Skip to main content

2018 | OriginalPaper | Buchkapitel

A Novel Hierarchical Identity-Based Encryption Scheme from Lattices

verfasst von : Qing Ye, Mingxing Hu, Wei Gao, Yongli Tang

Erschienen in: Cloud Computing and Security

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Hierarchical identity based encryption is a powerful public key encryption scheme where entities are arranged in a directed tree. Each entity in the tree is provided with a secret key from its parent and can delegate this secret key to its children so that a child entity can decrypt messages intended for it. Aiming at the high complexity in user’s private key extraction and large expansion ratio of trapdoor size in previous hierarchical identity-based encryption schemes, in this paper, we proposed a new HIBE scheme. We first used the implicit extension method to improve preimage sampling algorithm, and then we combined the improved algorithm with MP12 trapdoor delegation algorithm to construct an efficient hierarchical identity-based encryption user’s private key extraction algorithm. Finally, we integrated the new extraction algorithm and the Dual-LWE algorithm to complete our scheme. Compared with the similar schemes, the efficiency of our scheme is improved in system establishment and user’s private key extraction stage, the trapdoor size grows only linearly with the system hierarchical depth, and the improved preimage sample algorithm partly solves the Gaussian parameter increasing problem induced by MP12 trapdoor delegation. The security of the proposed scheme strictly reduces to the hardness of decisional learning with errors problem in the standard model.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
6.
Zurück zum Zitat Wang, F., Liu, Z., Wang, C.: Full secure identity-based encryption scheme with short public key size over lattices in the standard model. Proc. Int. J. Comput. Math. 93(6), 854–863 (2016)MathSciNetCrossRef Wang, F., Liu, Z., Wang, C.: Full secure identity-based encryption scheme with short public key size over lattices in the standard model. Proc. Int. J. Comput. Math. 93(6), 854–863 (2016)MathSciNetCrossRef
7.
Zurück zum Zitat Regev, O.: On lattices, learning with errors, random linear codes, and cryptography. J. ACM 56(6), 84–93 (2009)MathSciNetCrossRef Regev, O.: On lattices, learning with errors, random linear codes, and cryptography. J. ACM 56(6), 84–93 (2009)MathSciNetCrossRef
10.
Zurück zum Zitat Libert, B., Ling, S., Nguyen, K., Wang, H.: Zero-knowledge arguments for lattice-based accumulators: logarithmic-size ring signatures and group signatures without trapdoors. In: Fischlin, M., Coron, J.-S. (eds.) EUROCRYPT 2016. LNCS, vol. 9666, pp. 1–31. Springer, Heidelberg (2016). https://doi.org/10.1007/978-3-662-49896-5_1CrossRef Libert, B., Ling, S., Nguyen, K., Wang, H.: Zero-knowledge arguments for lattice-based accumulators: logarithmic-size ring signatures and group signatures without trapdoors. In: Fischlin, M., Coron, J.-S. (eds.) EUROCRYPT 2016. LNCS, vol. 9666, pp. 1–31. Springer, Heidelberg (2016). https://​doi.​org/​10.​1007/​978-3-662-49896-5_​1CrossRef
11.
Zurück zum Zitat Duan, R., Gu, C., Zhu, Y.: Efficient identity-based fully homomorphic encryption over NTRU. J. Commun. 38(1), 66–75 (2017) Duan, R., Gu, C., Zhu, Y.: Efficient identity-based fully homomorphic encryption over NTRU. J. Commun. 38(1), 66–75 (2017)
13.
Zurück zum Zitat Gentry, C., Peikert, C., Vaikuntanathan, V.: Trapdoors for hard lattices and new cryptographic constructions. In: Proceedings of the Fortieth Annual ACM Symposium on Theory of Computing, STOC 2008, Victoria, British Columbia, Canada, pp. 197–206. ACM (2008) Gentry, C., Peikert, C., Vaikuntanathan, V.: Trapdoors for hard lattices and new cryptographic constructions. In: Proceedings of the Fortieth Annual ACM Symposium on Theory of Computing, STOC 2008, Victoria, British Columbia, Canada, pp. 197–206. ACM (2008)
16.
Zurück zum Zitat Alwen, J., Peikert, C.: Generating shorter bases for hard random lattices. Theor. Comput. Syst. 48(3), 535–553 (2011)MathSciNetCrossRef Alwen, J., Peikert, C.: Generating shorter bases for hard random lattices. Theor. Comput. Syst. 48(3), 535–553 (2011)MathSciNetCrossRef
19.
Zurück zum Zitat Yang, C., Zheng, S., Wang, L., Lu, X., Yang, Y.: Hierarchical identity-based broadcast encryption scheme from LWE. J. Commun. Netw. 16(3), 258–263 (2014)CrossRef Yang, C., Zheng, S., Wang, L., Lu, X., Yang, Y.: Hierarchical identity-based broadcast encryption scheme from LWE. J. Commun. Netw. 16(3), 258–263 (2014)CrossRef
22.
Zurück zum Zitat Wang, F., Wang, C., Liu, Z.: Efficient hierarchical identity based encryption scheme in the standard model over lattices. Front. Inf. Technol. Electron. Eng. 17(8), 781–791 (2016)CrossRef Wang, F., Wang, C., Liu, Z.: Efficient hierarchical identity based encryption scheme in the standard model over lattices. Front. Inf. Technol. Electron. Eng. 17(8), 781–791 (2016)CrossRef
23.
Zurück zum Zitat Dodis, Y., Ostrovsky, R., Reyzin, L., Smith, A.: Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. Proc. Soc. Ind. Appl. Math. (SIAM) 38(1), 97–139 (2008)MathSciNetMATH Dodis, Y., Ostrovsky, R., Reyzin, L., Smith, A.: Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. Proc. Soc. Ind. Appl. Math. (SIAM) 38(1), 97–139 (2008)MathSciNetMATH
Metadaten
Titel
A Novel Hierarchical Identity-Based Encryption Scheme from Lattices
verfasst von
Qing Ye
Mingxing Hu
Wei Gao
Yongli Tang
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-030-00012-7_38