Puncturable Identity-Based Encryption from Lattices

被引:7
|
作者
Dutta, Priyanka [1 ]
Susilo, Willy [1 ]
Duong, Dung Hoang [1 ]
Roy, Partha Sarathi [1 ]
机构
[1] Univ Wollongong, Sch Comp & Informat Technol, Inst Cybersecur & Cryptol, Northfields Ave, Wollongong, NSW 2522, Australia
基金
澳大利亚研究理事会;
关键词
Puncturable encryption; Delegatable attribute-based encryption; Learning with errors;
D O I
10.1007/978-3-030-90567-5_29
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The concept of puncturable encryption was introduced by Green and Miers at IEEE S&P 2015. Puncturable encryption allows recipients to update their decryption keys to revoke decryption capability for selected messages without communicating with senders. From the first instantiation, puncturable encryption shows its essence for many interesting applications, such as asynchronous messaging systems, group messaging systems, public-key watermarking schemes, secure cloud emails, and many more. To eliminate the necessity of having a costly certificate verification process, Wei et al. introduced puncturable identity-based encryption at ESORICS 2019. Unfortunately, till today, there is no puncturable identity-based encryption which can withstand quantum attacks. In this paper, we aim to fill this gap in the literature by presenting the first constructions of puncturable identity-based encryption, for both selective and adaptive identity, which are secure in the standard model based on the hardness of the learning with errors problem. Design ideas of proposed constructions might prove useful to construct other lattice-based expressive puncturable encryption as well.
引用
收藏
页码:571 / 589
页数:19
相关论文
共 50 条
  • [1] Puncturable identity-based and attribute-based encryption from lattices
    Dutta, Priyanka
    Susilo, Willy
    Dung Hoang Duong
    Roy, Partha Sarathi
    THEORETICAL COMPUTER SCIENCE, 2022, 929 : 18 - 38
  • [2] Hierarchical Identity-based Puncturable Encryption from Lattices with Application to Forward Security
    Dutta, Priyanka
    Jiang, Mei
    Dung Hoang Duong
    Susilo, Willy
    Fukushima, Kazuhide
    Kiyomoto, Shinsaku
    ASIA CCS'22: PROCEEDINGS OF THE 2022 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2022, : 408 - 422
  • [3] Wildcarded identity-based encryption from lattices
    Minh Thuy Truc Pham
    Ngoc Ai Van Nguyen
    Jiang, Mei
    Dung Hoang Duong
    Susilo, Willy
    THEORETICAL COMPUTER SCIENCE, 2022, 902 : 41 - 53
  • [4] Outsourced revocable identity-based encryption from lattices
    Dong, Chengcheng
    Yang, Kang
    Qiu, Jian
    Chen, Yuanfang
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2019, 30 (11):
  • [5] A Novel Hierarchical Identity-Based Encryption Scheme from Lattices
    Ye, Qing
    Hu, Mingxing
    Gao, Wei
    Tang, Yongli
    CLOUD COMPUTING AND SECURITY, PT III, 2018, 11065 : 412 - 422
  • [6] Identity-Based Encryption from Lattices Using Approximate Trapdoors
    Izabachene, Malika
    Prabel, Lucas
    Roux-Langlois, Adeline
    INFORMATION SECURITY AND PRIVACY, ACISP 2023, 2023, 13915 : 270 - 290
  • [7] Simple and Fast Identity-based Encryption From Module Lattices
    Wei, Lihao
    Liu, Shenghan
    Long, Zhenyue
    2015 8TH INTERNATIONAL CONFERENCE ON BIOMEDICAL ENGINEERING AND INFORMATICS (BMEI), 2015, : 690 - 694
  • [8] Simplified Revocable Hierarchical Identity-Based Encryption from Lattices
    Wang, Shixiong
    Zhang, Juanyang
    He, Jingnan
    Wang, Huaxiong
    Li, Chao
    CRYPTOLOGY AND NETWORK SECURITY (CANS 2019), 2019, 11829 : 99 - 119
  • [9] On the Analysis of the Outsourced Revocable Identity-Based Encryption from Lattices
    Zhang, Yanhua
    Liu, Ximeng
    Hu, Yupu
    Jia, Huiwen
    NETWORK AND SYSTEM SECURITY, NSS 2021, 2021, 13041 : 79 - 99
  • [10] Identity-Based Threshold Encryption on Lattices with Application to Searchable Encryption
    Kuchta, Veronika
    Markowitch, Olivier
    APPLICATIONS AND TECHNIQUES IN INFORMATION SECURITY, 2016, 651 : 117 - 129