Puncturable Identity-Based Encryption from Lattices

被引:7
|
作者
Dutta, Priyanka [1 ]
Susilo, Willy [1 ]
Duong, Dung Hoang [1 ]
Roy, Partha Sarathi [1 ]
机构
[1] Univ Wollongong, Sch Comp & Informat Technol, Inst Cybersecur & Cryptol, Northfields Ave, Wollongong, NSW 2522, Australia
来源
INFORMATION SECURITY AND PRIVACY, ACISP 2021 | 2021年 / 13083卷
基金
澳大利亚研究理事会;
关键词
Puncturable encryption; Delegatable attribute-based encryption; Learning with errors;
D O I
10.1007/978-3-030-90567-5_29
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The concept of puncturable encryption was introduced by Green and Miers at IEEE S&P 2015. Puncturable encryption allows recipients to update their decryption keys to revoke decryption capability for selected messages without communicating with senders. From the first instantiation, puncturable encryption shows its essence for many interesting applications, such as asynchronous messaging systems, group messaging systems, public-key watermarking schemes, secure cloud emails, and many more. To eliminate the necessity of having a costly certificate verification process, Wei et al. introduced puncturable identity-based encryption at ESORICS 2019. Unfortunately, till today, there is no puncturable identity-based encryption which can withstand quantum attacks. In this paper, we aim to fill this gap in the literature by presenting the first constructions of puncturable identity-based encryption, for both selective and adaptive identity, which are secure in the standard model based on the hardness of the learning with errors problem. Design ideas of proposed constructions might prove useful to construct other lattice-based expressive puncturable encryption as well.
引用
收藏
页码:571 / 589
页数:19
相关论文
共 50 条
  • [21] A Novel Hierarchical Identity-Based Fully Homomorphic Encryption Scheme from Lattices
    Hu, Mingxing
    Ye, Qing
    Gao, Wei
    Tang, Yongli
    CLOUD COMPUTING AND SECURITY, PT III, 2018, 11065 : 423 - 434
  • [22] Simplified Server-Aided Revocable Identity-Based Encryption from Lattices
    Zhang, Yanhua
    Liu, Ximeng
    Hu, Yupu
    PROVABLE AND PRACTICAL SECURITY, PROVSEC 2022, 2022, 13600 : 71 - 87
  • [23] Identity-Based Encryption With Disjunctive, Conjunctive and Range Keyword Search From Lattices
    Lin, Zesheng
    Li, Hongbo
    Chen, Xinjian
    Xiao, Meiyan
    Huang, Qiong
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 8644 - 8657
  • [24] Identity-based matchmaking encryption with stronger security and instantiation on lattices
    Wang, Yuejun
    Wang, Baocang
    Lai, Qiqi
    Zhan, Yu
    THEORETICAL COMPUTER SCIENCE, 2025, 1029
  • [25] Adaptively Secure Puncturable Pseudorandom Functions via Puncturable Identity-Based KEMs
    Wang, Xin
    Li, Shimin
    Xue, Rui
    INFORMATION AND COMMUNICATIONS SECURITY (ICICS 2019), 2020, 11999 : 463 - 481
  • [26] Identity-based Signatures from Lattices
    Zaheri, Mohammad
    Sadeghiyan, Babak
    2012 SIXTH INTERNATIONAL SYMPOSIUM ON TELECOMMUNICATIONS (IST), 2012, : 1114 - 1118
  • [27] Identity-based signcryption from lattices
    Yan, Jianhua
    Wang, Licheng
    Dong, Mianxiong
    Yang, Yixian
    Yao, Wenbin
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (18) : 3751 - 3770
  • [28] Constructing Forward-Secure Identity-Based Encryption from Identity-Based Binary Tree Encryption
    Lu, Yang
    Li, Jiguo
    2012 INTERNATIONAL SYMPOSIUM ON INFORMATION SCIENCE AND ENGINEERING (ISISE), 2012, : 199 - 202
  • [29] Adaptively Secure Identity-Based Encryption from Lattices with Asymptotically Shorter Public Parameters
    Yamada, Shota
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2016, PT II, 2016, 9666 : 32 - 62
  • [30] Puncturable Attribute-Based Encryption From Lattices for Classified Document Sharing
    Yang, Mengxue
    Wang, Huaqun
    He, Debiao
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 4028 - 4042