Abstract
Lattice-based Identity-based encryption (IBE) can both simplify certificate management and resist quantum attack in the real world. Combined Public Key (CPK) technology can be used to enhance the efficiency of IBE schemes. In this paper, we use CPK to construct a more efficient lattice-based IBE scheme based on a variant of learning with errors (LWE) problem, by avoiding complex trapdoor generation algorithm and preimage sampling algorithm required by the existing lattice-based IBE schemes from LWE. Its storage cost is also lower. We show that our IBE scheme is semantically secure against an adaptive chosen plaintext attack (CPA) from all probabilistic polynomial time adversaries in the random oracle model.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Agrawal, S., Boneh, D., Boyen, X.: Efficient lattice (H)IBE in the standard model. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 553–572. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-13190-5_28
Bert, P., Fouque, P.-A., Roux-Langlois, A., Sabt, M.: Practical implementation of Ring-SIS/LWE based signature and IBE. In: Lange, T., Steinwandt, R. (eds.) PQCrypto 2018. LNCS, vol. 10786, pp. 271–291. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-79063-3_13
Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001). https://doi.org/10.1007/3-540-44647-8_13
Fujisaki, E., Okamoto, T.: Secure integration of asymmetric and symmetric encryption schemes. J. Cryptol. 26(1), 80–101 (2013)
Gentry, C., Peikert, C., Vaikuntanathan, V.: Trapdoors for hard lattices and new cryptographic constructions. In: Proceedings of the fortieth annual ACM symposium on Theory of computing, pp. 197–206. ACM (2008)
Gordon, S.D., Katz, J., Vaikuntanathan, V.: A group signature scheme from lattice assumptions. In: Abe, M. (ed.) ASIACRYPT 2010. LNCS, vol. 6477, pp. 395–412. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-17373-8_23
Hong, J., Liu, B., Sun, Q., Li, F.: A combined public-key scheme in the case of attribute-based for wireless body area networks. Wirel. Netw. 25(2), 845–859 (2017). https://doi.org/10.1007/s11276-017-1597-8
Meng, H., Chen, Z., Hu, J., Guan, Z.: Establish the intrinsic binding in naming space for future internet using combined public key. In: Proceedings of the 11th International Conference on Future Internet Technologies, pp. 62–68. ACM (2016)
Micciancio, D.: Lattice-based cryptography. In: Encyclopedia of Cryptography and Security, pp. 713–715 (2011)
Micciancio, D., Peikert, C.: Trapdoors for lattices: simpler, tighter, faster, smaller. In: Pointcheval, D., Johansson, T. (eds.) EUROCRYPT 2012. LNCS, vol. 7237, pp. 700–718. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-29011-4_41
Micciancio, D., Regev, O.: Worst-case to average-case reductions based on Gaussian measures. SIAM J. Comput. 37(1), 267–302 (2007)
Regev, O.: On lattices, learning with errors, random linear codes, and cryptography. J. ACM (JACM) 56(6), 34 (2009)
Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakley, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985). https://doi.org/10.1007/3-540-39568-7_5
Takayasu, A., Watanabe, Y.: Lattice-based revocable identity-based encryption with bounded Decryption Key Exposure Resistance. In: Pieprzyk, J., Suriadi, S. (eds.) ACISP 2017. LNCS, vol. 10342, pp. 184–204. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-60055-0_10
Tang, W., Nan, X., Chen, Z.: Combined public key cryptosystem. In: Proceedings of International Conference on Software, Telecommunications and Computer Networks (SoftCOM04) (2004)
Yamada, S.: Adaptively secure identity-based encryption from lattices with asymptotically shorter public parameters. In: Fischlin, M., Coron, J.-S. (eds.) EUROCRYPT 2016. LNCS, vol. 9666, pp. 32–62. Springer, Heidelberg (2016). https://doi.org/10.1007/978-3-662-49896-5_2
Ye, Q., Hu, M., Gao, W., Tang, Y.: A novel hierarchical identity-based encryption scheme from lattices. In: Sun, X., Pan, Z., Bertino, E. (eds.) ICCCS 2018. LNCS, vol. 11065, pp. 412–422. Springer, Cham (2018). https://doi.org/10.1007/978-3-030-00012-7_38
Zhang, L., Wu, Q.: Adaptively secure hierarchical identity-based encryption over lattice. In: Yan, Z., Molva, R., Mazurczyk, W., Kantola, R. (eds.) NSS 2017. LNCS, vol. 10394, pp. 46–58. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-64701-2_4
Acknowledgment
This work was supported by the Scientific Research Foundation of Nanjing Institute of Technology (YKJ201980), Program for Scientific Research Foundation for Talented Scholars of Jinling Institute of Technology (JIT-B-201726), Program for Beijing Key Laboratory (40184042) and Natural science research projects of universities (19KJB520033).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Shi, Y., Qiu, S., Liu, J. (2020). An Efficient Lattice-Based IBE Scheme Using Combined Public Key. In: Tian, Y., Ma, T., Khan, M. (eds) Big Data and Security. ICBDS 2019. Communications in Computer and Information Science, vol 1210. Springer, Singapore. https://doi.org/10.1007/978-981-15-7530-3_1
Download citation
DOI: https://doi.org/10.1007/978-981-15-7530-3_1
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-7529-7
Online ISBN: 978-981-15-7530-3
eBook Packages: Computer ScienceComputer Science (R0)