Lattice-based identity-based resplittable threshold public key encryption scheme

被引:15
|
作者
Singh, Kunwar [1 ]
Rangan, C. Pandu [2 ]
Banerjee, A. K. [3 ]
机构
[1] NIT Trichy, Dept Comp Sci & Engn, Tiruchirappalli, India
[2] IIT Madras, Dept Comp Sci & Engn, Madras, Tamil Nadu, India
[3] NIT Trichy, Dept Math, Tiruchirappalli 620015, Tamil Nadu, India
关键词
94A62; 68W20; 06D50; 94A60; resplittable threshold public key encryption; lattice; identity-based encryption; learning with error;
D O I
10.1080/00207160.2014.928286
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
Threshold public key encryption is a cryptographic primitive where a secret key of an organization is distributed among special members called decryption servers (insiders) and a certain threshold number of insiders must cooperate to decrypt any ciphertext. Threshold public key encryption with an additional randomized algorithm Tsplit is called resplittable threshold public key encryption (RTPKE). Cryptographic primitive RTPKE was introduced by Hanaoka et al. [Generic construction of chosen ciphertext secure proxy re-encryption, in CT-RSA, San Francisco, CA, USA, LNCS, O. Dunkelman, ed., Springer-Verlag, Heidelberg, 2012, pp. 349-364] in a generic construction of chosen ciphertext attack secure proxy re-encryption scheme. In MIST 2013 conference Singh et al. [Lattice based efficient threshold public key encryption scheme, J. Wirel. Mob. Netw. Ubiquitous Comput. Dependable Appl. (JoWUA) 4(4) (2013), pp. 93-107] presented lattice-based RTPKE scheme based on Regev's LWE [On lattices, learning with errors, random linear codes, and cryptography, in STOC, Baltimore, MD, USA, H.N. Gabow and R. Fagin, eds., ACM, University of Wales, Cardiff, 2005, pp. 84-93] assumption. In this paper, we propose lattice-based RTPKE scheme in the identity-based setting.
引用
收藏
页码:289 / 307
页数:19
相关论文
共 50 条
  • [1] Lattice-based hierarchical identity-based broadcast encryption scheme in the standard model
    Tang Yongli
    Wang Mingming
    Ye Qing
    Qin Panke
    Zhao Zongqu
    [J]. TheJournalofChinaUniversitiesofPostsandTelecommunications., 2019, 26 (04) - 79
  • [2] Lattice-based hierarchical identity-based broadcast encryption scheme in the standard model
    Tang Yongli
    Wang Mingming
    Ye Qing
    Qin Panke
    Zhao Zongqu
    [J]. The Journal of China Universities of Posts and Telecommunications, 2019, (04) : 70 - 79
  • [3] Lattice-based hierarchical identity-based broadcast encryption scheme in the standard model
    Yongli T.
    Mingming W.
    Qing Y.
    Panke Q.
    Zongqu Z.
    [J]. Journal of China Universities of Posts and Telecommunications, 2019, 26 (04): : 70 - 79
  • [4] Lattice-Based Revocable Identity-Based Encryption with Bounded Decryption Key Exposure Resistance
    Takayasu, Atsushi
    Watanabe, Yohei
    [J]. INFORMATION SECURITY AND PRIVACY, ACISP 2017, PT I, 2017, 10342 : 184 - 204
  • [5] A lattice-based public key encryption scheme with delegated equality test
    Xiao, Kaifeng
    Chen, Xinjian
    Huang, Jianye
    Li, Hongbo
    Huang, Qiong
    [J]. COMPUTER STANDARDS & INTERFACES, 2024, 87
  • [6] Design and Implementation of a Lattice-Based Public-Key Encryption Scheme
    Lin, Hui
    Liu, Dongsheng
    Zhang, Cong
    Dong, Yahui
    [J]. JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS, 2018, 27 (13)
  • [7] A LATTICE-BASED PUBLIC-KEY ENCRYPTION SCHEME FOR RFID APPLICATIONS
    Lin Hui
    Dong Yahui
    Liu Dongshen
    Liu Zilong
    Hou Dawei
    Tong Hengqin
    [J]. 2014 12TH IEEE INTERNATIONAL CONFERENCE ON SOLID-STATE AND INTEGRATED CIRCUIT TECHNOLOGY (ICSICT), 2014,
  • [8] LMIBE: Lattice-Based Matchmaking Identity-Based Encryption for Internet of Things
    Tao, Xufeng
    Qiang, Yan
    Wang, Peng
    Wang, Yingsen
    [J]. IEEE ACCESS, 2023, 11 : 9851 - 9858
  • [9] Lattice-Based Cryptoprocessor for CCA-Secure Identity-Based Encryption
    Renteria-Mejia, Claudia P.
    Velasco-Medina, Jaime
    [J]. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, 2020, 67 (07) : 2331 - 2344
  • [10] Threshold Identity-Based Broadcast Encryption from Identity-Based Encryption
    Kim, Kitak
    Kim, Milyoung
    Kim, Hyoseung
    Park, Jon Hwan
    Lee, Dong Hoon
    [J]. COMPUTER APPLICATIONS FOR DATABASE, EDUCATION, AND UBIQUITOUS COMPUTING, 2012, 352 : 99 - 102