Improvement on a Fuzzy Identity-based Encryption Scheme

被引:2
|
作者
Zhang, Guoyan [1 ,2 ]
Wang, Feng [3 ]
机构
[1] Shandong Univ, Sch Comp Sci & Technol, Jinan, Shandong, Peoples R China
[2] Shandong Univ, Minist Educ, Cryptol Technol & Informat Secur, Jinan, Shandong, Peoples R China
[3] Audit Off Jinan Special, Jinan, Shandong, Peoples R China
基金
中国国家自然科学基金;
关键词
Fuzzy ID -Based Encryption Scheme; LWE; Sampleleft;
D O I
10.4304/jcp.9.11.2727-2732
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Sahai and Waters introduced a fuzzy id-based encryption (FIBE) scheme in which an identity was viewed as a set of descriptive attributes, and any user with a private key for an identity ID was allowed to decrypt a ciphertext encrypted with an identity ID', if and only if the identity ID and ID' were close to each other as measured by the "set overlap" distance metric. After that, Shweta Agrawal, Xavier Boyen, Vinod Vaikuntanathan, Panagiotis Voulgaris and Hoeteck Weeto constructed a fuzzy id-based encryption scheme from the hardness of the Learning With Errors (LWE) problem. The two schemes both had more longer public and private keys, and it was not very efficient. This paper gives more efficient fuzzy id-based encryption scheme from lattice, in which the public keys are greatly reduced, and there are two vectors corresponding to each bit of the identity by using of the algorithm Sampleleft introduced by Shweta Agrawal, Dan Boneh and Xavier Boyen, and only a trapdoor basis is the secret key. Furthermore, the scheme is dealing with N -bit information and is also secure from the hardness of the Learning With Errors (LWE) problem, and all these greatly raise efficiency.
引用
收藏
页码:2727 / 2732
页数:6
相关论文
共 50 条
  • [41] Hierarchical Identity-based Broadcast Encryption Scheme from LWE
    Yang, Chunli
    Zheng, Shihui
    Wang, Licheng
    Lu, Xiuhua
    Yang, Yixian
    JOURNAL OF COMMUNICATIONS AND NETWORKS, 2014, 16 (03) : 258 - 263
  • [42] Identity-based Searchable Encryption Scheme for Encrypted Email System
    Niu Shufen
    Xie Yaya
    Yang Pingping
    Wang Caifen
    Du Xiaoni
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2020, 42 (07) : 1803 - 1810
  • [43] Novel hierarchical identity-based encryption scheme from lattice
    Ye Q.
    Hu M.-X.
    Tang Y.-L.
    Liu K.
    Yan X.-X.
    Tongxin Xuebao/Journal on Communications, 2017, 38 (11): : 54 - 64
  • [44] Revocable Identity-Based Encryption Scheme with Leakage-Resilience
    Zhou Y.-W.
    Yang B.
    Xia Z.
    Lai Q.-Q.
    Zhang M.-W.
    Mu Y.
    Jisuanji Xuebao/Chinese Journal of Computers, 2020, 43 (08): : 1534 - 1554
  • [45] Identity-Based Online/Offline Encryption Scheme from LWE
    Zuo, Binger
    Li, Jiguo
    Zhang, Yichen
    Shen, Jian
    INFORMATION, 2024, 15 (09)
  • [46] Revocable Identity-Based Searchable Encryption Scheme for Smart Grid
    Wang, Aqian
    Qin, Baodong
    Fan, Yajun
    2024 6TH INTERNATIONAL CONFERENCE ON NATURAL LANGUAGE PROCESSING, ICNLP 2024, 2024, : 722 - 727
  • [47] An Efficient and Provable Secure Revocable Identity-Based Encryption Scheme
    Wang, Changji
    Li, Yuan
    Xia, Xiaonan
    Zheng, Kangjia
    PLOS ONE, 2014, 9 (09):
  • [48] Further Analysis of a Practical Hierarchical Identity-Based Encryption Scheme
    Sun, Ying
    Yu, Yong
    Mu, Yi
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2012, E95D (06) : 1690 - 1693
  • [49] Identity-Based Hybrid Format-Preserving Encryption Scheme
    Li, Shijin
    Gao, Yijia
    Shi, Ting
    PROCEEDINGS OF 2020 IEEE 5TH INFORMATION TECHNOLOGY AND MECHATRONICS ENGINEERING CONFERENCE (ITOEC 2020), 2020, : 470 - 474
  • [50] AN IDENTITY-BASED ENCRYPTION SCHEME USING ISOGENY OF ELLIPTIC CURVES
    Bahramian, Mojtaba
    Hajirezaei, Elham
    FACTA UNIVERSITATIS-SERIES MATHEMATICS AND INFORMATICS, 2020, 35 (05): : 1451 - 1460