Lattice-based hierarchical identity-based broadcast encryption scheme in the standard model

被引:0
|
作者
Tang Yongli
Wang Mingming
Ye Qing
Qin Panke
Zhao Zongqu
机构
[1] InstituteofComputerScienceandTechnology,HenanPolytechnicUniversity
关键词
D O I
暂无
中图分类号
学科分类号
摘要
Lattice-based hierarchical identity-based broadcast encryption(H-IBBE) schemes have broad application prospects in the quantum era,because it reduces the burden of private key generator(PKG) and is suitable for one-to-many communication. However, previous lattice-based H-IBBE schemes are mostly constructed in the random oracle model with more complex trapdoor delegation process and have lower practical application. A lattice-based H-IBBE is proposed in the fixed dimension under the standard model, which mainly consists of binary tree encryption(BTE) system, MP12 trapdoor function and ABB10 b trapdoor delegation algorithm. First, this paper uses BTE system to eliminate the random oracle so that the scheme can be implemented under the standard model, and it also uses MP12 trapdoor function to reduce trapdoor generation complexity and obtains a safe and efficient trapdoor matrix; Second, this paper uses ABB10 b trapdoor delegation algorithm to delegate user's private key, and the trapdoor matrices' dimensions are the same before and after the trapdoor delegation. Comparative analysis shows that trapdoor delegation process reduces complexity, and the size of cipher-text and trapdoor matrix does not increase with deeper trapdoor delegation process. This paper achieves indistinguishability of cipher-texts under a selective chosen-cipher-text and chosen-identity attack(INDr-sID-CCA) security in the standard model based on learning with errors(LWE) hard assumption.
引用
收藏
页数:10
相关论文
共 50 条
  • [21] Chosen Ciphertext Secure Identity-Based Broadcast Encryption in the Standard Model
    孙瑾
    胡予濮
    张乐友
    [J]. Journal of Shanghai Jiaotong University(Science), 2011, 16 (06) : 672 - 676
  • [22] Cryptanalysis of a Hierarchical Identity-Based Encryption Scheme
    Weng, Jian
    Chen, Min-Rong
    Chen, Kefei
    Deng, Robert H.
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2010, E93A (04) : 854 - 856
  • [23] Identity-based Broadcast Encryption Scheme with Untrusted PKG
    Guo, Shanqing
    Zhang, Chunhua
    [J]. PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE FOR YOUNG COMPUTER SCIENTISTS, VOLS 1-5, 2008, : 1613 - 1618
  • [24] Threshold Identity-Based Broadcast Encryption from Identity-Based Encryption
    Kim, Kitak
    Kim, Milyoung
    Kim, Hyoseung
    Park, Jon Hwan
    Lee, Dong Hoon
    [J]. COMPUTER APPLICATIONS FOR DATABASE, EDUCATION, AND UBIQUITOUS COMPUTING, 2012, 352 : 99 - 102
  • [25] LMIBE: Lattice-Based Matchmaking Identity-Based Encryption for Internet of Things
    Tao, Xufeng
    Qiang, Yan
    Wang, Peng
    Wang, Yingsen
    [J]. IEEE ACCESS, 2023, 11 : 9851 - 9858
  • [26] Lattice-Based Cryptoprocessor for CCA-Secure Identity-Based Encryption
    Renteria-Mejia, Claudia P.
    Velasco-Medina, Jaime
    [J]. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, 2020, 67 (07) : 2331 - 2344
  • [27] Identity-based encryption with hierarchical key-insulation in the standard model
    Junji Shikata
    Yohei Watanabe
    [J]. Designs, Codes and Cryptography, 2019, 87 : 1005 - 1033
  • [28] Identity-based encryption with hierarchical key-insulation in the standard model
    Shikata, Junji
    Watanabe, Yohei
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2019, 87 (05) : 1005 - 1033
  • [29] Leakage-Resilient Anonymous Identity-Based Broadcast Encryption in the Standard Model
    Zhang, Leyou
    Wang, Zhuanning
    Wu, Qing
    [J]. ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2015, 2015, 9532 : 201 - 210
  • [30] Secure Hierarchical Identity Based Encryption Scheme in the Standard Model
    Ren, Yanli
    Gu, Dawu
    [J]. PROGRESS IN CRYPTOLOGY - INDOCRYPT 2008, 2008, 5365 : 104 - 115