An efficient CCA-secure cryptosystem over ideal lattices from identity-based encryption

被引:8
|
作者
Yang Xiao-yuan [1 ,2 ]
Wu Li-qiang [1 ]
Zhang Min-qing [1 ]
Chen Xiao-feng [2 ]
机构
[1] Chinese Armed Police, Coll Engn, Key Lab Network & Informat Secur, Force Xian 710086, Shaanxi, Peoples R China
[2] Xidian Univ, Minist Educ, Key Lab Comp Network & Informat Secur, Xian 710071, Shaanxi, Peoples R China
基金
美国国家科学基金会;
关键词
Chosen-ciphertext security; Identity-based encryption; Public-key encryption; Ideal lattice; GENERALIZED COMPACT KNAPSACKS;
D O I
10.1016/j.camwa.2012.02.030
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
We first construct an efficient IND-sID-CPA secure IBE cyptosystem from ideal lattices, and proceed with its security proof under the standard model in detail. Then with an asymptotically efficient strongly unforgeable one-time signature, we propose a new CCA secure public key encryption (PKE) scheme over ideal lattices by universal paradigm of IBE transformation. Performance of the resulting PKE system is very close to the underlying IBE scheme and its security can be tightly reduced to decisional R-LWE hardness assumption. Compared with known CCA secure PKE schemes from standard lattices, our new scheme is simpler and more efficient. (C) 2012 Elsevier Ltd. All rights reserved.
引用
收藏
页码:1254 / 1263
页数:10
相关论文
共 50 条
  • [1] CCA-Secure Deterministic Identity-Based Encryption Scheme
    Huang, Meijuan
    Yang, Bo
    Zhao, Yi
    Liang, Kaitai
    Xue, Liang
    Yang, Xiaoyi
    [J]. JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2019, 25 (03) : 245 - 269
  • [2] Constructions of CCA-Secure Revocable Identity-Based Encryption
    Ishida, Yuu
    Watanabe, Yohei
    Shikata, Junji
    [J]. INFORMATION SECURITY AND PRIVACY (ACISP 2015), 2015, 9144 : 174 - 191
  • [3] Efficient Generic Construction of CCA-Secure Identity-Based Encryption from Randomness Extraction
    Baek, Joonsang
    Wong, Duncan S.
    Li, Jin
    Au, Man Ho
    [J]. COMPUTER JOURNAL, 2016, 59 (04): : 508 - 521
  • [4] Tightly CCA-secure identity-based encryption with ciphertext pseudorandomness
    Han, Shuai
    Liu, Shengli
    Qin, Baodong
    Gu, Dawu
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2018, 86 (03) : 517 - 554
  • [5] CCA-Secure Identity-Based Matchmaking Encryption from Standard Assumptions
    Lin, Shen
    Li, Yu
    Chen, Jie
    [J]. INFORMATION SECURITY AND CRYPTOLOGY, INSCRYPT 2023, PT I, 2024, 14526 : 253 - 273
  • [6] Efficient CCA-Secure PKE from Identity-Based Techniques
    Lai, Junzuo
    Deng, Robert H.
    Liu, Shengli
    Kou, Weidong
    [J]. TOPICS IN CRYPTOLOGY - CT-RSA 2010, PROCEEDINGS, 2010, 5985 : 132 - +
  • [7] Tightly CCA-secure identity-based encryption with ciphertext pseudorandomness
    Shuai Han
    Shengli Liu
    Baodong Qin
    Dawu Gu
    [J]. Designs, Codes and Cryptography, 2018, 86 : 517 - 554
  • [8] Lattice-Based Cryptoprocessor for CCA-Secure Identity-Based Encryption
    Renteria-Mejia, Claudia P.
    Velasco-Medina, Jaime
    [J]. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, 2020, 67 (07) : 2331 - 2344
  • [9] CCA-Secure Revocable Identity-Based Encryption With Ciphertext Evolution in the Cloud
    Sun, Yinxia
    Susilo, Willy
    Zhang, Futai
    Fu, Anmin
    [J]. IEEE ACCESS, 2018, 6 : 56977 - 56983
  • [10] A Leakage-Resilient CCA-Secure Identity-Based Encryption Scheme
    Li, Jiguo
    Teng, Meilin
    Zhang, Yichen
    Yu, Qihong
    [J]. COMPUTER JOURNAL, 2016, 59 (07): : 1066 - 1075