Puncturable Identity-Based Encryption from Lattices

被引:7
|
作者
Dutta, Priyanka [1 ]
Susilo, Willy [1 ]
Duong, Dung Hoang [1 ]
Roy, Partha Sarathi [1 ]
机构
[1] Univ Wollongong, Sch Comp & Informat Technol, Inst Cybersecur & Cryptol, Northfields Ave, Wollongong, NSW 2522, Australia
来源
INFORMATION SECURITY AND PRIVACY, ACISP 2021 | 2021年 / 13083卷
基金
澳大利亚研究理事会;
关键词
Puncturable encryption; Delegatable attribute-based encryption; Learning with errors;
D O I
10.1007/978-3-030-90567-5_29
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The concept of puncturable encryption was introduced by Green and Miers at IEEE S&P 2015. Puncturable encryption allows recipients to update their decryption keys to revoke decryption capability for selected messages without communicating with senders. From the first instantiation, puncturable encryption shows its essence for many interesting applications, such as asynchronous messaging systems, group messaging systems, public-key watermarking schemes, secure cloud emails, and many more. To eliminate the necessity of having a costly certificate verification process, Wei et al. introduced puncturable identity-based encryption at ESORICS 2019. Unfortunately, till today, there is no puncturable identity-based encryption which can withstand quantum attacks. In this paper, we aim to fill this gap in the literature by presenting the first constructions of puncturable identity-based encryption, for both selective and adaptive identity, which are secure in the standard model based on the hardness of the learning with errors problem. Design ideas of proposed constructions might prove useful to construct other lattice-based expressive puncturable encryption as well.
引用
收藏
页码:571 / 589
页数:19
相关论文
共 50 条
  • [31] Efficient Identity-Based Broadcast Encryption Scheme on Lattices for the Internet of Things
    He, Kai
    Liu, Xueqiao
    Liu, Jia-Nan
    Liu, Wei
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [32] Identity-Based Leveled Fully Homomorphic Encryption over Ideal Lattices
    Wang Weili
    Hu Bin
    Zhao Xiufeng
    2017 IEEE 2ND INTERNATIONAL CONFERENCE ON BIG DATA ANALYSIS (ICBDA), 2017, : 382 - 386
  • [33] Identity-Based Blind Multisignature From Lattices
    Tso, Raylin
    Liu, Zi-Yuan
    Tseng, Yi-Fan
    IEEE ACCESS, 2019, 7 : 182916 - 182923
  • [34] Efficient Identity-Based Encryption from LWR
    Cheon, Jung Hee
    Cho, Haejin
    Jung, Jaewook
    Lee, Joohee
    Lee, Keewoo
    INFORMATION SECURITY AND CRYPTOLOGY, ICISC 2019, 2020, 11975 : 225 - 241
  • [35] Identity-Based Blind Signature from Lattices
    GAO Wen
    HU Yupu
    WANG Baocang
    XIE Jia
    LIU Momeng
    WuhanUniversityJournalofNaturalSciences, 2017, 22 (04) : 355 - 360
  • [36] Identity-based chameleon hash from lattices
    Li, Yiming
    Liu, Shengli
    Journal of Computer Security, 2024, 32 (06) : 509 - 531
  • [37] Efficient Identity-Based Signature from Lattices
    Tian, Miaomiao
    Huang, Liusheng
    ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, IFIP TC 11 INTERNATIONAL CONFERENCE, SEC 2014, 2014, 428 : 321 - 329
  • [38] Identity-Based Proxy Signature from Lattices
    Kim, Kee Sung
    Hong, Dowon
    Jeong, Ik Rae
    JOURNAL OF COMMUNICATIONS AND NETWORKS, 2013, 15 (01) : 1 - 7
  • [39] Efficient Identity-based Encryption from Lattice
    Chen, Huiyan
    Chen, Dongmei
    Zhang, Yanshuo
    PROCEEDINGS OF 2013 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND CLOUD COMPUTING COMPANION (ISCC-C), 2014, : 84 - 90
  • [40] Identity-based encryption from the Weil pairing
    Boneh, D
    Franklin, M
    SIAM JOURNAL ON COMPUTING, 2003, 32 (03) : 586 - 615