Adaptively Secure Identity-Based Identification from Lattices without Random Oracles

被引:0
|
作者
Rueckert, Markus [1 ]
机构
[1] Tech Univ Darmstadt, Dept Comp Sci Cryptog & Comp Algebra, Darmstadt, Germany
来源
关键词
Lattice cryptography; identification; identity-based cryptography; security model; SCHEMES; SIGNATURES; ATTACKS;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
We propose a concurrently secure, identity-based identification scheme from lattices. It offers adaptive-identity security in the standard model, quasi optimal online performance, optimal leakage resilience, and its security is based on mild worst-case assumptions in ideal lattices. Our scheme uses an ideal-lattice interpretation of the Bonsai tree concept in lattices (EUROCRYPT 2010), which we call convoluted Bonsai trees. It allows us to build an identity-based identification scheme in a new "static identity" model that is weaker than the standard "adaptive identity" model. We show that both models are equivalent under the existence of Chameleon hash functions.
引用
收藏
页码:345 / 362
页数:18
相关论文
共 50 条
  • [31] AN EFFICIENT IDENTITY-BASED RING SIGNCRYPTION SCHEME WITHOUT RANDOM ORACLES
    Sun Hua
    Guo Li
    Wang Aimin
    FOURTH INTERNATIONAL CONFERENCE ON COMPUTER AND ELECTRICAL ENGINEERING (ICCEE 2011), 2011, : 673 - +
  • [32] Fully anonymous identity-based broadcast encryption without random oracles
    Ren, Y. (ryl1982@shu.edu.cn), 1600, Femto Technique Co., Ltd. (16):
  • [33] Identity-Based Encryption Resilient to Continual Leakage Without Random Oracles
    Guo, Yuyan
    Jiang, Mingming
    Wei, Shimin
    Xie, Ming
    Sun, Mei
    FRONTIERS IN CYBER SECURITY, FCS 2019, 2019, 1105 : 53 - 64
  • [34] An identity-based strongly unforgeable signature without random oracles from bilinear pairings
    Kwon, Saeran
    INFORMATION SCIENCES, 2014, 276 : 1 - 9
  • [35] Mutative identity-based signatures or dynamic credentials without random oracles
    Guo, Fuchun
    Mu, Yi
    Chen, Zhide
    CRYPTOLOGY AND NETWORK SECURITY, 2007, 4856 : 1 - +
  • [36] New Constructions of Identity-based Broadcast Encryption without Random Oracles
    Zhang, Leyou
    Wu, Qing
    Hu, Yupu
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2011, 5 (02): : 428 - 439
  • [37] Efficient Anonymous Identity-Based Broadcast Encryption without Random Oracles
    Xie Li
    Ren Yanli
    INTERNATIONAL JOURNAL OF DIGITAL CRIME AND FORENSICS, 2014, 6 (02) : 40 - 51
  • [38] Identity-based key-insulated signature without random oracles
    Weng, Jian
    Liu, Shengli
    Chen, Kefei
    Ma, Changshe
    COMPUTATIONAL INTELLIGENCE AND SECURITY, 2007, 4456 : 470 - +
  • [39] Identity-based proxy re-encryption without random oracles
    Chu, Cheng-Kang
    Tzeng, Wen-Guey
    INFORMATION SECURITY, PROCEEDINGS, 2007, 4779 : 189 - +
  • [40] Identity-based key-insulated signature without random oracles
    Weng, Jian
    Liu, Shengli
    Chen, Kefei
    Ma, ChangShe
    2006 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PTS 1 AND 2, PROCEEDINGS, 2006, : 1253 - 1258