Full secure identity-based encryption scheme with short public key size over lattices in the standard model

被引:12
|
作者
Wang, Fenghe [1 ]
Liu, ZhenHua [2 ]
Wang, Chunxiao [1 ]
机构
[1] Shandong Jianzhu Univ, Dept Math & Phys, Jinan, Peoples R China
[2] Xidian Univ, Sch Math & Stat, Xian, Peoples R China
基金
中国国家自然科学基金;
关键词
identity-based encryption; lattice; learning with errors problem; pre-image sampling function; the standard model;
D O I
10.1080/00207160.2015.1029464
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
An efficient identity-based encryption (IBE) scheme over lattice is proposed in this paper. Under the hardness of the learning with errors (LWE) problem, the proposed scheme is semantic secure against adaptive chosen identity and chosen plaintext attack in the standard model. To improve the efficiency of the lattice-based IBE scheme, unlike the identity string is encoded into a matrix by a group of public matrices in several known constructions, the identity string of l bits is encoded into a vector with the help of l + 1 vectors in this paper. With the help of this idea, we achieve the private key extraction of IBE scheme at the same lattice. Then, the public key of the proposed scheme only consists of one n x m matrix and l + 1 vectors, compared with that the public keys of the known lattice-based IBE schemes all consist as a group of n x m matrices. Hence, the public key size of this scheme is shorter than that of the known constructions.
引用
收藏
页码:854 / 863
页数:10
相关论文
共 50 条
  • [31] Semi-generic construction of public key encryption and identity-based encryption with equality test
    Lee, Hyung Tae
    Ling, San
    Seo, Jae Hong
    Wang, Huaxiong
    INFORMATION SCIENCES, 2016, 373 : 419 - 440
  • [32] Efficient chosen ciphertext secure identity-based encryption against key leakage attacks
    Sun, Shi-Feng
    Gu, Dawu
    Liu, Shengli
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (11) : 1417 - 1434
  • [33] New Constructions of Identity-Based and Key-Dependent Message Secure Encryption Schemes
    Doettling, Nico
    Garg, Sanjam
    Hajiabadi, Mohammad
    Masny, Daniel
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2018, PT I, 2018, 10769 : 3 - 31
  • [34] New identity-based broadcast encryption with constant ciphertexts in the standard model
    Wu Q.
    Wang W.
    Journal of Software, 2011, 6 (10) : 1929 - 1936
  • [35] Identity-Based Key Management Scheme for Smart Grid over Lattice
    Yu, Wangke
    Wang, Shuhua
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2023, 17 (01): : 74 - 96
  • [36] Designing a secure designated server identity-based encryption with keyword search scheme: still unsolved
    Mahnaz Noroozi
    Iman Karoubi
    Ziba Eslami
    Annals of Telecommunications, 2018, 73 : 769 - 776
  • [37] Designing a secure designated server identity-based encryption with keyword search scheme: still unsolved
    Noroozi, Mahnaz
    Karoubi, Iman
    Eslami, Ziba
    ANNALS OF TELECOMMUNICATIONS, 2018, 73 (11-12) : 769 - 776
  • [38] Anonymous Identity-Based Hash Proof System from Lattices in the Standard Model
    Lai, Qiqi
    Yang, Bo
    Yu, Yong
    Chen, Yuan
    Dong, Liju
    INFORMATION SECURITY AND PRIVACY, 2018, 10946 : 539 - 557
  • [39] Updatable Identity-Based Hash Proof System Based on Lattices and Its Application to Leakage-Resilient Public-Key Encryption Schemes
    Lai, Qi-Qi
    Yang, Bo
    Yu, Yong
    Xia, Zhe
    Zhou, Yan-Wei
    Chen, Yuan
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2018, 33 (06) : 1243 - 1260
  • [40] Updatable Identity-Based Hash Proof System Based on Lattices and Its Application to Leakage-Resilient Public-Key Encryption Schemes
    Qi-Qi Lai
    Bo Yang
    Yong Yu
    Zhe Xia
    Yan-Wei Zhou
    Yuan Chen
    Journal of Computer Science and Technology, 2018, 33 : 1243 - 1260