|
- 2017
基于环签名的支持多PKG身份基加密方案
|
Abstract:
摘要: 将环签名和基于身份的密码体制(identity-based encryption, IBE)相结合,构造出了一种新的、具有多个密钥生成中心(private key generator, PKG)的IBE体制,即基于环签名的多PKG身份类加密体制。并在格上构造出一种标准模型下安全的基于环签名的多PKG身份类加密方案,方案的安全性基于小整数解问题和带差错学习问题的困难性。与现有的IBE方案和其变种相比,新方案减轻了PKG的负担,更适用于庞大的组织,且具有更好的应用灵活性。
Abstract: Combining ring signatures with identity-based encryption, a new identity-based encryption with multiple private key generators was constructed, that is, scheme of multiple private key generators identity-based encryption based on ring signatures. Then a multiple private key generator identity-based encryption scheme on lattice based on ring signatures in the standard model was constructed, the security of the scheme was based on the difficulty of small integer solution problems and learning with errors on lattice. Compared with the existing scheme of identity-based encryption and its variation, the new scheme decreased the burdens of private key generator which more applicable to huge system and had higher application flexibility
[1] | SHAMIR A. Identity-Based cryptosystems and signature schemes[C] // The Workshop on the Theory and Application of Cryptographic Techniques. Springer, Berlin, Heidelberg, 1984: 47-53. |
[2] | DAN B, FRANKLIN M. Identity-Based encryption from the weil pairing[J]. Siam Journal on Computing, 2001, 32(3):213-229. |
[3] | BOYD C. Advances in Cryptology — ASIACRYPT 2001[J]. Advances in Cryptology — Asiacrypt, 2001: 125-143. |
[4] | YANG X Y, WU L Q, ZHANG M Q, et al. Public-key encryption scheme based on R-LWE[J]. Journal on Communications, 2013, 34(2):23-30. |
[5] | GEONTAE Noh, CHUN J Y, JEONG I R. Strongly unforgeable ring signature scheme from lattices in the standard model[J]. Journal of Applied Mathematics,2014,(2014-5-5), 2014, 2014(2014):1-12. |
[6] | CHAUM D, HEYST E V. Group signatures[M] // Advances in Cryptology — EUROCRYPT’91. Springer Berlin Heidelberg, 1991: 257-265. |
[7] | GENTRY C, SILVERBERG A. Hierarchical ID-Based cryptography[C] // Advances in Cryptology-ASIACRYPT 2002, International Conference on the Theory and Application of Cryptology and Information Security, Queenstown, New Zealand, December 1-5, 2002, Proceedings. DBLP, 2002: 548-566. |
[8] | HORWITZ J, LYNN B. Toward hierarchical Identity-Based encryption[M] // Advances in Cryptology — EUROCRYPT 2002. Springer Berlin Heidelberg, 2002: 466-481. |
[9] | SHOR P W. Polynomial time algorithms for discrete logarithms and factoring on a quantum computer[C] // International Symposium on Algorithmic Number Theory. Springer-Verlag, 1994: 289. |
[10] | MAY A, SILVERMAN J H. Dimension reduction methods for convolution modular lattices[C] // Revised Papers from the International Conference on Cryptography and Lattices. Springer-Verlag, 2001: 110-125. |
[11] | MICCIANCIO D, PEIKERT C. Trapdoors for lattices: simpler, tighter, faster, smaller[C] // International Conference on the Theory and Applications of Cryptographic Techniques. Springer, Berlin, Heidelberg, 2012: 700-718. |
[12] | GENTRY C, PEIKERT C, VAIKUNTANATHAN V. Trapdoors for hard lattices and new cryptographic constructions[C] // DBLP, 2008: 197-206. |
[13] | DAMIEN S, RON S, TANAKA K, et al. Efficient public key encryption based on ideal lattices[C] // Advances in Cryptology-ASIACRYPT 2009, International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings. DBLP, 2009: 617-635. |