Lattice-based hierarchical identity-based broadcast encryption scheme in the standard model

被引:0
|
作者
Yongli T. [1 ]
Mingming W. [1 ]
Qing Y. [1 ]
Panke Q. [1 ]
Zongqu Z. [1 ]
机构
[1] Institute of Computer Science and Technology, Henan Polytechnic University, Jiaozuo
基金
中国国家自然科学基金;
关键词
Fixed dimension; H-IBBE; Lattice-based cryptography; Standard model;
D O I
10.19682/j.cnki.1005-8885.2019.1019
中图分类号
学科分类号
摘要
Lattice-based hierarchical identity-based broadcast encryption (H-IBBE) schemes have broad application prospects in the quantum era,because it reduces the burden of private key generator (PKG) and is suitable for one-to-many communication. However, previous lattice-based H-IBBE schemes are mostly constructed in the random oracle model with more complex trapdoor delegation process and have lower practical application. A lattice-based H-IBBE is proposed in the fixed dimension under the standard model, which mainly consists of binary tree encryption (BTE) system, MP12 trapdoor function and ABB10b trapdoor delegation algorithm. First, this paper uses BTE system to eliminate the random oracle so that the scheme can be implemented under the standard model, and it also uses MP12 trapdoor function to reduce trapdoor generation complexity and obtains a safe and efficient trapdoor matrix; Second, this paper uses ABB10b trapdoor delegation algorithm to delegate user' s private key, and the trapdoor matrices ' dimensions are the same before and after the trapdoor delegation. Comparative analysis shows that trapdoor delegation process reduces complexity, and the size of cipher-text and trapdoor matrix does not increase with deeper trapdoor delegation process. This paper achieves indistinguishability of cipher-texts under a selective chosen-cipher-text and chosen-identity attack (INDr-sID-CCA) security in the standard model based on learning with errors (LWE) hard assumption. © 2019, Beijing University of Posts and Telecommunications. All rights reserved.
引用
收藏
页码:70 / 79
页数:9
相关论文
共 50 条
  • [41] Efficient Forward-Secure Identity-Based Encryption Scheme in the Standard Model
    Lu, Yang
    THEORETICAL AND MATHEMATICAL FOUNDATIONS OF COMPUTER SCIENCE, 2011, 164 : 62 - 69
  • [42] A Novel Hierarchical Identity-Based Encryption Scheme from Lattices
    Ye, Qing
    Hu, Mingxing
    Gao, Wei
    Tang, Yongli
    CLOUD COMPUTING AND SECURITY, PT III, 2018, 11065 : 412 - 422
  • [43] Identity-Based Matchmaking Encryption from Standard Lattice Assumptions
    Belfiore, Roberta Cimorelli
    De Cosmo, Andrea
    Ferrara, Anna Lisa
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2024, PT II, 2024, 14584 : 163 - 188
  • [44] Efficient Identity-Based Broadcast Encryption Scheme on Lattices for the Internet of Things
    He, Kai
    Liu, Xueqiao
    Liu, Jia-Nan
    Liu, Wei
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [45] A CHOSEN-CIPHERTEXT SECURE IDENTITY-BASED BROADCAST ENCRYPTION SCHEME
    Hu, Liang
    Liu, Zhe-Li
    Cheng, Xiao-Chun
    Sun, Tao
    PROCEEDINGS OF 2009 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-6, 2009, : 3556 - +
  • [46] Full Secure Identity-based Encryption Scheme over Lattices in the Standard Model
    Wang Jizhong
    Wang Chunxiao
    2015 10TH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC), 2015, : 412 - 415
  • [47] Lattice-Based Revocable Identity-Based Proxy Re-encryption with Re-encryption Verifiability
    Wang, Xiaolei
    Wang, Yang
    Wang, Mingqiang
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS (WASA 2022), PT I, 2022, 13471 : 535 - 544
  • [48] Further Analysis of a Practical Hierarchical Identity-Based Encryption Scheme
    Sun, Ying
    Yu, Yong
    Mu, Yi
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2012, E95D (06) : 1690 - 1693
  • [49] An Identity-Based (IDB) Broadcast Encryption Scheme with Personalized Messages (BEPM)
    Xu, Ke
    Liao, Yongjian
    Qiao, Li
    Liu, Zhangyun
    Yang, Xiaowei
    PLOS ONE, 2015, 10 (12):
  • [50] An Optimal Identity-Based Broadcast Encryption Scheme for Wireless Sensor Networks
    Kim, Intae
    Hwang, SeongOun
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2013, E96B (03) : 891 - 895