Adaptively Secure Identity-Based Identification from Lattices without Random Oracles

被引:0
|
作者
Rueckert, Markus [1 ]
机构
[1] Tech Univ Darmstadt, Dept Comp Sci Cryptog & Comp Algebra, Darmstadt, Germany
来源
关键词
Lattice cryptography; identification; identity-based cryptography; security model; SCHEMES; SIGNATURES; ATTACKS;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
We propose a concurrently secure, identity-based identification scheme from lattices. It offers adaptive-identity security in the standard model, quasi optimal online performance, optimal leakage resilience, and its security is based on mild worst-case assumptions in ideal lattices. Our scheme uses an ideal-lattice interpretation of the Bonsai tree concept in lattices (EUROCRYPT 2010), which we call convoluted Bonsai trees. It allows us to build an identity-based identification scheme in a new "static identity" model that is weaker than the standard "adaptive identity" model. We show that both models are equivalent under the existence of Chameleon hash functions.
引用
收藏
页码:345 / 362
页数:18
相关论文
共 50 条
  • [41] Identity-based multi-signcryption scheme without random oracles
    Zhang B.
    Xu Q.-L.
    Jisuanji Xuebao/Chinese Journal of Computers, 2010, 33 (01): : 103 - 110
  • [42] Identity-Based Chameleon Hash without Random Oracles and Application in the Mobile Internet
    Xie, Zhikang
    Shen, Qingni
    Li, Cong
    Dong, Jisheng
    Fang, Yuejian
    IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC 2021), 2021,
  • [43] Identity-based key-insulated proxy signature without random oracles
    Chen J.-H.
    Long Y.
    Chen K.-F.
    Wang Y.-T.
    Journal of Shanghai Jiaotong University (Science), 2011, 16 (05) : 557 - 566
  • [44] Identity-based parallel key-insulated signature without random oracles
    Department of Computer Science, Jinan University, Guangzhou 510632, China
    不详
    不详
    J. Inf. Sci. Eng., 2008, 4 (1143-1157):
  • [45] Identity-based Conditional Proxy Re-Encryption Without Random Oracles
    Qiu, JunJie
    Lee, YoungSil
    Lee, HoonJae
    2014 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC), 2014, : 349 - 353
  • [46] Continuous Leakage-Resilient Identity-Based Encryption without Random Oracles
    Zhou, Yanwei
    Yang, Bo
    Mu, Yi
    COMPUTER JOURNAL, 2018, 61 (04): : 586 - 600
  • [47] Identity-based threshold key-insulated signature without random oracles
    Chen, Jian-Hong
    Shan, Jing-Song
    Yang, Rong-Gen
    Gong, Le-Jun
    Chen, Ke-Fei
    Yu, Kun
    Chen, Li-Qing
    Sun, Cheng-Fu
    Shanghai Jiaotong Daxue Xuebao/Journal of Shanghai Jiaotong University, 2013, 47 (08): : 1239 - 1245
  • [48] Identity-based threshold key-insulated encryption without random oracles
    Weng, Jian
    Liu, Shengli
    Chen, Kefei
    Zheng, Dong
    Qiu, Weidong
    TOPICS IN CRYPTOLOGY - CT-RSA 2008, PROCEEDINGS, 2008, 4964 : 203 - +
  • [49] On the Security of an Improved Identity-based Proxy Signature Scheme without Random Oracles
    Zhou, Caixue
    Cui, Zongmin
    Gao, Guangyong
    JOURNAL OF INTERNET TECHNOLOGY, 2018, 19 (07): : 2057 - 2068
  • [50] Identity-based parallel key-insulated signature without random oracles
    Weng, Jian
    Li, Xiang-Xue
    Chen, Ke-Fei
    Liu, Sheng-Li
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2008, 24 (04) : 1143 - 1157