Hierarchical Identity-based Broadcast Encryption Scheme from LWE

被引:4
|
作者
Yang, Chunli [1 ]
Zheng, Shihui [2 ,3 ]
Wang, Licheng [2 ,3 ]
Lu, Xiuhua [4 ]
Yang, Yixian [2 ,3 ]
机构
[1] Beijing Univ Posts & Telecommun, Informat Secur Ctr, Natl Engn Lab Disaster Backup & Recovery, Beijing 100876, Peoples R China
[2] Beijing Univ Posts & Telecommun, Dept Natl Engn, Lab Disaster Backup & Recovery, Beijing 100876, Peoples R China
[3] Beijing Univ Posts & Telecommun, Informat Secur Ctr, Beijing 100876, Peoples R China
[4] Langfang Teachers Univ, Dept Math & Informat Sci, Langfang 065000, Peoples R China
基金
中国国家自然科学基金;
关键词
Broadcast encryption; H-IBBE; lattices; LWE; CIPHERTEXTS; TRAPDOORS;
D O I
10.1109/JCN.2014.000045
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A hierarchical identity-based broadcast encryption (HIBBE) scheme is an identity-based broadcast encryption (IBBE) scheme in a hierarchical environment. In order to obtain secure HIBBE schemes in the quantum era, we propose an H-IBBE scheme based on the learning with errors problem assumption. Our scheme achieves indistinguishability from random under adaptive chosen-plaintext and chosen-identity attacks in the random oracle model.
引用
收藏
页码:258 / 263
页数:6
相关论文
共 50 条
  • [1] Hierarchical Identity-Based Broadcast Encryption
    Liu, Weiran
    Liu, Jianwei
    Wu, Qianhong
    Qin, Bo
    [J]. INFORMATION SECURITY AND PRIVACY, ACISP 2014, 2014, 8544 : 242 - 257
  • [2] Identity-Based Online/Offline Encryption Scheme from LWE
    Zuo, Binger
    Li, Jiguo
    Zhang, Yichen
    Shen, Jian
    [J]. INFORMATION, 2024, 15 (09)
  • [3] Revocable Hierarchical Identity-Based Broadcast Encryption
    Dawei Li
    Jianwei Liu
    Zongyang Zhang
    Qianhong Wu
    Weiran Liu
    [J]. Tsinghua Science and Technology, 2018, 23 (05) : 539 - 549
  • [4] Revocable Hierarchical Identity-Based Broadcast Encryption
    Li, Dawei
    Liu, Jianwei
    Zhang, Zongyang
    Wu, Qianhong
    Liu, Weiran
    [J]. TSINGHUA SCIENCE AND TECHNOLOGY, 2018, 23 (05) : 539 - 549
  • [5] Threshold Identity-Based Broadcast Encryption from Identity-Based Encryption
    Kim, Kitak
    Kim, Milyoung
    Kim, Hyoseung
    Park, Jon Hwan
    Lee, Dong Hoon
    [J]. COMPUTER APPLICATIONS FOR DATABASE, EDUCATION, AND UBIQUITOUS COMPUTING, 2012, 352 : 99 - 102
  • [6] Lattice-based hierarchical identity-based broadcast encryption scheme in the standard model
    Yongli T.
    Mingming W.
    Qing Y.
    Panke Q.
    Zongqu Z.
    [J]. Journal of China Universities of Posts and Telecommunications, 2019, 26 (04): : 70 - 79
  • [7] Lattice-based hierarchical identity-based broadcast encryption scheme in the standard model
    Tang Yongli
    Wang Mingming
    Ye Qing
    Qin Panke
    Zhao Zongqu
    [J]. TheJournalofChinaUniversitiesofPostsandTelecommunications., 2019, 26 (04) - 79
  • [8] Lattice-based hierarchical identity-based broadcast encryption scheme in the standard model
    Tang Yongli
    Wang Mingming
    Ye Qing
    Qin Panke
    Zhao Zongqu
    [J]. The Journal of China Universities of Posts and Telecommunications, 2019, (04) : 70 - 79
  • [9] Identity-based Broadcast Encryption Scheme with Untrusted PKG
    Guo, Shanqing
    Zhang, Chunhua
    [J]. PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE FOR YOUNG COMPUTER SCIENTISTS, VOLS 1-5, 2008, : 1613 - 1618
  • [10] Cryptanalysis of a Hierarchical Identity-Based Encryption Scheme
    Weng, Jian
    Chen, Min-Rong
    Chen, Kefei
    Deng, Robert H.
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2010, E93A (04) : 854 - 856