Lattice-based hierarchical identity-based broadcast encryption scheme in the standard model

被引:0
|
作者
Tang Yongli
Wang Mingming
Ye Qing
Qin Panke
Zhao Zongqu
机构
[1] InstituteofComputerScienceandTechnology,HenanPolytechnicUniversity
关键词
D O I
暂无
中图分类号
学科分类号
摘要
Lattice-based hierarchical identity-based broadcast encryption(H-IBBE) schemes have broad application prospects in the quantum era,because it reduces the burden of private key generator(PKG) and is suitable for one-to-many communication. However, previous lattice-based H-IBBE schemes are mostly constructed in the random oracle model with more complex trapdoor delegation process and have lower practical application. A lattice-based H-IBBE is proposed in the fixed dimension under the standard model, which mainly consists of binary tree encryption(BTE) system, MP12 trapdoor function and ABB10 b trapdoor delegation algorithm. First, this paper uses BTE system to eliminate the random oracle so that the scheme can be implemented under the standard model, and it also uses MP12 trapdoor function to reduce trapdoor generation complexity and obtains a safe and efficient trapdoor matrix; Second, this paper uses ABB10 b trapdoor delegation algorithm to delegate user's private key, and the trapdoor matrices' dimensions are the same before and after the trapdoor delegation. Comparative analysis shows that trapdoor delegation process reduces complexity, and the size of cipher-text and trapdoor matrix does not increase with deeper trapdoor delegation process. This paper achieves indistinguishability of cipher-texts under a selective chosen-cipher-text and chosen-identity attack(INDr-sID-CCA) security in the standard model based on learning with errors(LWE) hard assumption.
引用
收藏
页数:10
相关论文
共 50 条
  • [1] Lattice-based hierarchical identity-based broadcast encryption scheme in the standard model
    Yongli T.
    Mingming W.
    Qing Y.
    Panke Q.
    Zongqu Z.
    [J]. Journal of China Universities of Posts and Telecommunications, 2019, 26 (04): : 70 - 79
  • [2] Lattice-based hierarchical identity-based broadcast encryption scheme in the standard model
    Tang Yongli
    Wang Mingming
    Ye Qing
    Qin Panke
    Zhao Zongqu
    [J]. The Journal of China Universities of Posts and Telecommunications, 2019, (04) : 70 - 79
  • [3] A Lattice-Based Identity-Based Proxy Blind Signature Scheme in the Standard Model
    Zhang, Lili
    Ma, Yanqin
    [J]. MATHEMATICAL PROBLEMS IN ENGINEERING, 2014, 2014
  • [4] Hierarchical Identity-Based Broadcast Encryption
    Liu, Weiran
    Liu, Jianwei
    Wu, Qianhong
    Qin, Bo
    [J]. INFORMATION SECURITY AND PRIVACY, ACISP 2014, 2014, 8544 : 242 - 257
  • [5] Hierarchical Identity-based Broadcast Encryption Scheme from LWE
    Yang, Chunli
    Zheng, Shihui
    Wang, Licheng
    Lu, Xiuhua
    Yang, Yixian
    [J]. JOURNAL OF COMMUNICATIONS AND NETWORKS, 2014, 16 (03) : 258 - 263
  • [6] Identity-based Threshold Broadcast Encryption in the Standard Model
    Zhang, Leyou
    Hu, Yupu
    Wu, Qing
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2010, 4 (03): : 400 - 410
  • [7] Identity-Based Unidirectional Proxy Re-encryption in Standard Model: A Lattice-Based Construction
    Dutta, Priyanka
    Susilo, Willy
    Duong, Dung Hoang
    Baek, Joonsang
    Roy, Partha Sarathi
    [J]. INFORMATION SECURITY APPLICATIONS, WISA 2020, 2020, 12583 : 245 - 257
  • [8] Lattice-based identity-based resplittable threshold public key encryption scheme
    Singh, Kunwar
    Rangan, C. Pandu
    Banerjee, A. K.
    [J]. INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 2016, 93 (02) : 289 - 307
  • [9] Revocable Hierarchical Identity-Based Broadcast Encryption
    Dawei Li
    Jianwei Liu
    Zongyang Zhang
    Qianhong Wu
    Weiran Liu
    [J]. Tsinghua Science and Technology, 2018, 23 (05) : 539 - 549
  • [10] Revocable Hierarchical Identity-Based Broadcast Encryption
    Li, Dawei
    Liu, Jianwei
    Zhang, Zongyang
    Wu, Qianhong
    Liu, Weiran
    [J]. TSINGHUA SCIENCE AND TECHNOLOGY, 2018, 23 (05) : 539 - 549