Skip to main content

2018 | OriginalPaper | Buchkapitel

Anonymous Identity-Based Hash Proof System from Lattices in the Standard Model

verfasst von : Qiqi Lai, Bo Yang, Yong Yu, Yuan Chen, Liju Dong

Erschienen in: Information Security and Privacy

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

An Identity-Based Hash Proof System (IB-HPS) is a fundamental and important primitive, which is widely adapted to construct a number of cryptographic schemes and protocols, especially for leakage-resilient ones. Therefore it is significant to instantiate IB-HPSs from various assumptions. However, all existing IB-HPSs based on lattices are set only in the random oracle model. Thus, proposing an IB-HPS from lattices in the standard model is an essential and interesting work.
In this paper, we introduce a much more compact definition for an anonymous IB-HPS, defining computational indistinguishability of valid/invalid ciphertexts and anonymity of identity simultaneously. Then, through utilizing the technique for delegating a short lattice basis due to Agrawal et al. in CRYPTO 2010 and the property of the smoothing parameter over random lattices, we present a new construction of IB-HPS in the standard model. Furthermore, we show that our new construction is selectively secure and anonymous based on the standard learning with errors (LWE) assumption in the standard model.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Anhänge
Nur mit Berechtigung zugänglich
Fußnoten
1
In order to understand the difference between the concepts of an IB-HPS and an IB-KEM, one can refer to the similar relationship between a HPS and a KEM in the public-key setting. A HPS can always be viewed as a KEM in the modular construction of public-key encryption schemes. Besides, a HPS is a basic cryptographic primitive, which can be furthermore construct many protocols in different applications [915]. However, a KEM can be utilized only in the encryption schemes for message transmission.
 
2
More strictly, we need first choose a collision-resilient hash function \(h:\{0,1\}^*\rightarrow \{0,1\}^d\), then map arbitrary identity, such as email address, phone number and passport number, to the bit strings of length d.
 
3
Here it is more convenient for us to view mpk as an implicit parameter. This is because all different decapsulation algorithms have the same mpk as input.
 
Literatur
4.
Zurück zum Zitat Alwen, J., Peikert, C.: Generating shorter bases for hard random lattices. In: Proceedings of STACS 2009, Freiburg, Germany, pp. 75–86 (2009) Alwen, J., Peikert, C.: Generating shorter bases for hard random lattices. In: Proceedings of STACS 2009, Freiburg, Germany, pp. 75–86 (2009)
6.
Zurück zum Zitat Baek, J., Duncan, S., Li, J., Au, M.H.: Efficient generic construction of CCA-secure identity-based encryption from randomness extraction. Comput. J. 59(4), 508–521 (2016)CrossRefMathSciNet Baek, J., Duncan, S., Li, J., Au, M.H.: Efficient generic construction of CCA-secure identity-based encryption from randomness extraction. Comput. J. 59(4), 508–521 (2016)CrossRefMathSciNet
7.
Zurück zum Zitat Boneh, D., Gentry, C., Hamburg M.: Space-efficient identity based encryption without pairings. In: Proceedings of FOCS 2007, Providence, RI, USA, pp. 647–657 (2007) Boneh, D., Gentry, C., Hamburg M.: Space-efficient identity based encryption without pairings. In: Proceedings of FOCS 2007, Providence, RI, USA, pp. 647–657 (2007)
10.
Zurück zum Zitat Chen, R., Mu, Y., Yang, G., Susilo, W., Guo, F.: Strong authenticated key exchange with auxiliary inputs. Des. Codes Cryptogr. 85(1), 145–173 (2017)MathSciNetCrossRefMATH Chen, R., Mu, Y., Yang, G., Susilo, W., Guo, F.: Strong authenticated key exchange with auxiliary inputs. Des. Codes Cryptogr. 85(1), 145–173 (2017)MathSciNetCrossRefMATH
12.
Zurück zum Zitat Chen, R., Mu, Y., Yang, G., Susilo, W., Guo, F., Zheng, Y.: A note on the strong authenticated key exchange with auxiliary inputs. Des. Codes Cryptogr. 85(1), 175–178 (2017)MathSciNetCrossRefMATH Chen, R., Mu, Y., Yang, G., Susilo, W., Guo, F., Zheng, Y.: A note on the strong authenticated key exchange with auxiliary inputs. Des. Codes Cryptogr. 85(1), 175–178 (2017)MathSciNetCrossRefMATH
13.
Zurück zum Zitat Chen, R., Mu, Y., Yang, G., Guo, F., Wang, X.: Dual-server public-key encryption with keyword search for secure cloud storage. IEEE Trans. Inf. Forensics Secur. 11(4), 789–798 (2016) Chen, R., Mu, Y., Yang, G., Guo, F., Wang, X.: Dual-server public-key encryption with keyword search for secure cloud storage. IEEE Trans. Inf. Forensics Secur. 11(4), 789–798 (2016)
17.
Zurück zum Zitat Chen, Y., Zhang, Z., Lin, D., Cao, Z.: Generalized (identity-based) hash proof system and its applications. Secur. Commun. Netw. 9(12), 1698–1716 (2016)CrossRef Chen, Y., Zhang, Z., Lin, D., Cao, Z.: Generalized (identity-based) hash proof system and its applications. Secur. Commun. Netw. 9(12), 1698–1716 (2016)CrossRef
19.
Zurück zum Zitat Chen, Y., Zhang, Z., Lin, D., Cao, Z.: CCA-secure IB-KEM from identity-based extractable hash proof system. Comput. J. 57(10), 1537–1556 (2014)CrossRef Chen, Y., Zhang, Z., Lin, D., Cao, Z.: CCA-secure IB-KEM from identity-based extractable hash proof system. Comput. J. 57(10), 1537–1556 (2014)CrossRef
20.
Zurück zum Zitat Chow, S.M., Dodis, Y., Rouselakis, Y., Waters, B.: Practical leakage-resilient identity-based encryption from simple assumptions. In: Proceedings of the 17th ACM Conference on Computer and Communications Security–CCS 2010, Chicago, Illinois, USA, pp. 152–161 (2010) Chow, S.M., Dodis, Y., Rouselakis, Y., Waters, B.: Practical leakage-resilient identity-based encryption from simple assumptions. In: Proceedings of the 17th ACM Conference on Computer and Communications Security–CCS 2010, Chicago, Illinois, USA, pp. 152–161 (2010)
23.
Zurück zum Zitat Gentry, C., Peikert, C., Vaikuntanathan, V.: Trapdoors for hard lattices and new cryptographic constructions. In: Proceedings of the 40th Annual ACM Symposium on Theory of Computing–STOC 2008, Victoria, British Columbia, Canada, pp. 197–206 (2008) Gentry, C., Peikert, C., Vaikuntanathan, V.: Trapdoors for hard lattices and new cryptographic constructions. In: Proceedings of the 40th Annual ACM Symposium on Theory of Computing–STOC 2008, Victoria, British Columbia, Canada, pp. 197–206 (2008)
26.
Zurück zum Zitat Micciancio, D., Regev, O.: Worst-case to average-case reductions based on Gaussian measures. SIAM J. Comput. 37(1), 267–302 (2007)MathSciNetCrossRefMATH Micciancio, D., Regev, O.: Worst-case to average-case reductions based on Gaussian measures. SIAM J. Comput. 37(1), 267–302 (2007)MathSciNetCrossRefMATH
29.
Metadaten
Titel
Anonymous Identity-Based Hash Proof System from Lattices in the Standard Model
verfasst von
Qiqi Lai
Bo Yang
Yong Yu
Yuan Chen
Liju Dong
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-319-93638-3_31

Premium Partner