Full secure identity-based encryption scheme with short public key size over lattices in the standard model

被引:12
|
作者
Wang, Fenghe [1 ]
Liu, ZhenHua [2 ]
Wang, Chunxiao [1 ]
机构
[1] Shandong Jianzhu Univ, Dept Math & Phys, Jinan, Peoples R China
[2] Xidian Univ, Sch Math & Stat, Xian, Peoples R China
基金
中国国家自然科学基金;
关键词
identity-based encryption; lattice; learning with errors problem; pre-image sampling function; the standard model;
D O I
10.1080/00207160.2015.1029464
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
An efficient identity-based encryption (IBE) scheme over lattice is proposed in this paper. Under the hardness of the learning with errors (LWE) problem, the proposed scheme is semantic secure against adaptive chosen identity and chosen plaintext attack in the standard model. To improve the efficiency of the lattice-based IBE scheme, unlike the identity string is encoded into a matrix by a group of public matrices in several known constructions, the identity string of l bits is encoded into a vector with the help of l + 1 vectors in this paper. With the help of this idea, we achieve the private key extraction of IBE scheme at the same lattice. Then, the public key of the proposed scheme only consists of one n x m matrix and l + 1 vectors, compared with that the public keys of the known lattice-based IBE schemes all consist as a group of n x m matrices. Hence, the public key size of this scheme is shorter than that of the known constructions.
引用
收藏
页码:854 / 863
页数:10
相关论文
共 50 条
  • [41] An Improved Efficient Provable Secure Identity-Based Identification Scheme in the Standard Model
    Tan, Syh-Yuan
    Chin, Ji-Jian
    Heng, Swee-Huay
    Goi, Bok-Min
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2013, 7 (04): : 910 - 922
  • [42] Fully secure identity-based signcryption scheme with shorter signcryptext in the standard model
    Li, Xiangxue
    Qian, Haifeng
    Weng, Jian
    Yu, Yu
    MATHEMATICAL AND COMPUTER MODELLING, 2013, 57 (3-4) : 503 - 511
  • [43] Forward-Secure Identity-Based Public-Key Encryption without Random Oracles
    Yu, Jia
    Cheng, Xiangguo
    Hao, Rong
    Kong, Fanyu
    Fan, Jianxi
    FUNDAMENTA INFORMATICAE, 2011, 111 (02) : 241 - 256
  • [44] New adaptively secure identity-based encryption over lattice
    Zhang, Leyou
    Wei, Jing
    ICIC Express Letters, Part B: Applications, 2015, 6 (10): : 2715 - 2721
  • [45] A CCA2 Secure Public Key Encryption Scheme Based on the McEliece Assumptions in the Standard Model
    Dowsley, Rafael
    Mueller-Quade, Joern
    Nascimento, Anderson C. A.
    TOPICS IN CRYPTOLOGY - CT-RSA 2009, PROCEEDINGS, 2009, 5473 : 240 - +
  • [46] Adaptively Secure Hierarchical Identity-Based Encryption over Lattice
    Zhang, Leyou
    Wu, Qing
    NETWORK AND SYSTEM SECURITY, 2017, 10394 : 46 - 58
  • [47] Efficient Identity-Based Broadcast Encryption Scheme on Lattices for the Internet of Things
    He, Kai
    Liu, Xueqiao
    Liu, Jia-Nan
    Liu, Wei
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [48] Novel Identity-Based Hash Proof System with Compact Master Public Key from Lattices in the Standard Model
    Lai, Qiqi
    Yang, Bo
    Xia, Zhe
    Li, Yannan
    Chen, Yuan
    Li, Zhenlong
    INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2019, 30 (04) : 589 - 606
  • [49] Bounded-Collusion Identity-Based Encryption from Semantically-Secure Public-Key Encryption: Generic Constructions with Short Ciphertexts
    Tessaro, Stefano
    Wilson, David A.
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2014, 2014, 8383 : 257 - 274
  • [50] Identity-based Threshold Broadcast Encryption in the Standard Model
    Zhang, Leyou
    Hu, Yupu
    Wu, Qing
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2010, 4 (03): : 400 - 410