Simple and Fast Identity-based Encryption From Module Lattices

被引:0
|
作者
Wei, Lihao [1 ,2 ]
Liu, Shenghan [1 ,2 ]
Long, Zhenyue [1 ,2 ]
机构
[1] Key Lab CSG Informat Testing Guangdong, Guangzhou 510000, Guangdong, Peoples R China
[2] Informat Ctr Guangdong Power Grid Corp Guangdong, Guangzhou 510000, Guangdong, Peoples R China
关键词
Module lattice; identity-based encryption; provable security; short integer solution; learning with errors;
D O I
暂无
中图分类号
R318 [生物医学工程];
学科分类号
0831 ;
摘要
Module lattices have many advantages over traditional number theory to construct security schemes. Especially, module lattice-based security schemes are potentially able to resist to quantum attacks which can break traditional number theory based ones. In this vein, this paper designed an extremely fast identity-based encryption (for short IBE) scheme from module lattices. Although the security proof has been conducted in the random oracle (for short RO) model, the keys and the ciphertext expansion rate of our scheme are comparatively small. Moreover, the main idea behind the scheme can be easily understood: combining the provably secure NTRU signature of Stehle and Steinfeld [19] with the CPA secure El Gamal-like encryption scheme proposed by Lyubashevsky, Peikert and Regev [15].
引用
收藏
页码:690 / 694
页数:5
相关论文
共 50 条
  • [1] Wildcarded identity-based encryption from lattices
    Minh Thuy Truc Pham
    Ngoc Ai Van Nguyen
    Jiang, Mei
    Dung Hoang Duong
    Susilo, Willy
    [J]. THEORETICAL COMPUTER SCIENCE, 2022, 902 : 41 - 53
  • [2] Puncturable Identity-Based Encryption from Lattices
    Dutta, Priyanka
    Susilo, Willy
    Duong, Dung Hoang
    Roy, Partha Sarathi
    [J]. INFORMATION SECURITY AND PRIVACY, ACISP 2021, 2021, 13083 : 571 - 589
  • [3] Outsourced revocable identity-based encryption from lattices
    Dong, Chengcheng
    Yang, Kang
    Qiu, Jian
    Chen, Yuanfang
    [J]. TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2019, 30 (11):
  • [4] A Novel Hierarchical Identity-Based Encryption Scheme from Lattices
    Ye, Qing
    Hu, Mingxing
    Gao, Wei
    Tang, Yongli
    [J]. CLOUD COMPUTING AND SECURITY, PT III, 2018, 11065 : 412 - 422
  • [5] Simplified Revocable Hierarchical Identity-Based Encryption from Lattices
    Wang, Shixiong
    Zhang, Juanyang
    He, Jingnan
    Wang, Huaxiong
    Li, Chao
    [J]. CRYPTOLOGY AND NETWORK SECURITY (CANS 2019), 2019, 11829 : 99 - 119
  • [6] On the Analysis of the Outsourced Revocable Identity-Based Encryption from Lattices
    Zhang, Yanhua
    Liu, Ximeng
    Hu, Yupu
    Jia, Huiwen
    [J]. NETWORK AND SYSTEM SECURITY, NSS 2021, 2021, 13041 : 79 - 99
  • [7] Identity-Based Threshold Encryption on Lattices with Application to Searchable Encryption
    Kuchta, Veronika
    Markowitch, Olivier
    [J]. APPLICATIONS AND TECHNIQUES IN INFORMATION SECURITY, 2016, 651 : 117 - 129
  • [8] Puncturable identity-based and attribute-based encryption from lattices
    Dutta, Priyanka
    Susilo, Willy
    Dung Hoang Duong
    Roy, Partha Sarathi
    [J]. THEORETICAL COMPUTER SCIENCE, 2022, 929 : 18 - 38
  • [9] Threshold Identity-Based Broadcast Encryption from Identity-Based Encryption
    Kim, Kitak
    Kim, Milyoung
    Kim, Hyoseung
    Park, Jon Hwan
    Lee, Dong Hoon
    [J]. COMPUTER APPLICATIONS FOR DATABASE, EDUCATION, AND UBIQUITOUS COMPUTING, 2012, 352 : 99 - 102
  • [10] New Constructions of Identity-Based Dual Receiver Encryption from Lattices
    Liu, Yuan
    Wang, Licheng
    Shen, Xiaoying
    Li, Lixiang
    [J]. ENTROPY, 2020, 22 (06)