Improvement on a Fuzzy Identity-based Encryption Scheme

被引:2
|
作者
Zhang, Guoyan [1 ,2 ]
Wang, Feng [3 ]
机构
[1] Shandong Univ, Sch Comp Sci & Technol, Jinan, Shandong, Peoples R China
[2] Shandong Univ, Minist Educ, Cryptol Technol & Informat Secur, Jinan, Shandong, Peoples R China
[3] Audit Off Jinan Special, Jinan, Shandong, Peoples R China
基金
中国国家自然科学基金;
关键词
Fuzzy ID -Based Encryption Scheme; LWE; Sampleleft;
D O I
10.4304/jcp.9.11.2727-2732
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Sahai and Waters introduced a fuzzy id-based encryption (FIBE) scheme in which an identity was viewed as a set of descriptive attributes, and any user with a private key for an identity ID was allowed to decrypt a ciphertext encrypted with an identity ID', if and only if the identity ID and ID' were close to each other as measured by the "set overlap" distance metric. After that, Shweta Agrawal, Xavier Boyen, Vinod Vaikuntanathan, Panagiotis Voulgaris and Hoeteck Weeto constructed a fuzzy id-based encryption scheme from the hardness of the Learning With Errors (LWE) problem. The two schemes both had more longer public and private keys, and it was not very efficient. This paper gives more efficient fuzzy id-based encryption scheme from lattice, in which the public keys are greatly reduced, and there are two vectors corresponding to each bit of the identity by using of the algorithm Sampleleft introduced by Shweta Agrawal, Dan Boneh and Xavier Boyen, and only a trapdoor basis is the secret key. Furthermore, the scheme is dealing with N -bit information and is also secure from the hardness of the Learning With Errors (LWE) problem, and all these greatly raise efficiency.
引用
收藏
页码:2727 / 2732
页数:6
相关论文
共 50 条
  • [31] Fuzzy Identity-based Encryption: New and Efficient Schemes
    Baek, Joonsang
    Susilo, Willy
    Zhou, Jianying
    CODING AND CRYPTOLOGY, 2008, 4 : 1 - +
  • [32] Fuzzy Identity-Based Matchmaking Encryption and Its Application
    Wu, Axin
    Luo, Weiqi
    Weng, Jian
    Yang, Anjia
    Wen, Jinghang
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 5592 - 5607
  • [33] Anonymous Fuzzy Identity-Based Encryption for Similarity Search
    Cheung, David W.
    Mamoulis, Nikos
    Wong, W. K.
    Yiu, S. M.
    Zhang, Ye
    ALGORITHMS AND COMPUTATION, PT I, 2010, 6506 : 61 - 72
  • [34] New Fuzzy Identity-Based Encryption in the Standard Model
    Ren, Yanli
    Gu, Dawu
    Wang, Shuozhong
    Zhang, Xinpeng
    INFORMATICA, 2010, 21 (03) : 393 - 407
  • [35] A Chosen-Ciphertext Secure Fuzzy Identity-Based Proxy Re-Encryption Scheme
    Ge, Chunpeng
    Wang, Jiandong
    Fang, Liming
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (05): : 347 - 360
  • [36] CCA-Secure Deterministic Identity-Based Encryption Scheme
    Huang, Meijuan
    Yang, Bo
    Zhao, Yi
    Liang, Kaitai
    Xue, Liang
    Yang, Xiaoyi
    JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2019, 25 (03) : 245 - 269
  • [37] An Improved Identity-Based Encryption Scheme without Bilinear Map
    Zheng, Minghui
    Zhou, Huihua
    Cui, Guohua
    MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 374 - 377
  • [38] A Novel Hierarchical Identity-Based Encryption Scheme from Lattices
    Ye, Qing
    Hu, Mingxing
    Gao, Wei
    Tang, Yongli
    CLOUD COMPUTING AND SECURITY, PT III, 2018, 11065 : 412 - 422
  • [39] Hierarchial Identity-Based Encryption Scheme from Multilinear Maps
    Wang, Hao
    Zheng, Zhihua
    Wu, Lei
    2014 TENTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2014, : 455 - 458
  • [40] Anonymous identity-based encryption scheme in groups of prime order
    Ren, Yan-Li
    Zhang, Xin-Peng
    Qian, Zhen-Xing
    Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2013, 36 (05): : 96 - 98