Full secure identity-based encryption scheme with short public key size over lattices in the standard model

被引:12
|
作者
Wang, Fenghe [1 ]
Liu, ZhenHua [2 ]
Wang, Chunxiao [1 ]
机构
[1] Shandong Jianzhu Univ, Dept Math & Phys, Jinan, Peoples R China
[2] Xidian Univ, Sch Math & Stat, Xian, Peoples R China
基金
中国国家自然科学基金;
关键词
identity-based encryption; lattice; learning with errors problem; pre-image sampling function; the standard model;
D O I
10.1080/00207160.2015.1029464
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
An efficient identity-based encryption (IBE) scheme over lattice is proposed in this paper. Under the hardness of the learning with errors (LWE) problem, the proposed scheme is semantic secure against adaptive chosen identity and chosen plaintext attack in the standard model. To improve the efficiency of the lattice-based IBE scheme, unlike the identity string is encoded into a matrix by a group of public matrices in several known constructions, the identity string of l bits is encoded into a vector with the help of l + 1 vectors in this paper. With the help of this idea, we achieve the private key extraction of IBE scheme at the same lattice. Then, the public key of the proposed scheme only consists of one n x m matrix and l + 1 vectors, compared with that the public keys of the known lattice-based IBE schemes all consist as a group of n x m matrices. Hence, the public key size of this scheme is shorter than that of the known constructions.
引用
收藏
页码:854 / 863
页数:10
相关论文
共 50 条
  • [41] A New Construction of Short Hierarchical Identity-based Signature in the Standard Model
    Zhang, Leyou
    Hu, Yupu
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (04): : 180 - 186
  • [42] ESKI-IBE: Efficient and secure key issuing identity-based encryption with cloud privacy centers
    Mahender Kumar
    Satish Chand
    Multimedia Tools and Applications, 2019, 78 : 19753 - 19786
  • [43] A provably secure collusion-resistant identity-based proxy re-encryption scheme based on NTRU
    Yang, Nan
    Tian, Youliang
    Zhou, Zhou
    Zhang, Qijia
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2023, 78
  • [44] ESKI-IBE: Efficient and secure key issuing identity-based encryption with cloud privacy centers
    Kumar, Mahender
    Chand, Satish
    MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (14) : 19753 - 19786
  • [45] Binary Tree Encryption with Constant-Size Public Key in the Standard Model
    Feng, Shengyuan
    Gong, Junqing
    Chen, Jie
    COMPUTER JOURNAL, 2022, 65 (06) : 1489 - 1511
  • [46] Implementation of a Strongly Robust Identity-Based Encryption Scheme over Type-3 Pairings
    Okano, Hiroshi
    Emura, Keita
    Ishibashi, Takuya
    Ohigashi, Toshihiro
    Suzuki, Tatsuya
    2019 SEVENTH INTERNATIONAL SYMPOSIUM ON COMPUTING AND NETWORKING (CANDAR 2019), 2019, : 191 - 196
  • [47] Provable secure identity-based online/offline encryption scheme with continual leakage resilience for wireless sensor network
    Zhang, Xiujie
    Fu, Xingbing
    Hong, Lu
    Liu, Yu
    Wang, Liangliang
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2020, 16 (06):
  • [48] Lattice-based searchable public-key encryption scheme for secure cloud storage
    Xie, Run
    Xu, Chunxiang
    He, Chanlian
    Zhang, Xiaojun
    INTERNATIONAL JOURNAL OF WEB AND GRID SERVICES, 2018, 14 (01) : 3 - 20
  • [49] A public key encryption scheme based on a new variant of LWE with small cipher size
    Wang, Ziqing
    Tang, Dianhua
    Yang, Haomiao
    Li, Fagen
    JOURNAL OF SYSTEMS ARCHITECTURE, 2021, 117
  • [50] Lattice-based certificateless public-key encryption in the standard model
    Sepahi, Reza
    Steinfeld, Ron
    Pieprzyk, Josef
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2014, 13 (04) : 315 - 333