Puncturable Identity-Based Encryption from Lattices

被引:7
|
作者
Dutta, Priyanka [1 ]
Susilo, Willy [1 ]
Duong, Dung Hoang [1 ]
Roy, Partha Sarathi [1 ]
机构
[1] Univ Wollongong, Sch Comp & Informat Technol, Inst Cybersecur & Cryptol, Northfields Ave, Wollongong, NSW 2522, Australia
来源
INFORMATION SECURITY AND PRIVACY, ACISP 2021 | 2021年 / 13083卷
基金
澳大利亚研究理事会;
关键词
Puncturable encryption; Delegatable attribute-based encryption; Learning with errors;
D O I
10.1007/978-3-030-90567-5_29
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The concept of puncturable encryption was introduced by Green and Miers at IEEE S&P 2015. Puncturable encryption allows recipients to update their decryption keys to revoke decryption capability for selected messages without communicating with senders. From the first instantiation, puncturable encryption shows its essence for many interesting applications, such as asynchronous messaging systems, group messaging systems, public-key watermarking schemes, secure cloud emails, and many more. To eliminate the necessity of having a costly certificate verification process, Wei et al. introduced puncturable identity-based encryption at ESORICS 2019. Unfortunately, till today, there is no puncturable identity-based encryption which can withstand quantum attacks. In this paper, we aim to fill this gap in the literature by presenting the first constructions of puncturable identity-based encryption, for both selective and adaptive identity, which are secure in the standard model based on the hardness of the learning with errors problem. Design ideas of proposed constructions might prove useful to construct other lattice-based expressive puncturable encryption as well.
引用
收藏
页码:571 / 589
页数:19
相关论文
共 50 条
  • [41] Multi-Keyword Searchable Identity-Based Proxy Re-Encryption from Lattices
    Zhuang, Er-Shuo
    Fan, Chun-, I
    MATHEMATICS, 2023, 11 (18)
  • [42] Identity-Based Encryption with Security Against the KGC: A Formal Model and Its Instantiation from Lattices
    Emura, Keita
    Katsumata, Shuichi
    Watanabe, Yohei
    COMPUTER SECURITY - ESORICS 2019, PT II, 2019, 11736 : 113 - 133
  • [43] An efficient CCA-secure cryptosystem over ideal lattices from identity-based encryption
    Yang Xiao-yuan
    Wu Li-qiang
    Zhang Min-qing
    Chen Xiao-feng
    COMPUTERS & MATHEMATICS WITH APPLICATIONS, 2013, 65 (09) : 1254 - 1263
  • [44] Identity-based threshold proxy re-encryption scheme from lattices and its applications
    Wu, Liqiang
    Han, Yiliang
    Yang, Xiaoyuan
    Zhang, Minqing
    FRONTIERS OF INFORMATION TECHNOLOGY & ELECTRONIC ENGINEERING, 2022, 23 (02) : 258 - 277
  • [45] Wildcarded Identity-Based Encryption
    Michel Abdalla
    James Birkett
    Dario Catalano
    Alexander W. Dent
    John Malone-Lee
    Gregory Neven
    Jacob C. N. Schuldt
    Nigel P. Smart
    Journal of Cryptology, 2011, 24 : 42 - 82
  • [46] Idealizing Identity-Based Encryption
    Hofheinz, Dennis
    Matt, Christian
    Maurer, Ueli
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2015, PT I, 2015, 9452 : 495 - 520
  • [47] Fuzzy identity-based encryption
    Sahai, A
    Waters, B
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2005,PROCEEDINGS, 2005, 3494 : 457 - 473
  • [48] Identity-based encryption and beyond
    Martin, Luther
    IEEE SECURITY & PRIVACY, 2008, 6 (05) : 62 - 64
  • [49] On the Anonymity of Identity-Based Encryption
    Luo, Song
    Hu, Ning
    JOURNAL OF APPLIED MATHEMATICS, 2013,
  • [50] Wildcarded Identity-Based Encryption
    Abdalla, Michel
    Birkett, James
    Catalano, Dario
    Dent, Alexander W.
    Malone-Lee, John
    Neven, Gregory
    Schuldt, Jacob C. N.
    Smart, Nigel P.
    JOURNAL OF CRYPTOLOGY, 2011, 24 (01) : 42 - 82