Adaptively Chosen Ciphertext Secure Lattice IBE Based Programmable Hash Function in the Standard Model

被引:0
|
作者
Tang, Yongli [1 ]
Wang, Mingming [1 ]
Zhao, Zongqu [1 ]
Ye, Qing [1 ]
机构
[1] Henan Polytech Univ, Coll Comp Sci & Technol, Jiaozuo 454000, Henan, Peoples R China
来源
CLOUD COMPUTING AND SECURITY, PT III | 2018年 / 11065卷
关键词
Lattice; Identity-based encryption; Programmable hash function;
D O I
10.1007/978-3-030-00012-7_43
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In order to increase security of identity-based encryption (IBE) scheme in the standard model from lattice, and reduce the size of master public key, we propose a new lattice-based IBE scheme. This scheme mainly uses the identity-based lossy trapdoor function to generate trapdoor, and get the master public key, master private key and ciphertext from programmable hash function. Comparative analysis shows that, compared to MP12 trapdoor delegation algorithm, identity-based lossy trapdoor function is directly related to user's identity, at the same time the trapdoor is lossy, each different identity corresponds to a different trapdoor, it is impossible to distinguish that the master public key whether is lossy or injective for the adversary, so that the adversary is unable to obtain complete information about how to construct the trapdoor functions, this feature makes the trapdoor function more secure than other trapdoor functions. In addition, the size of master public of previous scheme is O(n) (n denotes the length of the user's identity), using programmable hash function constructs master public key of our scheme, so that our scheme master public key size is reduced to O(log n), the size of the master public key of our scheme is reduced and the efficiency of our scheme is improved. Finally, we can prove our scheme is indistinguishability from random under adaptive chosen ciphertext and chosen-identity attacks (INDr-ID-CCA) secure based on learning with error hard problem in the standard model.
引用
收藏
页码:468 / 478
页数:11
相关论文
共 50 条
  • [1] More Efficient Adaptively Secure Lattice-Based IBE with Equality Test in the Standard Model
    Asano, Kyoichi
    Emura, Keita
    Takayasu, Atsushi
    INFORMATION SECURITY, ISC 2022, 2022, 13640 : 75 - 83
  • [2] More Efficient Adaptively Secure Lattice-Based IBE with Equality Test in the Standard Model
    Asano, Kyoichi
    Emura, Keita
    Takayasu, Atsushi
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2024, E107A (03) : 248 - 259
  • [3] Chosen Ciphertext Secure Certificateless Threshold Encryption in the Standard Model
    Yang, Piyi
    Cao, Zhenfu
    Dong, Xiaolei
    INFORMATION SECURITY AND CRYPTOLOGY, 2009, 5487 : 201 - 216
  • [4] Adaptively Secure Efficient (H)IBE over Ideal Lattice with Short Parameters
    Zhang, Yuan
    Liu, Yuan
    Guo, Yurong
    Zheng, Shihui
    Wang, Licheng
    ENTROPY, 2020, 22 (11) : 1 - 19
  • [5] FORWARD -SECURE IDENTITY -BASED ENCRYPTION WITH DIRECT CHOSEN-CIPHERTEXT SECURITY IN THE STANDARD MODEL
    Lu, Yang
    Li, Jiguo
    ADVANCES IN MATHEMATICS OF COMMUNICATIONS, 2017, 11 (01) : 161 - 177
  • [6] Adaptively secure lattice-based revocable IBE in the QROM: compact parameters, tight security, and anonymity
    Takayasu, Atsushi
    DESIGNS CODES AND CRYPTOGRAPHY, 2021, 89 (08) : 1965 - 1992
  • [7] Lattice-Based IBE with Equality Test in Standard Model
    Dung Hoang Duong
    Le, Huy Quoc
    Roy, Partha Sarathi
    Susilo, Willy
    PROVABLE SECURITY, PROVSEC 2019, 2019, 11821 : 19 - 40
  • [8] Efficient Lattice (H)IBE in the Standard Model
    Agrawal, Shweta
    Boneh, Dan
    Boyen, Xavier
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2010, 2010, 6110 : 553 - +
  • [9] Generic Constructions for Chosen-Ciphertext Secure Attribute Based Encryption
    Yamada, Shota
    Attrapadung, Nuttapong
    Hanaoka, Goichiro
    Kunihiro, Noboru
    PUBLIC KEY CRYPTOGRAPHY - PKC 2011, 2011, 6571 : 71 - +
  • [10] An efficient and provably secure IBE scheme under the standard model
    Xu P.
    Cui G.-H.
    Lei F.-Y.
    Tang X.-M.
    Chen J.
    Jisuanji Xuebao/Chinese Journal of Computers, 2010, 33 (02): : 335 - 344