Journal on Communications ›› 2017, Vol. 38 ›› Issue (11): 54-64.doi: 10.11959/j.issn.1000-436x.2017219
• Papers • Previous Articles Next Articles
Qing YE,Ming-xing HU,Yong-li TANG(),Kun LIU,Xi-xi YAN
Revised:
2017-06-05
Online:
2017-11-01
Published:
2017-12-13
Supported by:
CLC Number:
Qing YE,Ming-xing HU,Yong-li TANG,Kun LIU,Xi-xi YAN. Novel hierarchical identity-based encryption scheme from lattice[J]. Journal on Communications, 2017, 38(11): 54-64.
"
方案 | 格的维数 | 陷门尺寸/MB | 陷门生成复杂度( | 原像采样复杂度( | 用户公钥尺寸/MB | 用户私钥尺寸/KB |
文献[5]方案 | 13 632 | 22.15 | 乘≈64.65×1010加≈64.64×1010 | 乘≈55.75×107加≈74.33×107 | 22.15 | 79.92 |
文献[6]方案 | 40 896 | 199.38 | 乘≈15.31×1012加≈15.30×1012 | 乘≈50.17×108加≈66.90×108 | 66.72 | 239.52 |
本文方案 | 13 632 | 5.54 | 乘≈13.74×109加≈13.73×109 | 乘≈96.87×106加≈96.87×106 | 11.08 | 39.84 |
"
方案 | 陷门维数 | 用户公钥维数 | 陷门尺寸/MB | 陷门质量 | 用户公钥尺寸/MB | 用户私钥尺寸/KB | 明文—密文扩展率 | 计算效率( | ||
陷门生成 | 原像采样 | 加密&解密 | ||||||||
CHKP方案 | 40 896 | 81 792 | 199.38 | 66.48 | 9.98 | 1 963 032 | 乘≈15.31×1012 | 乘≈50.17×108 | 乘≈65.97×108 | |
加≈15.30×1012 | 加≈66.90×108 | 加≈65.74×108 | ||||||||
ABB方案 | 34 080 | 68 160 | 138.46 | 55.44 | 8.32 | 1 635 864 | 乘≈12.75×1012 | 乘≈34.84×108 | 乘≈54.98×108 | |
加≈12.74×1012 | 加≈46.46×108 | 加≈54.78×108 | ||||||||
YZWLY方案 | 13 632 | 27 264 | 22.15 | 22.08 | 3.33 | 654 360 | 乘≈64.65×1010 | 乘≈55.75×107 | 乘≈21.99×108 | |
加≈64.64×1010 | 加≈74.33×107 | 加≈21.91×108 | ||||||||
WWL方案 | 40 896 | 40 896 | 199.38 | 33.23 | 4.99 | 981 528 | 乘≈15.31×1012 | 乘≈50.17×108 | 乘≈32.99×108 | |
加≈15.30×1012 | 加≈66.90×108 | 加≈32.87×108 | ||||||||
本文方案 | 6 816 | 13 632 | 5.54 | 11.08 | 1.66 | 327 192 | 乘≈13.74×109 | 乘≈96.87×106 | 乘≈11.00×108 | |
加≈13.73×109 | 加≈96.87×106 | 加≈10.96×108 |
"
方案 | 陷门维数 | 用户公钥维数 | 陷门尺寸/MB | 陷门质量 | 用户公钥尺寸/MB | 用户私钥尺寸/kB | 明文—密文扩展率 | 计算效率( | ||
陷门派生 | 原像采样 | 加密&解密 | ||||||||
CHKP方案 | 81 792 | 122 688 | 797.50 | 99.69 | 14.98 | 2 944 536 | 乘≈16.42×1014 | 乘≈20.07×109 | 乘≈98.96×108 | |
加≈21.89×1014 | 加≈26.76×109 | 加≈98.61×108 | ||||||||
ABB方案 | 68 160 | 102 240 | 553.82 | 83.04 | 12.48 | 2 453 784 | 乘≈95.00×1013 | 乘≈13.94×109 | 乘≈82.46×108 | |
加≈12.67×1014 | 加≈18.58×109 | 加≈82.17×108 | ||||||||
YZWLY方案 | 27 264 | 40 896 | 88.61 | 33.12 | 4.99 | 98 1528 | 乘≈60.80×1012 | 乘≈22.30×108 | 乘≈32.99×108 | |
加≈81.06×1012 | 加≈29.73×108 | 加≈32.87×108 | ||||||||
WWL方案 | 40 896 | 40 896 | 199.38 | 33.23 | 4.99 | 981 528 | 乘≈27.36×1013 | 乘≈50.17×108 | 乘≈68.40×1012 | |
加≈34.20×1013 | 加≈66.90×108 | 加≈68.40×1012 | ||||||||
本文方案 | 13 632 | 20 448 | 11.08 | 16.61 | 2.50 | 490 776 | 乘≈19.80×1011 | 乘≈14.53×107 | 乘≈16.49×108 | |
加≈19.80×1011 | 加≈14.53×107 | 加≈16.43×108 |
[1] | GENTRY C , SILVERBERG A . Hierarchical id-based cryptography,advances in cryptology[C]// ASIACRYPT 2002. 2002: 548-566. |
[2] | HORWITZ J , LYNN B . Toward hierarchical identity-based encryption[C]// EUROCRYPT. 2002: 466-481. |
[3] | BONEH D , FRANKLIN M . Identity-based encryption from theweil pairing[C]// Advances in Cryptology CRYPTO 2001. 2001: 213-229. |
[4] | LAI J , DENG R H , LIU S ,et al. Identity-based encryption secure against selective opening chosen-ciphertextattack[C]// Advances in Cryptology EUROCRYPT 2012. 2012: 77-92. |
[5] | YAMADA S , . Adaptively secure identity-based encryption from lattices with asymptotically shorter public parameters[C]// Advances in Cryptology EUROCRYPT2016. 2016: 32-62. |
[6] | WANG F H , LIU Z H , WANG C X . Full secure identity-based encryption scheme with short public key size over lattices in the standard model[J]. The International Journal of Computer Mathematics, 2016,93(6): 854-863. |
[7] | REGEV O . On lattices,learning with errors,random linear codes,and cryptography[J]. The Annual ACM Symposium on Theory of Computing, 2009,56(6): 84-93. |
[8] | NGUYEN P , ZHANG J , ZHANG Z F . Simpler efficient group signatures from lattices[C]// Public-Key Cryptography. 2015: 401-426. |
[9] | BRAKERSKI Z , PERLMAN R . Lattice-based fully dynamic multi-key FHE with short ciphertexts[C]// CRYPTO2016. 2016: 190-213. |
[10] | LIBERT B , LING S , NGUYEN K ,et al. Zero-knowledge arguments for lattice-based accumulators,logarithmic-size ring signatures and group signatures without trapdoors[C]// Advances in Cryptology EUROCRYPT 2016. 2016: 1-31. |
[11] | 段然, 顾纯祥, 祝跃飞 ,等. NTRU 格上高效的基于身份的全同态加密体制[J]. 通信学报, 2017,38(1): 66-75. |
DUAN R , GU C X , ZHU Y F ,et al. Efficient identity-based fully homomorphic encryption over NTRU[J]. Journal on Communications, 2017,38(1): 66-75. | |
[12] | CASH D , HOFHEINZ D , KILTZ E ,et al. Bonsai trees,or how to delegate lattice basis[C]// Advances in Cryptology EUROCRYPT 2010. 201025(4): 523-552. |
[13] | GENTRY C , PEIKERT C , VAIKUNTANATHAN V . Trapdoors for hard lattices and new cryptographic constructions[C]// The 40th ACM Symposium on Theory of Computing. 2008: 197-206. |
[14] | AGRAWAL S , BONEH D , BOYEN X . Efficient lattice (H)IBE in the standard model[C]// Advances in Cryptology EUROCRYPT2010, 2010: 553-572. |
[15] | MICCIANCIO D , PEIKERT C . Trapdoors for lattices:simpler,tighter,faster,smaller[C]// Advances in Cryptology EUROCRYPT2012. 2012: 700-718. |
[16] | ALWEN J , PEIKERT C . Generating shorter bases for hard random lattices[C]// The 26th International Symposium on Theoretical Aspects of Computer Science. 2009: 535-553. |
[17] | PEIKERT C , . An efficient and parallel Gaussian sampler for lattices[C]// Advances in Cryptology CRYPTO 2010. 2010: 80-97. |
[18] | AGRAWAL S , BOYEN X , VAIKUNTANATHAN V ,et al. Functional encryption for threshold functions(or fuzzy IBE) from lattices[C]// 15th International Conference on Practice and Theory in Public Key Cryptography. 2012: 280-297. |
[19] | YANG C , ZHENG S , WANG L ,et al. Hierarchical identity-based broadcast encryption scheme from LWE[J]. Journal of Communications & Networks, 2014,16(3): 258-263. |
[20] | KATSUMATA S , YAMADA S . Partitioning via non-linear polynomial functions:more compact IBEs from ideal lattices and bilinear maps[C]// Advances in Cryptology ASIACRYPT 2016. 2016: 682-712. |
[21] | ZHANG J , CHEN Y , ZHANG Z . Programmable hash functions from lattices:short signatures and IBEs with small key sizes[C]// Advances in Cryptology CRYPTO 2016. 2016: 302-332. |
[22] | WANG F H , WANG C X , LIU Z H . Efficient hierarchical identity based encryption scheme in the standard model over lattices[J]. Frontiers of Information Technology & Electronic Engineering, 2016,17(8): 781-791. |
[23] | DODIS Y , OSTROVSKY R , REYZIN L ,et al. Fuzzy extractors:How to generate strong keys from biometrics and other noisy data[J]. The Society for Industrial and Applied Mathematics (SIAM), 2008,38(1): 97-139. |
[1] | Huanhuan LIAN, Huiying HOU, Yunlei ZHAO. Post-quantum verifier-based three-party password authenticated key exchange protocol [J]. Journal on Communications, 2022, 43(4): 95-106. |
[2] | Yuanbo GUO, Anqi YIN. Research on password-authenticated key exchange protocol over lattices [J]. Journal on Communications, 2022, 43(12): 172-187. |
[3] | Youheng DONG, Geng ZHAO, Yingjie MA. Two-dimensional pseudo-random coupled map lattices system based on partitioned elementary cellular automata and its dynamic properties [J]. Journal on Communications, 2022, 43(1): 71-82. |
[4] | Hongxia HOU, Mingrui ZHANG, Yanqi ZHAO, Xiaoli DONG. ID-based ring signature on prime order group from asymmetric pairing [J]. Journal on Communications, 2021, 42(9): 155-164. |
[5] | Miaomiao TIAN, Jing CHEN, Hong ZHONG. Identity-based incremental signature scheme from lattices [J]. Journal on Communications, 2021, 42(1): 108-117. |
[6] | Zhen LIU,Yiliang HAN,Xiaoyuan YANG,Shuguang LIU. Provable security signcryption scheme based on RLWE without trapdoor [J]. Journal on Communications, 2020, 41(6): 14-25. |
[7] | Xiaodong YANG,Yutong LI,Jinli WANG,Tingchun MA,Caifen WANG. Revocable identity-based proxy re-signature scheme in the standard model [J]. Journal on Communications, 2019, 40(5): 153-162. |
[8] | Miaomiao TIAN,Chuang GAO,Jie CHEN. Identity-based cloud storage integrity checking from lattices [J]. Journal on Communications, 2019, 40(4): 128-139. |
[9] | Yatao YANG,Xinguang HAN,Jierun HUANG,Yang ZHAO. Bidirectional authentication key agreement protocol supporting identity’s privacy preservation based on RLWE [J]. Journal on Communications, 2019, 40(11): 180-186. |
[10] | Qian MENG,Jianfeng MA,Kefei CHEN,Yinbin MIAO,Tengfei YANG. Data comparable encryption scheme based on cloud computing in Internet of things [J]. Journal on Communications, 2018, 39(4): 167-175. |
[11] | Xixi YAN,Yuan LIU,Zichen LI,Yongli TANG,Qing YE. Privacy-preserving attribute-based encryption scheme on ideal lattices [J]. Journal on Communications, 2018, 39(3): 128-135. |
[12] | Caifen WANG,Li CHEN. Three-party password authenticated key agreement protocol with user anonymity based on lattice [J]. Journal on Communications, 2018, 39(2): 21-30. |
[13] | Xiaodong YANG,Chunlin CHEN,Ping YANG,Faying AN,Tingchun MA,Caifen WANG. Partially blind proxy re-signature scheme with proven security [J]. Journal on Communications, 2018, 39(2): 65-72. |
[14] | Shao-bo YU,Ling-da WU,Xi-tao ZHANG. Research on space information representation model based on formal concept analysis [J]. Journal on Communications, 2017, 38(Z2): 78-85. |
[15] | Yong-li TANG,Ming-xing HU,Kun LIU,Qing YE,Xi-xi YAN. Novel identity-based fully homomorphic encryption scheme from lattice [J]. Journal on Communications, 2017, 38(5): 39-47. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|