Wildcarded identity-based encryption from lattices

被引:2
|
作者
Minh Thuy Truc Pham [1 ]
Ngoc Ai Van Nguyen [2 ]
Jiang, Mei [1 ]
Dung Hoang Duong [1 ]
Susilo, Willy [1 ]
机构
[1] Univ Wollongong, Sch Comp & Informat Technol, Inst Cybersecur & Cryptol, Northfields Ave, Wollongong, NSW 2522, Australia
[2] Vietnam Natl Univ, Univ Informat Technol, Dept Math & Phys, Ho Chi Minh City, Vietnam
关键词
Identity-based encryption; Wildcard; Standard model; Lattices; Learning with errors; CHALLENGES; INTERNET; THINGS;
D O I
10.1016/j.tcs.2021.12.007
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Wildcard identity-based encryption (WIRE) is a generalization of hierarchical identity-based encryption (HIRE) where a sender can simultaneously encrypt messages to a group of users matching a certain pattern, defined as a sequence of identities and wildcards. This special feature makes WIRE a promising solution to distributed IoT data security. In this paper, we propose the first construction of a post-quantum WIRE scheme. Our scheme is proven secure in the standard model, and it enjoys the security in the future quantum computer era. (C) 2021 Elsevier B.V. All rights reserved.
引用
收藏
页码:41 / 53
页数:13
相关论文
共 50 条
  • [31] Identity-Based Leveled Fully Homomorphic Encryption over Ideal Lattices
    Wang Weili
    Hu Bin
    Zhao Xiufeng
    [J]. 2017 IEEE 2ND INTERNATIONAL CONFERENCE ON BIG DATA ANALYSIS (ICBDA), 2017, : 382 - 386
  • [32] Efficient Identity-Based Encryption from LWR
    Cheon, Jung Hee
    Cho, Haejin
    Jung, Jaewook
    Lee, Joohee
    Lee, Keewoo
    [J]. INFORMATION SECURITY AND CRYPTOLOGY, ICISC 2019, 2020, 11975 : 225 - 241
  • [33] Identity-Based Blind Multisignature From Lattices
    Tso, Raylin
    Liu, Zi-Yuan
    Tseng, Yi-Fan
    [J]. IEEE ACCESS, 2019, 7 : 182916 - 182923
  • [34] Identity-Based Blind Signature from Lattices
    GAO Wen
    HU Yupu
    WANG Baocang
    XIE Jia
    LIU Momeng
    [J]. Wuhan University Journal of Natural Sciences, 2017, 22 (04) : 355 - 360
  • [35] Identity-based chameleon hash from lattices
    Li, Yiming
    Liu, Shengli
    [J]. Journal of Computer Security, 2024, 32 (06) : 509 - 531
  • [36] Efficient Identity-Based Signature from Lattices
    Tian, Miaomiao
    Huang, Liusheng
    [J]. ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, IFIP TC 11 INTERNATIONAL CONFERENCE, SEC 2014, 2014, 428 : 321 - 329
  • [37] Efficient Identity-based Encryption from Lattice
    Chen, Huiyan
    Chen, Dongmei
    Zhang, Yanshuo
    [J]. PROCEEDINGS OF 2013 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND CLOUD COMPUTING COMPANION (ISCC-C), 2014, : 84 - 90
  • [38] Identity-based encryption from the Weil pairing
    Boneh, D
    Franklin, M
    [J]. SIAM JOURNAL ON COMPUTING, 2003, 32 (03) : 586 - 615
  • [39] Identity-Based Proxy Signature from Lattices
    Kim, Kee Sung
    Hong, Dowon
    Jeong, Ik Rae
    [J]. JOURNAL OF COMMUNICATIONS AND NETWORKS, 2013, 15 (01) : 1 - 7
  • [40] Multi-Keyword Searchable Identity-Based Proxy Re-Encryption from Lattices
    Zhuang, Er-Shuo
    Fan, Chun-, I
    [J]. MATHEMATICS, 2023, 11 (18)