
CLC number: TP309
On-line Access: 2024-08-27
Received: 2023-10-17
Revision Accepted: 2024-05-08
Crosschecked: 2016-07-11
Cited: 0
Clicked: 9232
Feng-he Wang, Chun-xiao Wang, Zhen-hua Liu. Efficient hierarchical identity based encryption scheme in the standard model over lattices[J]. Frontiers of Information Technology & Electronic Engineering,in press.https://doi.org/10.1631/FITEE.1500219 @article{title="Efficient hierarchical identity based encryption scheme in the standard model over lattices", %0 Journal Article TY - JOUR
Abstract: This paper designs a new HIBE in the standard model. By using the proposed assignment rule, an efficient lattice-based HIBE scheme is presented. The main advantages of the proposed are the short public key size and the small message and ciphtertext expanse factor. Moreover, the authors show that the proposed assignment rule can be combined with others technologies to design more efficient HIBE scheme. The idea of this paper is new and interesting, and the paper reads well and well-analyzed. The design result of this paper is beautiful.
标准模型下基于高效分级身份的格上加密方案关键词组: Darkslateblue:Affiliate; Royal Blue:Author; Turquoise:Article
Reference[1]Agrawal, S., Boneh, D., Boyen, X., 2010a. Efficient lattice (H)IBE in the standard model. Proc. 29th Annual Int. Conf. on the Theory and Applications of Cryptographic Techniques, p.553-572. ![]() [2]Agrawal, S., Boneh, D., Boyen, X., 2010b. Lattice basis delegation in fixed dimension and shorter-ciphertext hierarchical IBE. Proc. 30th Annual Cryptology Conf., p.98-115. ![]() [3]Agrawal, S., Boyen, X., Vaikuntanathan, V., et al., 2012. Functional encryption for threshold functions (or fuzzy IBE) from lattices. Proc. 15th Int. Conf. on Practice and Theory in Public Key Cryptography, p.280-297. ![]() [4]Alwen, J., Peikert, C., 2009. Generating shorter bases for hard random lattices. Proc. 26th Int. Symp. on Theoretical Aspects of Computer Science, p.75-86. ![]() [5]Boneh, D., Franklin, M., 2001. Identity-based encryption from the Weil pairing. Proc. 21st Annual Int. Cryptology Conf., p.213-229. ![]() [6]Boneh, D., Boyen, X., Goh, E.J., 2005. Hierarchical identity based encryption with constant size ciphertext. Proc. 24th Annual Int. Conf. on the Theory and Applications of Cryptographic Techniques, p.440-456. ![]() [7]Boyen, X., Waters, B., 2006. Anonymous hierarchical identity-based encryption (without random oracles). Proc. 26th Annual Int. Cryptology Conf., p.290-307. ![]() [8]Canetti, R., Halevi, S., Katz, J., 2003. A forward-secure public-key encryption scheme. Proc. Int. Conf. on the Theory and Applications of Cryptographic Techniques, p.255-271. ![]() [9]Cash, D., Hofheinz, D., Kiltz, E., et al., 2010. Bonsai trees, or how to delegate a lattice basis. Proc. 29th Annual Int. Conf. on the Theory and Applications of Cryptographic Techniques, p.523-552. ![]() [10]Cheng, Y., Wang, Z.Y., Ma, J., et al., 2013. Efficient revocation in ciphertext-policy attribute-based encryption based cryptographic cloud storage. J. Zhejiang Univ.-Sci. C (Comput. & Electron.), 14(2):85-97. ![]() [11]Gentry, C., Halevi, S., 2009. Hierarchical identity based encryption with polynomially many levels. Proc. 6th Theory of Cryptography Conf., p.437-456. ![]() [12]Gentry, C., Silverberg, A., 2002. Hierarchical ID-based cryptography. Proc. 8th Int. Conf. on the Theory and Application of Cryptology and Information Security, p.548-566. ![]() [13]Gentry, C., Peikert, C., Vaikuntanathan, V., 2008. Trapdoors for hard lattices and new cryptographic constructions. Proc. 40th Annual ACM Symp. on Theory of Computing, p.197-206. ![]() [14]Gentry, C., Halevi, S., Vaikuntanathan, V., 2010. A simple BGN-type cryptosystem from LWE. Proc. 29th Annual Int. Conf. on the Theory and Applications of Cryptographic Techniques, p.506-522. ![]() [15]Horwitz, J., Lynn, B., 2002. Toward hierarchical identity-based encryption. Proc. Int. Conf. on the Theory and Applications of Cryptographic Techniques, p.466-481. ![]() [16]Hu, Y.P., Lei, H., Wang, F.H., et al., 2014. Gaussian sampling of lattices for cryptographic applications. Sci. China Inform. Sci., 57(7):072112.1-072112.8. ![]() [17]Micciancio, D., Regev, O., 2004. Worst-case to average-case reductions based on Gaussian measures. Proc. 45th Annual IEEE Symp. on Foundations of Computer Science, p.372-381. ![]() [18]Regev, O., 2005. On lattices, learning with errors, random linear codes, and cryptography. Proc. 37th Annual ACM Symp. on Theory of Computing, p.84-93. ![]() [19]Singh, K., Pandurangan, C., Banerjee, A.K., 2012. Adaptively secure efficient lattice (H)IBE in standard model with short public parameters. Proc. 2nd Int. Conf. on Security, Privacy, and Applied Cryptography Engineering, p.153-172. ![]() [20]Singh, K., Pandu Rangan, C., Banerjee, A.K., 2014. Efficient lattice HIBE in the standard model with shorter public parameters. Proc. 2nd IFIP TC5/8 Int. Conf. on Information and Communication Technology, p.542-553. ![]() [21]Wang, F.H., Hu, Y.P., Wang, B.C., 2013. Lattice-based linearly homomorphic signature scheme over binary field. Sci. China Inform. Sci., 56(11):112108.1-112108.9. ![]() [22]Wang, F.H., Liu, Z.H., Wang, C.X., 2016. Full secure identity-based encryption scheme with short public key size over lattices in the standard model. Int. J. Comput. Math., 93(6):854-863. ![]() [23]Waters, B., 2009. Dual system encryption: realizing fully secure IBE and HIBE under simple assumptions. Proc. 29th Annual Int. Cryptology Conf., p.619-636. ![]() Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou
310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn Copyright © 2000 - 2026 Journal of Zhejiang University-SCIENCE | ||||||||||||||


ORCID:
Open peer comments: Debate/Discuss/Question/Opinion
<1>