Full Text:   <827>

Summary:  <317>

CLC number: TP309

On-line Access: 2016-08-05

Received: 2015-07-13

Revision Accepted: 2016-01-21

Crosschecked: 2016-07-11

Cited: 0

Clicked: 1876

Citations:  Bibtex RefMan EndNote GB/T7714

 ORCID:

Feng-he Wang

http://orcid.org/0000-0002-5510-3133

-   Go to

Article info.
Open peer comments

Frontiers of Information Technology & Electronic Engineering  2016 Vol.17 No.8 P.781-791

http://doi.org/10.1631/FITEE.1500219


Efficient hierarchical identity based encryption scheme in the standard model over lattices


Author(s):  Feng-he Wang, Chun-xiao Wang, Zhen-hua Liu

Affiliation(s):  Department of Mathematics and Physics, Shandong Jianzhu University, Jinan 250014, China; more

Corresponding email(s):   fenghe2166@163.com, xiao2166@126.com

Key Words:  Hierarchical identity based encryption scheme, Lattice-based cryptography, Standard model, Learning with errors problem, Gaussian


Feng-he Wang, Chun-xiao Wang, Zhen-hua Liu. Efficient hierarchical identity based encryption scheme in the standard model over lattices[J]. Frontiers of Information Technology & Electronic Engineering, 2016, 17(8): 781-791.

@article{title="Efficient hierarchical identity based encryption scheme in the standard model over lattices",
author="Feng-he Wang, Chun-xiao Wang, Zhen-hua Liu",
journal="Frontiers of Information Technology & Electronic Engineering",
volume="17",
number="8",
pages="781-791",
year="2016",
publisher="Zhejiang University Press & Springer",
doi="10.1631/FITEE.1500219"
}

%0 Journal Article
%T Efficient hierarchical identity based encryption scheme in the standard model over lattices
%A Feng-he Wang
%A Chun-xiao Wang
%A Zhen-hua Liu
%J Frontiers of Information Technology & Electronic Engineering
%V 17
%N 8
%P 781-791
%@ 2095-9184
%D 2016
%I Zhejiang University Press & Springer
%DOI 10.1631/FITEE.1500219

TY - JOUR
T1 - Efficient hierarchical identity based encryption scheme in the standard model over lattices
A1 - Feng-he Wang
A1 - Chun-xiao Wang
A1 - Zhen-hua Liu
J0 - Frontiers of Information Technology & Electronic Engineering
VL - 17
IS - 8
SP - 781
EP - 791
%@ 2095-9184
Y1 - 2016
PB - Zhejiang University Press & Springer
ER -
DOI - 10.1631/FITEE.1500219


Abstract: 
Using lattice basis delegation in a fixed dimension, we propose an efficient lattice-based hierarchical identity based encryption (HIBE) scheme in the standard model whose public key size is only (dm2+mn)logq bits and whose message-ciphertext expansion factor is only logq, where d is the maximum hierarchical depth and (n,m,q) are public parameters. In our construction, a novel public key assignment rule is used to averagely assign one random and public matrix to two identity bits, which implies that d random public matrices are enough to build the proposed HIBE scheme in the standard model, compared with the case in which 2d such public matrices are needed in the scheme proposed at Crypto 2010 whose public key size is (2dm2+mn+m)logq. To reduce the message-ciphertext expansion factor of the proposed scheme to logq, the encryption algorithm of this scheme is built based on Gentry’s encryption scheme, by which m2 bits of plaintext are encrypted into m2logq bits of ciphertext by a one time encryption operation. Hence, the presented scheme has some advantages with respect to not only the public key size but also the message-ciphertext expansion factor. Based on the hardness of the learning with errors problem, we demonstrate that the scheme is secure under selective identity and chosen plaintext attacks.

This paper designs a new HIBE in the standard model. By using the proposed assignment rule, an efficient lattice-based HIBE scheme is presented. The main advantages of the proposed are the short public key size and the small message and ciphtertext expanse factor. Moreover, the authors show that the proposed assignment rule can be combined with others technologies to design more efficient HIBE scheme. The idea of this paper is new and interesting, and the paper reads well and well-analyzed. The design result of this paper is beautiful.

标准模型下基于高效分级身份的格上加密方案

概要:本文在标准模型下,利用固定维数的格基代理算法提出了一种高效的格基分级身份加密方案。其公钥尺寸仅为(dm2+mn)logq比特,而消息-密文扩展因子仅为logq,其中d为最大分级深度,(n,m,q)为公开参数。本文构造了一种新的公钥赋值算法,将1个随机、公开的矩阵平均赋值为两个身份比特,从而仅仅需要d个公开矩阵来构造标准模型下的HIBE方案;与之相比,Crypto 2010所提出的HIBE方案中需要2d个同样尺寸的矩阵,公钥尺寸达到(2dm2+mn+m)logq。为了将该方案的消息-密文扩展因子压缩到logq,本文基于Gentry的加密方案建立了一种基础加密算法,一次加密操作中能够加密m2比特明文并得到m2logq比特密文。因此,文中所提方案在公钥尺寸、消息-密文扩展因子等方面具有一定的优势。基于差错学习问题的困难性,我们证明该方案在选择身份、选择明文攻击下是安全的。
关键词:分级身份加密;格密码;标准模型;差错学习问题;高斯

Darkslateblue:Affiliate; Royal Blue:Author; Turquoise:Article

Reference

[1]Agrawal, S., Boneh, D., Boyen, X., 2010a. Efficient lattice (H)IBE in the standard model. Proc. 29th Annual Int. Conf. on the Theory and Applications of Cryptographic Techniques, p.553-572.

[2]Agrawal, S., Boneh, D., Boyen, X., 2010b. Lattice basis delegation in fixed dimension and shorter-ciphertext hierarchical IBE. Proc. 30th Annual Cryptology Conf., p.98-115.

[3]Agrawal, S., Boyen, X., Vaikuntanathan, V., et al., 2012. Functional encryption for threshold functions (or fuzzy IBE) from lattices. Proc. 15th Int. Conf. on Practice and Theory in Public Key Cryptography, p.280-297.

[4]Alwen, J., Peikert, C., 2009. Generating shorter bases for hard random lattices. Proc. 26th Int. Symp. on Theoretical Aspects of Computer Science, p.75-86.

[5]Boneh, D., Franklin, M., 2001. Identity-based encryption from the Weil pairing. Proc. 21st Annual Int. Cryptology Conf., p.213-229.

[6]Boneh, D., Boyen, X., Goh, E.J., 2005. Hierarchical identity based encryption with constant size ciphertext. Proc. 24th Annual Int. Conf. on the Theory and Applications of Cryptographic Techniques, p.440-456.

[7]Boyen, X., Waters, B., 2006. Anonymous hierarchical identity-based encryption (without random oracles). Proc. 26th Annual Int. Cryptology Conf., p.290-307.

[8]Canetti, R., Halevi, S., Katz, J., 2003. A forward-secure public-key encryption scheme. Proc. Int. Conf. on the Theory and Applications of Cryptographic Techniques, p.255-271.

[9]Cash, D., Hofheinz, D., Kiltz, E., et al., 2010. Bonsai trees, or how to delegate a lattice basis. Proc. 29th Annual Int. Conf. on the Theory and Applications of Cryptographic Techniques, p.523-552.

[10]Cheng, Y., Wang, Z.Y., Ma, J., et al., 2013. Efficient revocation in ciphertext-policy attribute-based encryption based cryptographic cloud storage. J. Zhejiang Univ.-Sci. C (Comput. & Electron.), 14(2):85-97.

[11]Gentry, C., Halevi, S., 2009. Hierarchical identity based encryption with polynomially many levels. Proc. 6th Theory of Cryptography Conf., p.437-456.

[12]Gentry, C., Silverberg, A., 2002. Hierarchical ID-based cryptography. Proc. 8th Int. Conf. on the Theory and Application of Cryptology and Information Security, p.548-566.

[13]Gentry, C., Peikert, C., Vaikuntanathan, V., 2008. Trapdoors for hard lattices and new cryptographic constructions. Proc. 40th Annual ACM Symp. on Theory of Computing, p.197-206.

[14]Gentry, C., Halevi, S., Vaikuntanathan, V., 2010. A simple BGN-type cryptosystem from LWE. Proc. 29th Annual Int. Conf. on the Theory and Applications of Cryptographic Techniques, p.506-522.

[15]Horwitz, J., Lynn, B., 2002. Toward hierarchical identity-based encryption. Proc. Int. Conf. on the Theory and Applications of Cryptographic Techniques, p.466-481.

[16]Hu, Y.P., Lei, H., Wang, F.H., et al., 2014. Gaussian sampling of lattices for cryptographic applications. Sci. China Inform. Sci., 57(7):072112.1-072112.8.

[17]Micciancio, D., Regev, O., 2004. Worst-case to average-case reductions based on Gaussian measures. Proc. 45th Annual IEEE Symp. on Foundations of Computer Science, p.372-381.

[18]Regev, O., 2005. On lattices, learning with errors, random linear codes, and cryptography. Proc. 37th Annual ACM Symp. on Theory of Computing, p.84-93.

[19]Singh, K., Pandurangan, C., Banerjee, A.K., 2012. Adaptively secure efficient lattice (H)IBE in standard model with short public parameters. Proc. 2nd Int. Conf. on Security, Privacy, and Applied Cryptography Engineering, p.153-172.

[20]Singh, K., Pandu Rangan, C., Banerjee, A.K., 2014. Efficient lattice HIBE in the standard model with shorter public parameters. Proc. 2nd IFIP TC5/8 Int. Conf. on Information and Communication Technology, p.542-553.

[21]Wang, F.H., Hu, Y.P., Wang, B.C., 2013. Lattice-based linearly homomorphic signature scheme over binary field. Sci. China Inform. Sci., 56(11):112108.1-112108.9.

[22]Wang, F.H., Liu, Z.H., Wang, C.X., 2016. Full secure identity-based encryption scheme with short public key size over lattices in the standard model. Int. J. Comput. Math., 93(6):854-863.

[23]Waters, B., 2009. Dual system encryption: realizing fully secure IBE and HIBE under simple assumptions. Proc. 29th Annual Int. Cryptology Conf., p.619-636.

Open peer comments: Debate/Discuss/Question/Opinion

<1>

Please provide your name, email address and a comment





Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - Journal of Zhejiang University-SCIENCE