Lattice-based hierarchical identity-based broadcast encryption scheme in the standard model

被引:0
|
作者
Yongli T. [1 ]
Mingming W. [1 ]
Qing Y. [1 ]
Panke Q. [1 ]
Zongqu Z. [1 ]
机构
[1] Institute of Computer Science and Technology, Henan Polytechnic University, Jiaozuo
基金
中国国家自然科学基金;
关键词
Fixed dimension; H-IBBE; Lattice-based cryptography; Standard model;
D O I
10.19682/j.cnki.1005-8885.2019.1019
中图分类号
学科分类号
摘要
Lattice-based hierarchical identity-based broadcast encryption (H-IBBE) schemes have broad application prospects in the quantum era,because it reduces the burden of private key generator (PKG) and is suitable for one-to-many communication. However, previous lattice-based H-IBBE schemes are mostly constructed in the random oracle model with more complex trapdoor delegation process and have lower practical application. A lattice-based H-IBBE is proposed in the fixed dimension under the standard model, which mainly consists of binary tree encryption (BTE) system, MP12 trapdoor function and ABB10b trapdoor delegation algorithm. First, this paper uses BTE system to eliminate the random oracle so that the scheme can be implemented under the standard model, and it also uses MP12 trapdoor function to reduce trapdoor generation complexity and obtains a safe and efficient trapdoor matrix; Second, this paper uses ABB10b trapdoor delegation algorithm to delegate user' s private key, and the trapdoor matrices ' dimensions are the same before and after the trapdoor delegation. Comparative analysis shows that trapdoor delegation process reduces complexity, and the size of cipher-text and trapdoor matrix does not increase with deeper trapdoor delegation process. This paper achieves indistinguishability of cipher-texts under a selective chosen-cipher-text and chosen-identity attack (INDr-sID-CCA) security in the standard model based on learning with errors (LWE) hard assumption. © 2019, Beijing University of Posts and Telecommunications. All rights reserved.
引用
收藏
页码:70 / 79
页数:9
相关论文
共 50 条
  • [31] Efficient Hierarchical Identity Based Encryption Scheme in the Standard Model
    Ren, Yanli
    Gu, Dawu
    INFORMATICA-JOURNAL OF COMPUTING AND INFORMATICS, 2008, 32 (02): : 207 - 211
  • [32] Efficient hierarchical identity based encryption scheme in the standard model
    Ren, Yanli
    Gu, Dawu
    Informatica (Ljubljana), 2008, 32 (02) : 207 - 211
  • [33] Identity-based encryption with wildcards in the standard model
    School of Information Engineering, Chang'an University, Xi'an, 710064, China
    不详
    不详
    J. China Univ. Post Telecom., 2009, 1 (64-68,80):
  • [34] Security of identity-based broadcast encryption
    Hu, Liang
    Liu, Zhe-Li
    Cheng, Xiao-Chun
    Sun, Tao
    Jilin Daxue Xuebao (Gongxueban)/Journal of Jilin University (Engineering and Technology Edition), 2010, 40 (01): : 165 - 170
  • [36] An Efficient Identity-Based Broadcast Encryption Scheme Based on SM9
    Lai J.-C.
    Huang X.-Y.
    He D.-B.
    Jisuanji Xuebao/Chinese Journal of Computers, 2021, 44 (05): : 897 - 907
  • [37] Adaptively Secure Hierarchical Identity-Based Encryption over Lattice
    Zhang, Leyou
    Wu, Qing
    NETWORK AND SYSTEM SECURITY, 2017, 10394 : 46 - 58
  • [38] Efficient Identity-based Proxy Re-encryption on Lattice in the Standard Model
    Jiang Mingming
    Guo Yuyan
    Yu Lei
    Song Wangan
    Wei Shimin
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2019, 41 (01) : 61 - 66
  • [39] Efficient batch identity-based fully homomorphic encryption scheme in the standard model
    Hu, Mingxing
    Ye, Qing
    Tang, Yongli
    IET INFORMATION SECURITY, 2018, 12 (06) : 475 - 483
  • [40] Revocable Identity-Based Encryption Scheme Under LWE Assumption the Standard Model
    Zhang, Yaling
    Wang, Shangping
    Du, Qing
    IEEE ACCESS, 2018, 6 : 65298 - 65307