Wildcarded identity-based encryption from lattices

被引:2
|
作者
Minh Thuy Truc Pham [1 ]
Ngoc Ai Van Nguyen [2 ]
Jiang, Mei [1 ]
Dung Hoang Duong [1 ]
Susilo, Willy [1 ]
机构
[1] Univ Wollongong, Sch Comp & Informat Technol, Inst Cybersecur & Cryptol, Northfields Ave, Wollongong, NSW 2522, Australia
[2] Vietnam Natl Univ, Univ Informat Technol, Dept Math & Phys, Ho Chi Minh City, Vietnam
关键词
Identity-based encryption; Wildcard; Standard model; Lattices; Learning with errors; CHALLENGES; INTERNET; THINGS;
D O I
10.1016/j.tcs.2021.12.007
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Wildcard identity-based encryption (WIRE) is a generalization of hierarchical identity-based encryption (HIRE) where a sender can simultaneously encrypt messages to a group of users matching a certain pattern, defined as a sequence of identities and wildcards. This special feature makes WIRE a promising solution to distributed IoT data security. In this paper, we propose the first construction of a post-quantum WIRE scheme. Our scheme is proven secure in the standard model, and it enjoys the security in the future quantum computer era. (C) 2021 Elsevier B.V. All rights reserved.
引用
收藏
页码:41 / 53
页数:13
相关论文
共 50 条
  • [1] Wildcarded Identity-Based Encryption
    Michel Abdalla
    James Birkett
    Dario Catalano
    Alexander W. Dent
    John Malone-Lee
    Gregory Neven
    Jacob C. N. Schuldt
    Nigel P. Smart
    [J]. Journal of Cryptology, 2011, 24 : 42 - 82
  • [2] Wildcarded Identity-Based Encryption
    Abdalla, Michel
    Birkett, James
    Catalano, Dario
    Dent, Alexander W.
    Malone-Lee, John
    Neven, Gregory
    Schuldt, Jacob C. N.
    Smart, Nigel P.
    [J]. JOURNAL OF CRYPTOLOGY, 2011, 24 (01) : 42 - 82
  • [3] Scalable Wildcarded Identity-Based Encryption
    Kim, Jihye
    Lee, Seunghwa
    Lee, Jiwon
    Oh, Hyunok
    [J]. COMPUTER SECURITY (ESORICS 2018), PT II, 2018, 11099 : 269 - 287
  • [4] Scalable Wildcarded Identity-Based Encryption with Full Security
    Lee, Jiwon
    Lee, Seunghwa
    Kim, Jihye
    Oh, Hyunok
    [J]. ELECTRONICS, 2020, 9 (09) : 1 - 23
  • [5] Puncturable Identity-Based Encryption from Lattices
    Dutta, Priyanka
    Susilo, Willy
    Duong, Dung Hoang
    Roy, Partha Sarathi
    [J]. INFORMATION SECURITY AND PRIVACY, ACISP 2021, 2021, 13083 : 571 - 589
  • [6] Outsourced revocable identity-based encryption from lattices
    Dong, Chengcheng
    Yang, Kang
    Qiu, Jian
    Chen, Yuanfang
    [J]. TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2019, 30 (11):
  • [7] Generalized Key Delegation for Wildcarded Identity-Based and Inner-Product Encryption
    Abdalla, Michel
    De Caro, Angelo
    Duong Hieu Phan
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (06) : 1695 - 1706
  • [8] A Novel Hierarchical Identity-Based Encryption Scheme from Lattices
    Ye, Qing
    Hu, Mingxing
    Gao, Wei
    Tang, Yongli
    [J]. CLOUD COMPUTING AND SECURITY, PT III, 2018, 11065 : 412 - 422
  • [9] Simple and Fast Identity-based Encryption From Module Lattices
    Wei, Lihao
    Liu, Shenghan
    Long, Zhenyue
    [J]. 2015 8TH INTERNATIONAL CONFERENCE ON BIOMEDICAL ENGINEERING AND INFORMATICS (BMEI), 2015, : 690 - 694
  • [10] Simplified Revocable Hierarchical Identity-Based Encryption from Lattices
    Wang, Shixiong
    Zhang, Juanyang
    He, Jingnan
    Wang, Huaxiong
    Li, Chao
    [J]. CRYPTOLOGY AND NETWORK SECURITY (CANS 2019), 2019, 11829 : 99 - 119