Adaptive-ID Secure Revocable Identity-Based Encryption from Lattices via Subset Difference Method

被引:16
|
作者
Cheng, Shantian [1 ]
Zhang, Juanyang [1 ]
机构
[1] Nanyang Technol Univ, Sch Phys & Math Sci, Div Math Sci, Singapore 637371, Singapore
关键词
Revocable identity-based encryption; Lattices; Subset difference method; Adaptive security; Standard model;
D O I
10.1007/978-3-319-17533-1_20
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In view of the expiration or reveal of user's private credential (or private key) in a realistic scenario, identity-based encryption (IBE) schemes with an efficient key revocation mechanism, or for short, revocable identity-based encryption (RIBE) schemes, become prominently significant. In this paper, we present an RIBE scheme from lattices by combining two Agrawal et al.'s IBE schemes with the subset difference (SD) method. Our scheme is secure against adaptive identity-time attacks in the standard model under the learning with errors (LWE) assumption. In particular, our scheme serves as one solution to the challenge posed by Chen et al. (ACISP'12).
引用
收藏
页码:283 / 297
页数:15
相关论文
共 50 条
  • [21] Revocable Identity-Based Encryption from Codes with Rank Metric
    Chang, Donghoon
    Chauhan, Amit Kumar
    Kumar, Sandeep
    Sanadhya, Somitra Kumar
    [J]. TOPICS IN CRYPTOLOGY - CT-RSA 2018, 2018, 10808 : 435 - 451
  • [22] Efficient revocable identity-based encryption from multilinear maps
    Mao, Xianping
    Lai, Junzuo
    Chen, Kefei
    Weng, Jian
    Mei, Qixiang
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (18) : 3511 - 3522
  • [23] Wildcarded identity-based encryption from lattices
    Minh Thuy Truc Pham
    Ngoc Ai Van Nguyen
    Jiang, Mei
    Dung Hoang Duong
    Susilo, Willy
    [J]. THEORETICAL COMPUTER SCIENCE, 2022, 902 : 41 - 53
  • [24] Puncturable Identity-Based Encryption from Lattices
    Dutta, Priyanka
    Susilo, Willy
    Duong, Dung Hoang
    Roy, Partha Sarathi
    [J]. INFORMATION SECURITY AND PRIVACY, ACISP 2021, 2021, 13083 : 571 - 589
  • [25] A Secure Revocable Identity-Based Proxy Re-encryption Scheme for Cloud Storage
    Luo, Wei
    Ma, Wenping
    [J]. CLOUD COMPUTING AND SECURITY, PT II, 2018, 11064 : 519 - 530
  • [26] Adaptively Secure Identity-Based Encryption from Lattices with Asymptotically Shorter Public Parameters
    Yamada, Shota
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2016, PT II, 2016, 9666 : 32 - 62
  • [27] Fully Secure Traceable and Revocable-Storage Attribute-Based Encryption with Short Update Keys via Subset Difference Method
    Lian, Huijie
    Wang, Qingxian
    Wang, Guangbo
    [J]. 2018 THIRD INTERNATIONAL CONFERENCE ON SECURITY OF SMART CITIES, INDUSTRIAL CONTROL SYSTEM AND COMMUNICATIONS (SSIC), 2018,
  • [28] Revocable hierarchical identity-based encryption via history-free approach
    Seo, Jae Hong
    Emura, Keita
    [J]. THEORETICAL COMPUTER SCIENCE, 2016, 615 : 45 - 60
  • [29] New Constructions of Revocable Identity-Based Encryption From Multilinear Maps
    Park, Seunghwan
    Lee, Kwangsu
    Lee, Dong Hoon
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (08) : 1564 - 1577
  • [30] Constructing Forward-Secure Identity-Based Encryption from Identity-Based Binary Tree Encryption
    Lu, Yang
    Li, Jiguo
    [J]. 2012 INTERNATIONAL SYMPOSIUM ON INFORMATION SCIENCE AND ENGINEERING (ISISE), 2012, : 199 - 202