scispace - formally typeset
Book ChapterDOI

Adaptively secure efficient lattice (H)IBE in standard model with short public parameters

Reads0
Chats0
TLDR
A scheme to divide an l-bit identity into l′ blocks of l/l′ so that size of the vector $\overrightarrow{V}$ can be reduced from l elements of G to l′ elements ofG is presented.
Abstract
Independent work by Chatterjee and Sarkar [9] and Naccache [16] provided a variant of Waters' IBE to reduce public parameters. The idea is to divide an l-bit identity into l′ blocks of l/l′ so that size of the vector $\overrightarrow{V}$ can be reduced from l elements of G to l′ elements of G. We name this technique as blocking technique. This leads to some associated degradation in security reduction. In this paper our contribution is two fold: First we apply Waters' [21] idea to convert Agrawal et al. [1] selective-ID secure lattice HIBE to adaptive-ID secure HIBE then using blocking technique we reduce the public parameters. Second we present efficient lattice identity based encryption in standard model with smaller public key size which is variant of [1]. Using blocking technique our scheme reduces public key size by a factor of β at the cost of increasing (β−lg (β))2 number of bits in q where q is size of field Zq. There is an interesting trade-off between reducing the public parameter size and increase in the computational cost. For 160-bit identities we show that compared to scheme [1] the public parameter size can be reduced by almost 90% while increasing the computation cost by only 8.71% for appropriate choice of β.

read more

Citations
More filters
Book ChapterDOI

Server-Aided Revocable Identity-Based Encryption from Lattices

TL;DR: Server-aided revocable identity-based encryption (SR-IBE), recently proposed by Qin et al. at ESORICS 2015, offers significant advantages over previous user revocation mechanisms in the scope of IBE.
Book ChapterDOI

Efficient Lattice HIBE in the Standard Model with Shorter Public Parameters

TL;DR: The size of the public parameters in Hierarchical HIBE is reduced from l′′×h + 2 matrices to l″′ +2 matrices using Chatterjee and Sarkar’s and blocking technique, where h is the number of levels in H IBE.
Journal ArticleDOI

Provably secure lattice based identity based unidirectional PRE and PRE+ schemes

TL;DR: This work has proposed the first unidirectional PRE scheme, which is noninteractive and based on lattice based identity based cryptosystem, and constructed a lattice identity based uniddirectional PRE + scheme.
Book ChapterDOI

Adaptively Secure Hierarchical Identity-Based Encryption over Lattice

TL;DR: The issued scheme has many advantages over the available, such as short public/private keys, achieving adaptive security, and is the first one which achieves both constant size private key space and adaptive security.
Journal ArticleDOI

Efficient hierarchical identity based encryption scheme in the standard model over lattices

TL;DR: An efficient lattice-based hierarchical identity based encryption (HIBE) scheme in the standard model whose public key size is only (dm2 + mn) log q bits and whose message-ciphertext expansion factor is only log q is proposed.
References
More filters
Book ChapterDOI

Identity-Based Encryption from the Weil Pairing

TL;DR: This work proposes a fully functional identity-based encryption scheme (IBE) based on the Weil pairing that has chosen ciphertext security in the random oracle model assuming an elliptic curve variant of the computational Diffie-Hellman problem.
Book ChapterDOI

Identity-based cryptosystems and signature schemes

TL;DR: In this article, the authors introduce a novel type of cryptographic scheme, which enables any pair of users to communicate securely and to verify each other's signatures without exchanging private or public keys, without keeping key directories, and without using the services of a third party.
Proceedings ArticleDOI

On lattices, learning with errors, random linear codes, and cryptography

TL;DR: A public-key cryptosystem whose hardness is based on the worst-case quantum hardness of SVP and SIVP, and an efficient solution to the learning problem implies a quantum, which can be made classical.
Book ChapterDOI

Efficient identity-based encryption without random oracles

TL;DR: This work first presents their IBE construction and reduces the security of the scheme to the decisional Bilinear Diffie-Hellman (BDH) problem, and shows that their techniques can be used to build a new signature scheme that is secure under the computational Diffie -Hellman assumption without random oracles.
Book ChapterDOI

Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles

TL;DR: The first secure IBE scheme without random oracles was presented in this article, where the adversary must commit ahead of time to the identity that it intends to attack, whereas in the standard model the adversary is allowed to choose this identity adaptively.