Skip to main content
Top

2018 | OriginalPaper | Chapter

Anonymous Identity-Based Hash Proof System from Lattices in the Standard Model

Authors : Qiqi Lai, Bo Yang, Yong Yu, Yuan Chen, Liju Dong

Published in: Information Security and Privacy

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

An Identity-Based Hash Proof System (IB-HPS) is a fundamental and important primitive, which is widely adapted to construct a number of cryptographic schemes and protocols, especially for leakage-resilient ones. Therefore it is significant to instantiate IB-HPSs from various assumptions. However, all existing IB-HPSs based on lattices are set only in the random oracle model. Thus, proposing an IB-HPS from lattices in the standard model is an essential and interesting work.
In this paper, we introduce a much more compact definition for an anonymous IB-HPS, defining computational indistinguishability of valid/invalid ciphertexts and anonymity of identity simultaneously. Then, through utilizing the technique for delegating a short lattice basis due to Agrawal et al. in CRYPTO 2010 and the property of the smoothing parameter over random lattices, we present a new construction of IB-HPS in the standard model. Furthermore, we show that our new construction is selectively secure and anonymous based on the standard learning with errors (LWE) assumption in the standard model.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Appendix
Available only for authorised users
Footnotes
1
In order to understand the difference between the concepts of an IB-HPS and an IB-KEM, one can refer to the similar relationship between a HPS and a KEM in the public-key setting. A HPS can always be viewed as a KEM in the modular construction of public-key encryption schemes. Besides, a HPS is a basic cryptographic primitive, which can be furthermore construct many protocols in different applications [915]. However, a KEM can be utilized only in the encryption schemes for message transmission.
 
2
More strictly, we need first choose a collision-resilient hash function \(h:\{0,1\}^*\rightarrow \{0,1\}^d\), then map arbitrary identity, such as email address, phone number and passport number, to the bit strings of length d.
 
3
Here it is more convenient for us to view mpk as an implicit parameter. This is because all different decapsulation algorithms have the same mpk as input.
 
Literature
4.
go back to reference Alwen, J., Peikert, C.: Generating shorter bases for hard random lattices. In: Proceedings of STACS 2009, Freiburg, Germany, pp. 75–86 (2009) Alwen, J., Peikert, C.: Generating shorter bases for hard random lattices. In: Proceedings of STACS 2009, Freiburg, Germany, pp. 75–86 (2009)
6.
go back to reference Baek, J., Duncan, S., Li, J., Au, M.H.: Efficient generic construction of CCA-secure identity-based encryption from randomness extraction. Comput. J. 59(4), 508–521 (2016)CrossRefMathSciNet Baek, J., Duncan, S., Li, J., Au, M.H.: Efficient generic construction of CCA-secure identity-based encryption from randomness extraction. Comput. J. 59(4), 508–521 (2016)CrossRefMathSciNet
7.
go back to reference Boneh, D., Gentry, C., Hamburg M.: Space-efficient identity based encryption without pairings. In: Proceedings of FOCS 2007, Providence, RI, USA, pp. 647–657 (2007) Boneh, D., Gentry, C., Hamburg M.: Space-efficient identity based encryption without pairings. In: Proceedings of FOCS 2007, Providence, RI, USA, pp. 647–657 (2007)
10.
go back to reference Chen, R., Mu, Y., Yang, G., Susilo, W., Guo, F.: Strong authenticated key exchange with auxiliary inputs. Des. Codes Cryptogr. 85(1), 145–173 (2017)MathSciNetCrossRefMATH Chen, R., Mu, Y., Yang, G., Susilo, W., Guo, F.: Strong authenticated key exchange with auxiliary inputs. Des. Codes Cryptogr. 85(1), 145–173 (2017)MathSciNetCrossRefMATH
12.
go back to reference Chen, R., Mu, Y., Yang, G., Susilo, W., Guo, F., Zheng, Y.: A note on the strong authenticated key exchange with auxiliary inputs. Des. Codes Cryptogr. 85(1), 175–178 (2017)MathSciNetCrossRefMATH Chen, R., Mu, Y., Yang, G., Susilo, W., Guo, F., Zheng, Y.: A note on the strong authenticated key exchange with auxiliary inputs. Des. Codes Cryptogr. 85(1), 175–178 (2017)MathSciNetCrossRefMATH
13.
go back to reference Chen, R., Mu, Y., Yang, G., Guo, F., Wang, X.: Dual-server public-key encryption with keyword search for secure cloud storage. IEEE Trans. Inf. Forensics Secur. 11(4), 789–798 (2016) Chen, R., Mu, Y., Yang, G., Guo, F., Wang, X.: Dual-server public-key encryption with keyword search for secure cloud storage. IEEE Trans. Inf. Forensics Secur. 11(4), 789–798 (2016)
17.
go back to reference Chen, Y., Zhang, Z., Lin, D., Cao, Z.: Generalized (identity-based) hash proof system and its applications. Secur. Commun. Netw. 9(12), 1698–1716 (2016)CrossRef Chen, Y., Zhang, Z., Lin, D., Cao, Z.: Generalized (identity-based) hash proof system and its applications. Secur. Commun. Netw. 9(12), 1698–1716 (2016)CrossRef
19.
go back to reference Chen, Y., Zhang, Z., Lin, D., Cao, Z.: CCA-secure IB-KEM from identity-based extractable hash proof system. Comput. J. 57(10), 1537–1556 (2014)CrossRef Chen, Y., Zhang, Z., Lin, D., Cao, Z.: CCA-secure IB-KEM from identity-based extractable hash proof system. Comput. J. 57(10), 1537–1556 (2014)CrossRef
20.
go back to reference Chow, S.M., Dodis, Y., Rouselakis, Y., Waters, B.: Practical leakage-resilient identity-based encryption from simple assumptions. In: Proceedings of the 17th ACM Conference on Computer and Communications Security–CCS 2010, Chicago, Illinois, USA, pp. 152–161 (2010) Chow, S.M., Dodis, Y., Rouselakis, Y., Waters, B.: Practical leakage-resilient identity-based encryption from simple assumptions. In: Proceedings of the 17th ACM Conference on Computer and Communications Security–CCS 2010, Chicago, Illinois, USA, pp. 152–161 (2010)
23.
go back to reference Gentry, C., Peikert, C., Vaikuntanathan, V.: Trapdoors for hard lattices and new cryptographic constructions. In: Proceedings of the 40th Annual ACM Symposium on Theory of Computing–STOC 2008, Victoria, British Columbia, Canada, pp. 197–206 (2008) Gentry, C., Peikert, C., Vaikuntanathan, V.: Trapdoors for hard lattices and new cryptographic constructions. In: Proceedings of the 40th Annual ACM Symposium on Theory of Computing–STOC 2008, Victoria, British Columbia, Canada, pp. 197–206 (2008)
26.
go back to reference Micciancio, D., Regev, O.: Worst-case to average-case reductions based on Gaussian measures. SIAM J. Comput. 37(1), 267–302 (2007)MathSciNetCrossRefMATH Micciancio, D., Regev, O.: Worst-case to average-case reductions based on Gaussian measures. SIAM J. Comput. 37(1), 267–302 (2007)MathSciNetCrossRefMATH
Metadata
Title
Anonymous Identity-Based Hash Proof System from Lattices in the Standard Model
Authors
Qiqi Lai
Bo Yang
Yong Yu
Yuan Chen
Liju Dong
Copyright Year
2018
DOI
https://doi.org/10.1007/978-3-319-93638-3_31

Premium Partner