Full secure identity-based encryption scheme with short public key size over lattices in the standard model

被引:12
|
作者
Wang, Fenghe [1 ]
Liu, ZhenHua [2 ]
Wang, Chunxiao [1 ]
机构
[1] Shandong Jianzhu Univ, Dept Math & Phys, Jinan, Peoples R China
[2] Xidian Univ, Sch Math & Stat, Xian, Peoples R China
基金
中国国家自然科学基金;
关键词
identity-based encryption; lattice; learning with errors problem; pre-image sampling function; the standard model;
D O I
10.1080/00207160.2015.1029464
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
An efficient identity-based encryption (IBE) scheme over lattice is proposed in this paper. Under the hardness of the learning with errors (LWE) problem, the proposed scheme is semantic secure against adaptive chosen identity and chosen plaintext attack in the standard model. To improve the efficiency of the lattice-based IBE scheme, unlike the identity string is encoded into a matrix by a group of public matrices in several known constructions, the identity string of l bits is encoded into a vector with the help of l + 1 vectors in this paper. With the help of this idea, we achieve the private key extraction of IBE scheme at the same lattice. Then, the public key of the proposed scheme only consists of one n x m matrix and l + 1 vectors, compared with that the public keys of the known lattice-based IBE schemes all consist as a group of n x m matrices. Hence, the public key size of this scheme is shorter than that of the known constructions.
引用
收藏
页码:854 / 863
页数:10
相关论文
共 50 条
  • [1] Full Secure Identity-based Encryption Scheme over Lattices in the Standard Model
    Wang Jizhong
    Wang Chunxiao
    2015 10TH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC), 2015, : 412 - 415
  • [2] An efficient and full secure identity-based encryption scheme
    Ma, Rong
    Cao, Zhen-Fu
    Shanghai Jiaotong Daxue Xuebao/Journal of Shanghai Jiaotong University, 2010, 44 (03): : 389 - 392
  • [3] Efficient Forward-Secure Identity-Based Encryption Scheme in the Standard Model
    Lu, Yang
    THEORETICAL AND MATHEMATICAL FOUNDATIONS OF COMPUTER SCIENCE, 2011, 164 : 62 - 69
  • [4] Efficient hierarchical identity based encryption scheme in the standard model over lattices
    Feng-he Wang
    Chun-xiao Wang
    Zhen-hua Liu
    Frontiers of Information Technology & Electronic Engineering, 2016, 17 : 781 - 791
  • [5] Efficient hierarchical identity based encryption scheme in the standard model over lattices
    Wang, Feng-he
    Wang, Chun-xiao
    Liu, Zhen-hua
    FRONTIERS OF INFORMATION TECHNOLOGY & ELECTRONIC ENGINEERING, 2016, 17 (08) : 781 - 791
  • [6] Adaptively secure hierarchical identity-based encryption in the standard model
    Wu, Qing
    ICIC Express Letters, 2011, 5 (4 B): : 1321 - 1326
  • [7] Adaptive-ID Secure Identity-Based Signature Scheme from Lattices in the Standard Model
    Wang, Zecheng
    Chen, Xuemin
    Wang, Pingshui
    IEEE ACCESS, 2017, 5 : 20791 - 20799
  • [8] Secure Identity-Based Blind Signature Scheme in the Standard Model
    Hu, Xiao-Ming
    Huang, Shang-Teng
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2010, 26 (01) : 215 - 230
  • [9] Chosen Ciphertext Secure Identity-Based Broadcast Encryption in the Standard Model
    孙瑾
    胡予濮
    张乐友
    JournalofShanghaiJiaotongUniversity(Science), 2011, 16 (06) : 672 - 676
  • [10] Chosen ciphertext secure identity-based broadcast encryption in the standard model
    Sun J.
    Hu Y.-P.
    Zhang L.-Y.
    Journal of Shanghai Jiaotong University (Science), 2011, 16 (06) : 672 - 676