Lattice-based hierarchical identity-based broadcast encryption scheme in the standard model

被引:0
|
作者
Tang Yongli
Wang Mingming
Ye Qing
Qin Panke
Zhao Zongqu
机构
[1] InstituteofComputerScienceandTechnology,HenanPolytechnicUniversity
关键词
D O I
暂无
中图分类号
学科分类号
摘要
Lattice-based hierarchical identity-based broadcast encryption(H-IBBE) schemes have broad application prospects in the quantum era,because it reduces the burden of private key generator(PKG) and is suitable for one-to-many communication. However, previous lattice-based H-IBBE schemes are mostly constructed in the random oracle model with more complex trapdoor delegation process and have lower practical application. A lattice-based H-IBBE is proposed in the fixed dimension under the standard model, which mainly consists of binary tree encryption(BTE) system, MP12 trapdoor function and ABB10 b trapdoor delegation algorithm. First, this paper uses BTE system to eliminate the random oracle so that the scheme can be implemented under the standard model, and it also uses MP12 trapdoor function to reduce trapdoor generation complexity and obtains a safe and efficient trapdoor matrix; Second, this paper uses ABB10 b trapdoor delegation algorithm to delegate user's private key, and the trapdoor matrices' dimensions are the same before and after the trapdoor delegation. Comparative analysis shows that trapdoor delegation process reduces complexity, and the size of cipher-text and trapdoor matrix does not increase with deeper trapdoor delegation process. This paper achieves indistinguishability of cipher-texts under a selective chosen-cipher-text and chosen-identity attack(INDr-sID-CCA) security in the standard model based on learning with errors(LWE) hard assumption.
引用
收藏
页数:10
相关论文
共 50 条
  • [31] Efficient Hierarchical Identity Based Encryption Scheme in the Standard Model
    Ren, Yanli
    Gu, Dawu
    [J]. INFORMATICA-JOURNAL OF COMPUTING AND INFORMATICS, 2008, 32 (02): : 207 - 211
  • [32] Efficient hierarchical identity based encryption scheme in the standard model
    Ren, Yanli
    Gu, Dawu
    [J]. Informatica (Ljubljana), 2008, 32 (02) : 207 - 211
  • [33] Security of identity-based broadcast encryption
    Hu, Liang
    Liu, Zhe-Li
    Cheng, Xiao-Chun
    Sun, Tao
    [J]. Jilin Daxue Xuebao (Gongxueban)/Journal of Jilin University (Engineering and Technology Edition), 2010, 40 (01): : 165 - 170
  • [34] Identity-based encryption with wildcards in the standard model
    School of Information Engineering, Chang'an University, Xi'an, 710064, China
    不详
    不详
    [J]. J. China Univ. Post Telecom, 2009, 1 (64-68,80):
  • [36] An Efficient Identity-Based Broadcast Encryption Scheme Based on SM9
    Lai, Jian-Chang
    Huang, Xin-Yi
    He, De-Biao
    [J]. Jisuanji Xuebao/Chinese Journal of Computers, 2021, 44 (05): : 897 - 907
  • [37] Efficient Identity-based Proxy Re-encryption on Lattice in the Standard Model
    Jiang Mingming
    Guo Yuyan
    Yu Lei
    Song Wangan
    Wei Shimin
    [J]. JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2019, 41 (01) : 61 - 66
  • [38] Adaptively Secure Hierarchical Identity-Based Encryption over Lattice
    Zhang, Leyou
    Wu, Qing
    [J]. NETWORK AND SYSTEM SECURITY, 2017, 10394 : 46 - 58
  • [39] Efficient Identity-Based Broadcast Encryption Scheme on Lattices for the Internet of Things
    He, Kai
    Liu, Xueqiao
    Liu, Jia-Nan
    Liu, Wei
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [40] Revocable Identity-Based Encryption Scheme Under LWE Assumption the Standard Model
    Zhang, Yaling
    Wang, Shangping
    Du, Qing
    [J]. IEEE ACCESS, 2018, 6 : 65298 - 65307