Simple and Fast Identity-based Encryption From Module Lattices

被引:0
|
作者
Wei, Lihao [1 ,2 ]
Liu, Shenghan [1 ,2 ]
Long, Zhenyue [1 ,2 ]
机构
[1] Key Lab CSG Informat Testing Guangdong, Guangzhou 510000, Guangdong, Peoples R China
[2] Informat Ctr Guangdong Power Grid Corp Guangdong, Guangzhou 510000, Guangdong, Peoples R China
关键词
Module lattice; identity-based encryption; provable security; short integer solution; learning with errors;
D O I
暂无
中图分类号
R318 [生物医学工程];
学科分类号
0831 ;
摘要
Module lattices have many advantages over traditional number theory to construct security schemes. Especially, module lattice-based security schemes are potentially able to resist to quantum attacks which can break traditional number theory based ones. In this vein, this paper designed an extremely fast identity-based encryption (for short IBE) scheme from module lattices. Although the security proof has been conducted in the random oracle (for short RO) model, the keys and the ciphertext expansion rate of our scheme are comparatively small. Moreover, the main idea behind the scheme can be easily understood: combining the provably secure NTRU signature of Stehle and Steinfeld [19] with the CPA secure El Gamal-like encryption scheme proposed by Lyubashevsky, Peikert and Regev [15].
引用
收藏
页码:690 / 694
页数:5
相关论文
共 50 条
  • [21] Identity-based signcryption from lattices
    Yan, Jianhua
    Wang, Licheng
    Dong, Mianxiong
    Yang, Yixian
    Yao, Wenbin
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (18) : 3751 - 3770
  • [22] Identity-based Signatures from Lattices
    Zaheri, Mohammad
    Sadeghiyan, Babak
    [J]. 2012 SIXTH INTERNATIONAL SYMPOSIUM ON TELECOMMUNICATIONS (IST), 2012, : 1114 - 1118
  • [23] Constructing Forward-Secure Identity-Based Encryption from Identity-Based Binary Tree Encryption
    Lu, Yang
    Li, Jiguo
    [J]. 2012 INTERNATIONAL SYMPOSIUM ON INFORMATION SCIENCE AND ENGINEERING (ISISE), 2012, : 199 - 202
  • [24] Adaptively Secure Identity-Based Encryption from Lattices with Asymptotically Shorter Public Parameters
    Yamada, Shota
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2016, PT II, 2016, 9666 : 32 - 62
  • [25] Efficient Identity-Based Broadcast Encryption Scheme on Lattices for the Internet of Things
    He, Kai
    Liu, Xueqiao
    Liu, Jia-Nan
    Liu, Wei
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [26] Identity-Based Leveled Fully Homomorphic Encryption over Ideal Lattices
    Wang Weili
    Hu Bin
    Zhao Xiufeng
    [J]. 2017 IEEE 2ND INTERNATIONAL CONFERENCE ON BIG DATA ANALYSIS (ICBDA), 2017, : 382 - 386
  • [27] Practical Leakage-Resilient Identity-Based Encryption from Simple Assumptions
    Chow, Sherman S. M.
    Dodis, Yevgeniy
    Rouselakis, Yannis
    Waters, Brent
    [J]. PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10), 2010, : 152 - 161
  • [28] Efficient Identity-Based Encryption from LWR
    Cheon, Jung Hee
    Cho, Haejin
    Jung, Jaewook
    Lee, Joohee
    Lee, Keewoo
    [J]. INFORMATION SECURITY AND CRYPTOLOGY, ICISC 2019, 2020, 11975 : 225 - 241
  • [29] Identity-Based Blind Multisignature From Lattices
    Tso, Raylin
    Liu, Zi-Yuan
    Tseng, Yi-Fan
    [J]. IEEE ACCESS, 2019, 7 : 182916 - 182923
  • [30] Identity-Based Blind Signature from Lattices
    GAO Wen
    HU Yupu
    WANG Baocang
    XIE Jia
    LIU Momeng
    [J]. Wuhan University Journal of Natural Sciences, 2017, 22 (04) : 355 - 360