Adaptively Secure Identity-Based Identification from Lattices without Random Oracles

被引:0
|
作者
Rueckert, Markus [1 ]
机构
[1] Tech Univ Darmstadt, Dept Comp Sci Cryptog & Comp Algebra, Darmstadt, Germany
来源
关键词
Lattice cryptography; identification; identity-based cryptography; security model; SCHEMES; SIGNATURES; ATTACKS;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
We propose a concurrently secure, identity-based identification scheme from lattices. It offers adaptive-identity security in the standard model, quasi optimal online performance, optimal leakage resilience, and its security is based on mild worst-case assumptions in ideal lattices. Our scheme uses an ideal-lattice interpretation of the Bonsai tree concept in lattices (EUROCRYPT 2010), which we call convoluted Bonsai trees. It allows us to build an identity-based identification scheme in a new "static identity" model that is weaker than the standard "adaptive identity" model. We show that both models are equivalent under the existence of Chameleon hash functions.
引用
收藏
页码:345 / 362
页数:18
相关论文
共 50 条
  • [21] A NEW CONSTRUCTION OF IDENTITY-BASED SIGNCRYPTION WITHOUT RANDOM ORACLES
    Fan, Jia
    Zheng, Yuliang
    Tang, Xiaohu
    INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2014, 25 (01) : 1 - 23
  • [22] Anonymous hierarchical identity-based encryption (Without random oracles)
    Boyen, Xavier
    Waters, Brent
    ADVANCES IN CRYPTOLOGY - CRYPTO 2006, PROCEEDINGS, 2006, 4117 : 290 - 307
  • [23] Provably secure identity-based aggregate signcryption scheme in random oracles
    Kar, Jayaprakash
    International Journal of Network Security, 2015, 17 (05) : 580 - 587
  • [24] Identity-based Threshold Decryption Scheme Without Random Oracles
    Ming Yang
    Wang Yumin
    CHINESE JOURNAL OF ELECTRONICS, 2011, 20 (02): : 323 - 328
  • [25] New identity-based short signature without random oracles
    Zhang, Leyou
    Hu, Yupu
    Wu, Qing
    CEIS 2011, 2011, 15
  • [26] Efficient Selective Identity-Based Encryption Without Random Oracles
    Dan Boneh
    Xavier Boyen
    Journal of Cryptology, 2011, 24 : 659 - 693
  • [27] Revocable identity-based signcryption scheme without random oracles
    Zhang, Xiangsong
    Liu, Zhenhua
    Hu, Yupu
    Takagi, Tsuyoshi
    International Journal of Network Security, 2015, 17 (02) : 110 - 122
  • [28] Identity-Based Verifiably Encrypted Signatures without Random Oracles
    Zhang, Lei
    Wu, Qianhong
    Qin, Bo
    PROVABLE SECURITY, PROCEEDINGS, 2009, 5848 : 76 - 89
  • [29] Identity-based Verifiably Committed Signature Scheme without Random Oracles
    孙迅
    李建华
    陈恭亮
    Journal of Shanghai Jiaotong University, 2008, (01) : 110 - 115
  • [30] Identity-based verifiably committed signature scheme without random oracles
    Xun Sun
    Jian-hua Li
    Gong-liang Chen
    Journal of Shanghai Jiaotong University (Science), 2008, 13 (1) : 110 - 115