Full Secure Identity-based Encryption Scheme over Lattices in the Standard Model

被引:3
|
作者
Wang Jizhong [1 ]
Wang Chunxiao [1 ]
机构
[1] Shandong Jianzhu Univ, Dept Math & Phys, Jinan 250014, Peoples R China
关键词
Broadcast Encryption; Lattice-based Cryptography; Anonymity; Dynamic; Learning with Errors Problem;
D O I
10.1109/3PGCIC.2015.33
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Using a known lattice-based chosen plain-text secure encryption scheme and the Bonsai trees primitive, a identity-based encryption (IBE) scheme is proposed in this paper. A public matrices chosen rule that has been used in a known efficient lattice-based chosen ciphtertext secure encryption scheme is used in this paper to reduce the public key size and the message-to ciphtertext expanse factor. Under the hardness of the decision variant of the learning with errors (LWE) problem, we prove that the proposed IBE scheme is indistinguishable against the adaptive chosen identities and chosen-plaintext attack in the standard model. Since a new public key chosen rule is used in our design scheme, the public key size of the proposed scheme would be short. Moreover, the message-to-ciphtertext expanse factor of this scheme is also controlled efficiently which is nearly closed to that of Gentry's scheme. Due to the quantum intractability of the LWE problem on which the scheme is based, the proposed IBE scheme is secure even in quantum-era.
引用
收藏
页码:412 / 415
页数:4
相关论文
共 50 条
  • [1] Full secure identity-based encryption scheme with short public key size over lattices in the standard model
    Wang, Fenghe
    Liu, ZhenHua
    Wang, Chunxiao
    [J]. INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 2016, 93 (06) : 854 - 863
  • [2] An efficient and full secure identity-based encryption scheme
    Ma, Rong
    Cao, Zhen-Fu
    [J]. Shanghai Jiaotong Daxue Xuebao/Journal of Shanghai Jiaotong University, 2010, 44 (03): : 389 - 392
  • [3] Efficient Forward-Secure Identity-Based Encryption Scheme in the Standard Model
    Lu, Yang
    [J]. THEORETICAL AND MATHEMATICAL FOUNDATIONS OF COMPUTER SCIENCE, 2011, 164 : 62 - 69
  • [4] Efficient hierarchical identity based encryption scheme in the standard model over lattices
    Feng-he Wang
    Chun-xiao Wang
    Zhen-hua Liu
    [J]. Frontiers of Information Technology & Electronic Engineering, 2016, 17 : 781 - 791
  • [5] Efficient hierarchical identity based encryption scheme in the standard model over lattices
    Wang, Feng-he
    Wang, Chun-xiao
    Liu, Zhen-hua
    [J]. FRONTIERS OF INFORMATION TECHNOLOGY & ELECTRONIC ENGINEERING, 2016, 17 (08) : 781 - 791
  • [6] Adaptive-ID Secure Identity-Based Signature Scheme from Lattices in the Standard Model
    Wang, Zecheng
    Chen, Xuemin
    Wang, Pingshui
    [J]. IEEE ACCESS, 2017, 5 : 20791 - 20799
  • [7] Secure Identity-Based Blind Signature Scheme in the Standard Model
    Hu, Xiao-Ming
    Huang, Shang-Teng
    [J]. JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2010, 26 (01) : 215 - 230
  • [8] Chosen Ciphertext Secure Identity-Based Broadcast Encryption in the Standard Model
    孙瑾
    胡予濮
    张乐友
    [J]. Journal of Shanghai Jiaotong University(Science), 2011, 16 (06) : 672 - 676
  • [9] Chosen ciphertext secure identity-based broadcast encryption in the standard model
    Sun J.
    Hu Y.-P.
    Zhang L.-Y.
    [J]. Journal of Shanghai Jiaotong University (Science), 2011, 16 (06) : 672 - 676
  • [10] Secure Hierarchical Identity Based Encryption Scheme in the Standard Model
    Ren, Yanli
    Gu, Dawu
    [J]. PROGRESS IN CRYPTOLOGY - INDOCRYPT 2008, 2008, 5365 : 104 - 115