Key Encapsulation Mechanism from Multilinear Maps

被引:0
|
作者
Lv, Liqun [1 ]
Sun, Wenjun [1 ]
Yang, Xiaoyuan [1 ]
Wang, Xuan [1 ,2 ]
机构
[1] Engn Univ Peoples Armed Police, Dept Elect Technol, Xian, Shanxi, Peoples R China
[2] Xidian Univ, Xian, Shanxi, Peoples R China
关键词
CERTIFICATE-BASED SIGNATURE; SECURE;
D O I
10.1007/978-3-319-59463-7_35
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The key encapsulation mechanism (KEM) and the data encapsulation mechanism (DEM) form a hybrid encryption, which effectively solves the problem of low efficiency of public key cryptography and key distribution problems in symmetric encryption system. The security and efficiency of the key encapsulation mechanism directly affect the security and efficiency of hybrid encryption. In this paper, an identity-based key encapsulation scheme is constructed by using multilinear mapping. We proved that the scheme is under the standard model of adaptive chosen-ciphertext security. The scheme can be publicly verified and the key and ciphertext length are constant and have high efficiency.
引用
收藏
页码:349 / 357
页数:9
相关论文
共 50 条
  • [31] Ring signature scheme from multilinear maps in the standard model
    Zhang, Xiangsong
    Liu, Zhenhua
    Wang, Xu'an
    2015 10TH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC), 2015, : 859 - 864
  • [32] Attribute-Based Encryption for Circuits from Multilinear Maps
    Garg, Sanjam
    Gentry, Craig
    Halevi, Shai
    Sahai, Amit
    Waters, Brent
    ADVANCES IN CRYPTOLOGY - CRYPTO 2013, PT II, 2013, 8043 : 479 - 499
  • [33] GGHLite: More Efficient Multilinear Maps from Ideal Lattices
    Langlois, Adeline
    Stehle, Damien
    Steinfeld, Ron
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2014, 2014, 8441 : 239 - 256
  • [34] Attribute-based signatures for circuits from multilinear maps
    State Key Laboratory of Information Security, Institute of Information Engineering of Chinese Academy of Sciences, Beijing, China
    不详
    不详
    Lect. Notes Comput. Sci., (54-71):
  • [35] Forward Secure Offline Assisted Group Key Exchange From Isogeny-Based Blinded Key Encapsulation Mechanism
    Shaw, Surbhi
    Dutta, Ratna
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2023, 69 (07) : 4708 - 4722
  • [36] Benchmark Performance of the Multivariate Polynomial Public Key Encapsulation Mechanism
    Kuang, Randy
    Perepechaenko, Maria
    Toth, Ryan
    Barbeau, Michel
    RISKS AND SECURITY OF INTERNET AND SYSTEMS, CRISIS 2022, 2023, 13857 : 239 - 255
  • [37] LizarMong: Excellent Key Encapsulation Mechanism Based on RLWE and RLWR
    Jung, Chi-Gon
    Lee, JongHyeok
    Ju, Youngjin
    Kwon, Yong-Been
    Kim, Seong-Woo
    Paek, Yunheung
    INFORMATION SECURITY AND CRYPTOLOGY, ICISC 2019, 2020, 11975 : 208 - 224
  • [38] Proxy key re-encapsulation mechanism for group communications
    School of Information and Communication, Guilin University of Electronic Technology, Guilin 541004, China
    J. Comput. Inf. Syst., 2009, 1 (393-399):
  • [39] Efficient constructions of certificate-based key encapsulation mechanism
    Lu, Yang
    Li, Jiguo
    INTERNATIONAL JOURNAL OF INTERNET PROTOCOL TECHNOLOGY, 2014, 8 (2-3) : 96 - 106
  • [40] An Efficient and Compact Key Encapsulation Mechanism Based on NTRU Lattice
    Liang Z.
    Zheng J.
    Zhao Y.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2024, 61 (04): : 1049 - 1069