Hierarchical Identity-based Broadcast Encryption Scheme from LWE

被引:4
|
作者
Yang, Chunli [1 ]
Zheng, Shihui [2 ,3 ]
Wang, Licheng [2 ,3 ]
Lu, Xiuhua [4 ]
Yang, Yixian [2 ,3 ]
机构
[1] Beijing Univ Posts & Telecommun, Informat Secur Ctr, Natl Engn Lab Disaster Backup & Recovery, Beijing 100876, Peoples R China
[2] Beijing Univ Posts & Telecommun, Dept Natl Engn, Lab Disaster Backup & Recovery, Beijing 100876, Peoples R China
[3] Beijing Univ Posts & Telecommun, Informat Secur Ctr, Beijing 100876, Peoples R China
[4] Langfang Teachers Univ, Dept Math & Informat Sci, Langfang 065000, Peoples R China
基金
中国国家自然科学基金;
关键词
Broadcast encryption; H-IBBE; lattices; LWE; CIPHERTEXTS; TRAPDOORS;
D O I
10.1109/JCN.2014.000045
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A hierarchical identity-based broadcast encryption (HIBBE) scheme is an identity-based broadcast encryption (IBBE) scheme in a hierarchical environment. In order to obtain secure HIBBE schemes in the quantum era, we propose an H-IBBE scheme based on the learning with errors problem assumption. Our scheme achieves indistinguishability from random under adaptive chosen-plaintext and chosen-identity attacks in the random oracle model.
引用
收藏
页码:258 / 263
页数:6
相关论文
共 50 条
  • [21] An Optimal Identity-Based Broadcast Encryption Scheme for Wireless Sensor Networks
    Kim, Intae
    Hwang, SeongOun
    [J]. IEICE TRANSACTIONS ON COMMUNICATIONS, 2013, E96B (03) : 891 - 895
  • [22] Further Analysis of a Practical Hierarchical Identity-Based Encryption Scheme
    Sun, Ying
    Yu, Yong
    Mu, Yi
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2012, E95D (06) : 1690 - 1693
  • [23] Identity-based broadcast encryption scheme using the new techniques for dual system encryption
    Sun J.
    Hu Y.-P.
    [J]. Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2011, 33 (05): : 1266 - 1270
  • [24] A Novel Hierarchical Identity-Based Fully Homomorphic Encryption Scheme from Lattices
    Hu, Mingxing
    Ye, Qing
    Gao, Wei
    Tang, Yongli
    [J]. CLOUD COMPUTING AND SECURITY, PT III, 2018, 11065 : 423 - 434
  • [25] An Efficient Identity-Based Broadcast Encryption Scheme Based on SM9
    Lai J.-C.
    Huang X.-Y.
    He D.-B.
    [J]. Jisuanji Xuebao/Chinese Journal of Computers, 2021, 44 (05): : 897 - 907
  • [26] Practical chosen-ciphertext secure Hierarchical Identity-Based Broadcast Encryption
    Liu, Weiran
    Liu, Jianwei
    Wu, Qianhong
    Qin, Bo
    Li, Yan
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2016, 15 (01) : 35 - 50
  • [27] Practical chosen-ciphertext secure Hierarchical Identity-Based Broadcast Encryption
    Weiran Liu
    Jianwei Liu
    Qianhong Wu
    Bo Qin
    Yan Li
    [J]. International Journal of Information Security, 2016, 15 : 35 - 50
  • [28] Identity Based Group Signatures from Hierarchical Identity-Based Encryption
    Smart, Nigel P.
    Warinschi, Bogdan
    [J]. PAIRING-BASED CRYPTOGRAPHY - PAIRING 2009, 2009, 5671 : 150 - 170
  • [29] Augmented broadcaster identity-based broadcast encryption
    [J]. 1600, Digital Information Research Foundation, 2 Srinivasamoorthy Avenue, L.B Road, Adyar, Chennai, 600 020, India (11):
  • [30] Identity-Based Broadcast Encryption for Inner Products
    Lai, Jianchang
    Mu, Yi
    Gu, Fuchun
    Jiang, Peng
    Ma, Sha
    [J]. COMPUTER JOURNAL, 2018, 61 (08): : 1240 - 1251