Provably Secure Identity-Based Encryption and Signature over Cyclotomic Fields

被引:2
|
作者
Wang, Yang [1 ]
Wang, Mingqiang [1 ]
Zou, Jingdan [1 ]
Xu, Jin [1 ]
Wang, Jing [2 ]
机构
[1] Shandong Univ, Sch Math, Jinan 250100, Shandong, Peoples R China
[2] China Mobile Online Serv Co Ltd, Shandong Branch, Jinan 250100, Shandong, Peoples R China
基金
中国国家自然科学基金;
关键词
AVERAGE-CASE REDUCTIONS; RING-LWE; EFFICIENT; LATTICES;
D O I
10.1155/2019/1742386
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Identity-based cryptography is a type of public key cryptography with simple key management procedures. To our knowledge, till now, the existing identity-based cryptography based on NTRU is all over power-of-2 cyclotomic rings. Whether there is provably secure identity-based cryptography over more general fields is still open. In this paper, with the help of the results of collision resistance preimage sampleable functions (CRPSF) over cyclotomic fields, we give concrete constructions of provably secure identity-based encryption schemes (IBE) and identity-based signature schemes (IBS) based on NTRU over any cyclotomic field. Our IBE schemes are provably secure under adaptive chosen-plaintext and adaptive chosen-identity attacks, meanwhile, our IBS schemes are existentially unforgeable against adaptively chosen message and adaptively chosen identity attacks for any probabilistic polynomial time (PPT) adversary in the random oracle model. The securities of both schemes are based on the worst-case approximate shortest independent vectors problem (SIVP gamma) over corresponding ideal lattices. The secret key size of our IBE (IBS) scheme is short-only one (two) ring element(s). The ciphertext (signature) is also short-only two (three) ring elements. Meanwhile, as the case of NTRUEncrypt, our IBE scheme could encrypt n bits in each encryption process. These properties may make our schemes have more advantages for some IoT applications over postquantum world in theory.
引用
收藏
页数:13
相关论文
共 50 条
  • [1] IBUOV, a Provably Secure Identity-Based UOV Signature Scheme
    Shen, Wuqiang
    Tang, Shaohua
    Xu, Lingling
    [J]. 2013 IEEE 16TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE 2013), 2013, : 388 - 395
  • [2] A provably secure identity-based proxy ring signature based on RSA
    Asaar, Maryam Rajabzadeh
    Salmasizadeh, Mahmoud
    Susilo, Willy
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (07) : 1223 - 1236
  • [3] An efficient and provably secure identity-based signature scheme in the standard model
    Li, Ji-Guo
    Jiang, Ping-Jin
    [J]. Jisuanji Xuebao/Chinese Journal of Computers, 2009, 32 (11): : 2130 - 2136
  • [4] Provably Secure Ciphertext-Policy Attribute-Based Encryption from Identity-Based Encryption
    Tseng, Yi-Fan
    Fan, Chun-, I
    Lin, Chih-Wen
    [J]. JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2019, 25 (03) : 182 - 202
  • [5] A New Provably Secure Identity-Based Multi-proxy Signature Scheme
    Chen, Qunshan
    Huang, Zhenjie
    Ding, Yong
    Zhou, Yuping
    Huang, Hui
    [J]. CYBERSPACE SAFETY AND SECURITY, PT I, 2020, 11982 : 230 - 242
  • [6] Provably secure identity-based identification and signature schemes from code assumptions
    Song, Bo
    Zhao, Yiming
    [J]. PLOS ONE, 2017, 12 (08):
  • [7] Provably Secure Identity-Based Identification and Signature Schemes with Parallel-PVR
    Song, Bo
    Zhao, Yiming
    [J]. INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2016, 2016, 9977 : 227 - 238
  • [8] Efficient and provably secure random oracle-free adaptive identity-based encryption with short-signature scheme
    Karati, Arijit
    Biswas, G. P.
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (17) : 4060 - 4074
  • [9] Provably Secure Anonymous Multi-Receiver Identity-Based Encryption with Shorter Ciphertext
    Wang, Huaqun
    [J]. 2014 IEEE 12TH INTERNATIONAL CONFERENCE ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING (DASC)/2014 IEEE 12TH INTERNATIONAL CONFERENCE ON EMBEDDED COMPUTING (EMBEDDEDCOM)/2014 IEEE 12TH INTERNATIONAL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING (PICOM), 2014, : 85 - 90
  • [10] New adaptively secure identity-based encryption over lattice
    Zhang, Leyou
    Wei, Jing
    [J]. ICIC Express Letters, Part B: Applications, 2015, 6 (10): : 2715 - 2721