Improvement on a Fuzzy Identity-based Encryption Scheme

被引:2
|
作者
Zhang, Guoyan [1 ,2 ]
Wang, Feng [3 ]
机构
[1] Shandong Univ, Sch Comp Sci & Technol, Jinan, Shandong, Peoples R China
[2] Shandong Univ, Minist Educ, Cryptol Technol & Informat Secur, Jinan, Shandong, Peoples R China
[3] Audit Off Jinan Special, Jinan, Shandong, Peoples R China
基金
中国国家自然科学基金;
关键词
Fuzzy ID -Based Encryption Scheme; LWE; Sampleleft;
D O I
10.4304/jcp.9.11.2727-2732
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Sahai and Waters introduced a fuzzy id-based encryption (FIBE) scheme in which an identity was viewed as a set of descriptive attributes, and any user with a private key for an identity ID was allowed to decrypt a ciphertext encrypted with an identity ID', if and only if the identity ID and ID' were close to each other as measured by the "set overlap" distance metric. After that, Shweta Agrawal, Xavier Boyen, Vinod Vaikuntanathan, Panagiotis Voulgaris and Hoeteck Weeto constructed a fuzzy id-based encryption scheme from the hardness of the Learning With Errors (LWE) problem. The two schemes both had more longer public and private keys, and it was not very efficient. This paper gives more efficient fuzzy id-based encryption scheme from lattice, in which the public keys are greatly reduced, and there are two vectors corresponding to each bit of the identity by using of the algorithm Sampleleft introduced by Shweta Agrawal, Dan Boneh and Xavier Boyen, and only a trapdoor basis is the secret key. Furthermore, the scheme is dealing with N -bit information and is also secure from the hardness of the Learning With Errors (LWE) problem, and all these greatly raise efficiency.
引用
收藏
页码:2727 / 2732
页数:6
相关论文
共 50 条
  • [21] An Authentication Scheme Using Identity-based Encryption & Blockchain
    Zhou, Beini
    Li, Hui
    Xu, Li
    2018 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2018, : 561 - 566
  • [22] Forward-secure identity-based encryption scheme
    Yang, Hao-Miao
    Sun, Shi-Xin
    Li, Hong-Wei
    Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2007, 36 (03): : 534 - 537
  • [23] An Efficient Identity-Based Online/Offline Encryption Scheme
    Liu, Joseph K.
    Zhou, Jianying
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, 2009, 5536 : 156 - 167
  • [24] Identity-based Broadcast Encryption Scheme with Untrusted PKG
    Guo, Shanqing
    Zhang, Chunhua
    PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE FOR YOUNG COMPUTER SCIENTISTS, VOLS 1-5, 2008, : 1613 - 1618
  • [25] Leakage-resilient identity-based encryption scheme
    Li, Sujuan
    Zhang, Futai
    INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2013, 4 (2-3) : 187 - 196
  • [26] A novel encryption scheme for wireless sensor networks based on identity-based encryption
    Yang, Geng
    Yu, Xiao-Jie
    Wang, Jiang-Tao
    Cheng, Hong-Bing
    Nanjing Youdian Daxue Xuebao (Ziran Kexue Ban)/Journal of Nanjing University of Posts and Telecommunications (Natural Science), 2007, 27 (04): : 1 - 7
  • [27] Threshold Identity-Based Broadcast Encryption from Identity-Based Encryption
    Kim, Kitak
    Kim, Milyoung
    Kim, Hyoseung
    Park, Jon Hwan
    Lee, Dong Hoon
    COMPUTER APPLICATIONS FOR DATABASE, EDUCATION, AND UBIQUITOUS COMPUTING, 2012, 352 : 99 - 102
  • [28] A new practical Limited identity-based encryption scheme
    Lu, Rongxing
    Cao, Zhenfu
    Dong, Xiaolei
    FUNDAMENTA INFORMATICAE, 2007, 80 (04) : 461 - 474
  • [29] An efficient and full secure identity-based encryption scheme
    Ma, Rong
    Cao, Zhen-Fu
    Shanghai Jiaotong Daxue Xuebao/Journal of Shanghai Jiaotong University, 2010, 44 (03): : 389 - 392
  • [30] Secure Symmetric Key Fuzzy Identity-Based Encryption
    Liu, Pengtao
    MECHATRONICS AND INDUSTRIAL INFORMATICS, PTS 1-4, 2013, 321-324 : 2665 - 2668