A Novel Hierarchical Identity-Based Encryption Scheme from Lattices

被引:0
|
作者
Ye, Qing [1 ]
Hu, Mingxing [1 ]
Gao, Wei [1 ]
Tang, Yongli [1 ]
机构
[1] Henan Polytech Univ, Coll Comp Sci & Technol, Jiaozuo 454000, Henan, Peoples R China
来源
关键词
Lattice; Hierarchical Identity-Based encryption; Trapdoor function; Learning with errors; SECURE;
D O I
10.1007/978-3-030-00012-7_38
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Hierarchical identity based encryption is a powerful public key encryption scheme where entities are arranged in a directed tree. Each entity in the tree is provided with a secret key from its parent and can delegate this secret key to its children so that a child entity can decrypt messages intended for it. Aiming at the high complexity in user's private key extraction and large expansion ratio of trapdoor size in previous hierarchical identity-based encryption schemes, in this paper, we proposed a new HIBE scheme. We first used the implicit extension method to improve preimage sampling algorithm, and then we combined the improved algorithm with MP12 trapdoor delegation algorithm to construct an efficient hierarchical identity-based encryption user's private key extraction algorithm. Finally, we integrated the new extraction algorithm and the Dual-LWE algorithm to complete our scheme. Compared with the similar schemes, the efficiency of our scheme is improved in system establishment and user's private key extraction stage, the trapdoor size grows only linearly with the system hierarchical depth, and the improved preimage sample algorithm partly solves the Gaussian parameter increasing problem induced by MP12 trapdoor delegation. The security of the proposed scheme strictly reduces to the hardness of decisional learning with errors problem in the standard model.
引用
收藏
页码:412 / 422
页数:11
相关论文
共 50 条
  • [21] Hierarchical Identity-Based Broadcast Encryption
    Liu, Weiran
    Liu, Jianwei
    Wu, Qianhong
    Qin, Bo
    [J]. INFORMATION SECURITY AND PRIVACY, ACISP 2014, 2014, 8544 : 242 - 257
  • [22] On the Power of Hierarchical Identity-Based Encryption
    Mahmoody, Mohammad
    Mohammed, Ameer
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2016, PT II, 2016, 9666 : 243 - 272
  • [23] Efficient hierarchical identity-based signatures from lattices
    Tian, Miaomiao
    Huang, Liusheng
    Yang, Wei
    [J]. INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2013, 5 (01) : 1 - 10
  • [24] Hierarchical Identity-Based Online/Offline Encryption Scheme with Leakage Resilience
    Yu, Qihong
    Li, Jiguo
    Ji, Sai
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [25] New Escrow-Free Scheme for Hierarchical Identity-Based Encryption
    Qi, Fang
    Tang, Xin
    Wei, Quanyun
    [J]. ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2015, 2015, 9532 : 701 - 713
  • [26] Simple and Fast Identity-based Encryption From Module Lattices
    Wei, Lihao
    Liu, Shenghan
    Long, Zhenyue
    [J]. 2015 8TH INTERNATIONAL CONFERENCE ON BIOMEDICAL ENGINEERING AND INFORMATICS (BMEI), 2015, : 690 - 694
  • [27] On the Analysis of the Outsourced Revocable Identity-Based Encryption from Lattices
    Zhang, Yanhua
    Liu, Ximeng
    Hu, Yupu
    Jia, Huiwen
    [J]. NETWORK AND SYSTEM SECURITY, NSS 2021, 2021, 13041 : 79 - 99
  • [28] An identity-based encryption scheme for broadcasting
    Yang, Geng
    Wang, Jiangtao
    Cheng, Hongbing
    Rong, Chunming
    [J]. 2007 IFIP INTERNATIONAL CONFERENCE ON NETWORK AND PARALLEL COMPUTING WORKSHOPS, PROCEEDINGS, 2007, : 123 - +
  • [29] Full Secure Identity-based Encryption Scheme over Lattices in the Standard Model
    Wang Jizhong
    Wang Chunxiao
    [J]. 2015 10TH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC), 2015, : 412 - 415
  • [30] Identity-based threshold proxy re-encryption scheme from lattices and its applications
    Wu, Liqiang
    Han, Yiliang
    Yang, Xiaoyuan
    Zhang, Minqing
    [J]. FRONTIERS OF INFORMATION TECHNOLOGY & ELECTRONIC ENGINEERING, 2022, 23 (02) : 258 - 277