Skip to main content
Top

2018 | OriginalPaper | Chapter

Adaptively Chosen Ciphertext Secure Lattice IBE Based Programmable Hash Function in the Standard Model

Authors : Yongli Tang, Mingming Wang, Zongqu Zhao, Qing Ye

Published in: Cloud Computing and Security

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In order to increase security of identity-based encryption (IBE) scheme in the standard model from lattice, and reduce the size of master public key, we propose a new lattice-based IBE scheme. This scheme mainly uses the identity-based lossy trapdoor function to generate trapdoor, and get the master public key, master private key and ciphertext from programmable hash function. Comparative analysis shows that, compared to MP12 trapdoor delegation algorithm, identity-based lossy trapdoor function is directly related to user’s identity, at the same time the trapdoor is lossy, each different identity corresponds to a different trapdoor, it is impossible to distinguish that the master public key whether is lossy or injective for the adversary, so that the adversary is unable to obtain complete information about how to construct the trapdoor functions, this feature makes the trapdoor function more secure than other trapdoor functions. In addition, the size of master public of previous scheme is \( {\rm O}\left( n \right) \) (\( n \) denotes the length of the user’s identity), using programmable hash function constructs master public key of our scheme, so that our scheme master public key size is reduced to \( {\rm O}\left( {\log n} \right) \), the size of the master public key of our scheme is reduced and the efficiency of our scheme is improved. Finally, we can prove our scheme is indistinguishability from random under adaptive chosen ciphertext and chosen-identity attacks (INDr-ID-CCA) secure based on learning with error hard problem in the standard model.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
5.
go back to reference Gentry, C., Peikert, C., Vaikuntanathan, V.: Trapdoors for hard lattices and new cryptographic constructions. In: STOC 2008 Proceedings of the Fortieth Annual ACM Symposium on Theory of computing, pp. 197–206. ACM, New York (2008) Gentry, C., Peikert, C., Vaikuntanathan, V.: Trapdoors for hard lattices and new cryptographic constructions. In: STOC 2008 Proceedings of the Fortieth Annual ACM Symposium on Theory of computing, pp. 197–206. ACM, New York (2008)
6.
go back to reference Zhandry, M.: Secure identity-based encryption in the quantum random oracle model. Int. J. Quantum Inf. 13(04), 1484–1510 (2015)MathSciNetCrossRef Zhandry, M.: Secure identity-based encryption in the quantum random oracle model. Int. J. Quantum Inf. 13(04), 1484–1510 (2015)MathSciNetCrossRef
8.
go back to reference Agrawal, S., Boyen, X.: Identity-based encryption from lattices in the standard model. Manuscript (2009) Agrawal, S., Boyen, X.: Identity-based encryption from lattices in the standard model. Manuscript (2009)
9.
12.
go back to reference Peikert, C., Waters, B.: Lossy trapdoor functions and their applications. In: STOC 2008 Proceedings of the Fortieth Annual ACM Symposium on Theory of Computing, pp. 187–196. ACM, New York (2008) Peikert, C., Waters, B.: Lossy trapdoor functions and their applications. In: STOC 2008 Proceedings of the Fortieth Annual ACM Symposium on Theory of Computing, pp. 187–196. ACM, New York (2008)
Metadata
Title
Adaptively Chosen Ciphertext Secure Lattice IBE Based Programmable Hash Function in the Standard Model
Authors
Yongli Tang
Mingming Wang
Zongqu Zhao
Qing Ye
Copyright Year
2018
DOI
https://doi.org/10.1007/978-3-030-00012-7_43

Premium Partner