A Novel Hierarchical Identity-Based Encryption Scheme from Lattices

被引:0
作者
Ye, Qing [1 ]
Hu, Mingxing [1 ]
Gao, Wei [1 ]
Tang, Yongli [1 ]
机构
[1] Henan Polytech Univ, Coll Comp Sci & Technol, Jiaozuo 454000, Henan, Peoples R China
来源
CLOUD COMPUTING AND SECURITY, PT III | 2018年 / 11065卷
关键词
Lattice; Hierarchical Identity-Based encryption; Trapdoor function; Learning with errors; SECURE;
D O I
10.1007/978-3-030-00012-7_38
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Hierarchical identity based encryption is a powerful public key encryption scheme where entities are arranged in a directed tree. Each entity in the tree is provided with a secret key from its parent and can delegate this secret key to its children so that a child entity can decrypt messages intended for it. Aiming at the high complexity in user's private key extraction and large expansion ratio of trapdoor size in previous hierarchical identity-based encryption schemes, in this paper, we proposed a new HIBE scheme. We first used the implicit extension method to improve preimage sampling algorithm, and then we combined the improved algorithm with MP12 trapdoor delegation algorithm to construct an efficient hierarchical identity-based encryption user's private key extraction algorithm. Finally, we integrated the new extraction algorithm and the Dual-LWE algorithm to complete our scheme. Compared with the similar schemes, the efficiency of our scheme is improved in system establishment and user's private key extraction stage, the trapdoor size grows only linearly with the system hierarchical depth, and the improved preimage sample algorithm partly solves the Gaussian parameter increasing problem induced by MP12 trapdoor delegation. The security of the proposed scheme strictly reduces to the hardness of decisional learning with errors problem in the standard model.
引用
收藏
页码:412 / 422
页数:11
相关论文
共 23 条
[1]  
Agrawal S, 2012, LECT NOTES COMPUT SC, V7293, P280, DOI 10.1007/978-3-642-30057-8_17
[2]  
Agrawal S, 2010, LECT NOTES COMPUT SC, V6110, P553
[3]   Generating Shorter Bases for Hard Random Lattices [J].
Alwen, Joel ;
Peikert, Chris .
THEORY OF COMPUTING SYSTEMS, 2011, 48 (03) :535-553
[4]  
Boneh D., 2001, Advances in Cryptology - CRTPTO 2001. 21st Annual International Cryptology Conference, Proceedings (Lecture Notes in Computer Science Vol.2139), P213
[5]   Lattice-Based Fully Dynamic Multi-key FHE with Short Ciphertexts [J].
Brakerski, Zvika ;
Perlman, Renen .
ADVANCES IN CRYPTOLOGY - CRYPTO 2016, PT I, 2016, 9814 :190-213
[6]  
Cash D, 2010, LECT NOTES COMPUT SC, V6110, P523
[7]   Fuzzy extractors: How to generate strong keys from biometrics and other noisy data [J].
Dodis, Yevgeniy ;
Ostrovsky, Rafail ;
Reyzin, Leonid ;
Smith, Adam .
SIAM JOURNAL ON COMPUTING, 2008, 38 (01) :97-139
[8]  
[段然 Duan Ran], 2017, [通信学报, Journal on Communications], V38, P066
[9]   Hierarchical ID-based cryptography [J].
Gentry, C ;
Silverberg, A .
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2002, PROCEEDINGS, 2002, 2501 :548-566
[10]  
Gentry C, 2008, ACM S THEORY COMPUT, P197