Adaptively Secure Identity-Based Identification from Lattices without Random Oracles

被引:0
|
作者
Rueckert, Markus [1 ]
机构
[1] Tech Univ Darmstadt, Dept Comp Sci Cryptog & Comp Algebra, Darmstadt, Germany
来源
关键词
Lattice cryptography; identification; identity-based cryptography; security model; SCHEMES; SIGNATURES; ATTACKS;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
We propose a concurrently secure, identity-based identification scheme from lattices. It offers adaptive-identity security in the standard model, quasi optimal online performance, optimal leakage resilience, and its security is based on mild worst-case assumptions in ideal lattices. Our scheme uses an ideal-lattice interpretation of the Bonsai tree concept in lattices (EUROCRYPT 2010), which we call convoluted Bonsai trees. It allows us to build an identity-based identification scheme in a new "static identity" model that is weaker than the standard "adaptive identity" model. We show that both models are equivalent under the existence of Chameleon hash functions.
引用
收藏
页码:345 / 362
页数:18
相关论文
共 50 条
  • [1] Adaptively Secure Identity-based Threshold Broadcast Encryption without Random Oracles
    Zhang, Leyou
    Hu, Yupu
    Wu, Qing
    SMART MATERIALS AND INTELLIGENT SYSTEMS, PTS 1 AND 2, 2011, 143-144 : 347 - +
  • [2] Secure Hierarchical Identity-Based Identification without Random Oracles
    Fujioka, Atsushi
    Saito, Taiichi
    Xagawa, Keita
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2014, E97A (06) : 1307 - 1317
  • [3] Identity-based identification without random oracles
    Kurosawa, K
    Heng, SH
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2005, PT 2, 2005, 3481 : 603 - 613
  • [4] Identity-based signcryption without random oracles
    Narayan, Shivaramakrishnan
    Udaya, Parampalli
    Lee, Peter Hyun-Jeen
    SECRYPT 2008: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2008, : 342 - 347
  • [5] Strongly Unforgeable Signatures and Hierarchical Identity-Based Signatures from Lattices without Random Oracles
    Rueckert, Markus
    POST-QUANTUM CRYPTOGRAPHY, PROCEEDINGS, 2010, 6061 : 182 - 200
  • [6] Identity-Based Identification Scheme Secure against Concurrent-Reset Attacks without Random Oracles
    Thorncharoensri, Pairat
    Susilo, Willy
    Mu, Yi
    INFORMATION SECURITY APPLICATIONS, 2009, 5932 : 94 - 108
  • [7] Identity-Based Matchmaking Encryption Without Random Oracles
    Francati, Danilo
    Guidi, Alessio
    Russo, Luigi
    Venturi, Daniele
    PROGRESS IN CRYPTOLOGY, INDOCRYPT 2021, 2021, 13143 : 415 - 435
  • [8] Practical Identity-Based Encryption without random oracles
    Gentry, Craig
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2006, PROCEEDINGS, 2006, 4004 : 445 - 464
  • [9] Efficient identity-based signcryption without random oracles
    Lee, Peter Hyun-Jeen
    Parampalli, Udaya
    Narayan, Shivaramakrishnan
    Conferences in Research and Practice in Information Technology Series, 2012, 125 : 3 - 14
  • [10] Efficient selective-ID secure identity-based encryption without random oracles
    Boneh, D
    Boyen, X
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2004, PROCEEDINGS, 2004, 3027 : 223 - 238