Lattice-based hierarchical identity-based broadcast encryption scheme in the standard model

被引:0
|
作者
Yongli T. [1 ]
Mingming W. [1 ]
Qing Y. [1 ]
Panke Q. [1 ]
Zongqu Z. [1 ]
机构
[1] Institute of Computer Science and Technology, Henan Polytechnic University, Jiaozuo
基金
中国国家自然科学基金;
关键词
Fixed dimension; H-IBBE; Lattice-based cryptography; Standard model;
D O I
10.19682/j.cnki.1005-8885.2019.1019
中图分类号
O144 [集合论]; O157 [组合数学(组合学)];
学科分类号
070104 ;
摘要
Lattice-based hierarchical identity-based broadcast encryption (H-IBBE) schemes have broad application prospects in the quantum era,because it reduces the burden of private key generator (PKG) and is suitable for one-to-many communication. However, previous lattice-based H-IBBE schemes are mostly constructed in the random oracle model with more complex trapdoor delegation process and have lower practical application. A lattice-based H-IBBE is proposed in the fixed dimension under the standard model, which mainly consists of binary tree encryption (BTE) system, MP12 trapdoor function and ABB10b trapdoor delegation algorithm. First, this paper uses BTE system to eliminate the random oracle so that the scheme can be implemented under the standard model, and it also uses MP12 trapdoor function to reduce trapdoor generation complexity and obtains a safe and efficient trapdoor matrix; Second, this paper uses ABB10b trapdoor delegation algorithm to delegate user' s private key, and the trapdoor matrices ' dimensions are the same before and after the trapdoor delegation. Comparative analysis shows that trapdoor delegation process reduces complexity, and the size of cipher-text and trapdoor matrix does not increase with deeper trapdoor delegation process. This paper achieves indistinguishability of cipher-texts under a selective chosen-cipher-text and chosen-identity attack (INDr-sID-CCA) security in the standard model based on learning with errors (LWE) hard assumption. © 2019, Beijing University of Posts and Telecommunications. All rights reserved.
引用
收藏
页码:70 / 79
页数:9
相关论文
共 50 条
  • [41] An Optimal Identity-Based Broadcast Encryption Scheme for Wireless Sensor Networks
    Kim, Intae
    Hwang, SeongOun
    [J]. IEICE TRANSACTIONS ON COMMUNICATIONS, 2013, E96B (03) : 891 - 895
  • [42] Lattice-Based Revocable Identity-Based Encryption with Bounded Decryption Key Exposure Resistance
    Takayasu, Atsushi
    Watanabe, Yohei
    [J]. INFORMATION SECURITY AND PRIVACY, ACISP 2017, PT I, 2017, 10342 : 184 - 204
  • [43] Lattice-based certificateless encryption scheme
    Mingming Jiang
    Yupu Hu
    Hao Lei
    Baocang Wang
    Qiqi Lai
    [J]. Frontiers of Computer Science, 2014, 8 : 828 - 836
  • [44] Lattice-based certificateless encryption scheme
    Jiang, Mingming
    Hu, Yupu
    Lei, Hao
    Wang, Baocang
    Lai, Qiqi
    [J]. FRONTIERS OF COMPUTER SCIENCE, 2014, 8 (05) : 828 - 836
  • [45] Revocable identity-based matchmaking encryption in the standard model
    Jiang, Zhe
    Wang, Xiwen
    Zhang, Kai
    Gong, Junqing
    Chen, Jie
    Qian, Haifeng
    [J]. IET INFORMATION SECURITY, 2023, 17 (04) : 567 - 581
  • [46] Identity-Based Broadcast Encryption for Inner Products
    Lai, Jianchang
    Mu, Yi
    Gu, Fuchun
    Jiang, Peng
    Ma, Sha
    [J]. COMPUTER JOURNAL, 2018, 61 (08): : 1240 - 1251
  • [47] New Fuzzy Identity-Based Encryption in the Standard Model
    Ren, Yanli
    Gu, Dawu
    Wang, Shuozhong
    Zhang, Xinpeng
    [J]. INFORMATICA, 2010, 21 (03) : 393 - 407
  • [48] Revocable hierarchical identity-based encryption
    Seo, Jae Hong
    Emura, Keita
    [J]. THEORETICAL COMPUTER SCIENCE, 2014, 542 : 44 - 62
  • [49] Identity-based Broadcast Encryption with Shorter Transmissions
    张乐友
    胡予濮
    牟宁波
    [J]. Journal of Shanghai Jiaotong University(Science), 2008, 13 (06) : 641 - 645
  • [50] Identity-Based Broadcast Encryption with Recipient Privacy
    Zhang, Weimin
    Xu, Qiuliang
    He, Peng
    [J]. PROCEEDINGS OF 2010 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (ICCSIT 2010), VOL 8, 2010, : 483 - 487