A Novel Hierarchical Identity-Based Encryption Scheme from Lattices

被引:0
|
作者
Ye, Qing [1 ]
Hu, Mingxing [1 ]
Gao, Wei [1 ]
Tang, Yongli [1 ]
机构
[1] Henan Polytech Univ, Coll Comp Sci & Technol, Jiaozuo 454000, Henan, Peoples R China
来源
关键词
Lattice; Hierarchical Identity-Based encryption; Trapdoor function; Learning with errors; SECURE;
D O I
10.1007/978-3-030-00012-7_38
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Hierarchical identity based encryption is a powerful public key encryption scheme where entities are arranged in a directed tree. Each entity in the tree is provided with a secret key from its parent and can delegate this secret key to its children so that a child entity can decrypt messages intended for it. Aiming at the high complexity in user's private key extraction and large expansion ratio of trapdoor size in previous hierarchical identity-based encryption schemes, in this paper, we proposed a new HIBE scheme. We first used the implicit extension method to improve preimage sampling algorithm, and then we combined the improved algorithm with MP12 trapdoor delegation algorithm to construct an efficient hierarchical identity-based encryption user's private key extraction algorithm. Finally, we integrated the new extraction algorithm and the Dual-LWE algorithm to complete our scheme. Compared with the similar schemes, the efficiency of our scheme is improved in system establishment and user's private key extraction stage, the trapdoor size grows only linearly with the system hierarchical depth, and the improved preimage sample algorithm partly solves the Gaussian parameter increasing problem induced by MP12 trapdoor delegation. The security of the proposed scheme strictly reduces to the hardness of decisional learning with errors problem in the standard model.
引用
收藏
页码:412 / 422
页数:11
相关论文
共 50 条
  • [1] A Novel Hierarchical Identity-Based Fully Homomorphic Encryption Scheme from Lattices
    Hu, Mingxing
    Ye, Qing
    Gao, Wei
    Tang, Yongli
    [J]. CLOUD COMPUTING AND SECURITY, PT III, 2018, 11065 : 423 - 434
  • [2] Simplified Revocable Hierarchical Identity-Based Encryption from Lattices
    Wang, Shixiong
    Zhang, Juanyang
    He, Jingnan
    Wang, Huaxiong
    Li, Chao
    [J]. CRYPTOLOGY AND NETWORK SECURITY (CANS 2019), 2019, 11829 : 99 - 119
  • [3] Cryptanalysis of a Hierarchical Identity-Based Encryption Scheme
    Weng, Jian
    Chen, Min-Rong
    Chen, Kefei
    Deng, Robert H.
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2010, E93A (04) : 854 - 856
  • [4] Hierarchical Identity-based Broadcast Encryption Scheme from LWE
    Yang, Chunli
    Zheng, Shihui
    Wang, Licheng
    Lu, Xiuhua
    Yang, Yixian
    [J]. JOURNAL OF COMMUNICATIONS AND NETWORKS, 2014, 16 (03) : 258 - 263
  • [5] Scalable Hierarchical Identity-based Signature Scheme from Lattices
    Noh, Geontae
    Jeong, Ik Rae
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2013, 7 (12): : 3261 - 3273
  • [6] Wildcarded identity-based encryption from lattices
    Minh Thuy Truc Pham
    Ngoc Ai Van Nguyen
    Jiang, Mei
    Dung Hoang Duong
    Susilo, Willy
    [J]. THEORETICAL COMPUTER SCIENCE, 2022, 902 : 41 - 53
  • [7] Puncturable Identity-Based Encryption from Lattices
    Dutta, Priyanka
    Susilo, Willy
    Duong, Dung Hoang
    Roy, Partha Sarathi
    [J]. INFORMATION SECURITY AND PRIVACY, ACISP 2021, 2021, 13083 : 571 - 589
  • [8] Hierarchical Identity-based Puncturable Encryption from Lattices with Application to Forward Security
    Dutta, Priyanka
    Jiang, Mei
    Dung Hoang Duong
    Susilo, Willy
    Fukushima, Kazuhide
    Kiyomoto, Shinsaku
    [J]. ASIA CCS'22: PROCEEDINGS OF THE 2022 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2022, : 408 - 422
  • [9] Further Analysis of a Practical Hierarchical Identity-Based Encryption Scheme
    Sun, Ying
    Yu, Yong
    Mu, Yi
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2012, E95D (06) : 1690 - 1693
  • [10] Outsourced revocable identity-based encryption from lattices
    Dong, Chengcheng
    Yang, Kang
    Qiu, Jian
    Chen, Yuanfang
    [J]. TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2019, 30 (11):