
Alwen, Joel ;
Peikert, Chris .
THEORY OF COMPUTING SYSTEMS, 2011, 48 (03) :535-553
[3]  
[Anonymous], IACR CRYPTOLOGY EPRI
[4]  
[Anonymous], IACR CRYPTOLOGY EPRI
[5]  
[Anonymous], THESIS ECOLE NORMALE
[6]  
Arora S, 2011, LECT NOTES COMPUT SC, V6755, P403, DOI 10.1007/978-3-642-22006-7_34
[7]   Short group signatures [J].
Boneh, D ;
Boyen, X ;
Shacham, H .
ADVANCES IN CRYPTOLOGY - CRYPTO 2004, PROCEEDINGS, 2004, 3152 :41-55
[8]  
Boneh D., 2001, Advances in Cryptology - CRTPTO 2001. 21st Annual International Cryptology Conference, Proceedings (Lecture Notes in Computer Science Vol.2139), P213
[9]  
Camenisch J, 1997, LECT NOTES COMPUT SC, V1294, P410
[10]   Bonsai Trees, or How to Delegate a Lattice Basis [J].
Cash, David ;
Hofheinz, Dennis ;
Kiltz, Eike ;
Peikert, Chris .
JOURNAL OF CRYPTOLOGY, 2012, 25 (04) :601-639