Journal on Communications ›› 2013, Vol. 34 ›› Issue (2): 23-30.doi: 10.3969/j.issn.1000-436x.2013.02.004

• Academic paper • Previous Articles     Next Articles

Public-key encryption scheme based on R-LWE

Xiao-yuan YANG1,2,Li-qiang WU1,Min-qing ZHANG1,Wei ZHANG1   

  1. 1 Key Laboratory of Network & Information Security Under the Chinese Armed Police Force, Department of Electronic Technology, Engineering University of the Armed Police Force, Xi’an 710086,China
    2 Key Laboratory of Network & Information Security, Ministry of Education, Xidian University, Xi’an 710071,China
  • Online:2013-02-25 Published:2017-07-17
  • Supported by:
    The National Natural Science Foundation of China;The National Natural Science Foundation of China;The National Natural Science Foundation of China;The Natural Science Foundation of Shaanxi Province

Abstract:

An improved method of generating trapdoor on ideal lattice was proposed by a stronger regularity bound theorem, then with R-LWE encryption algorithm and strongly unforgeable one-time signature tool from ideal lattice, an adaptive chosen-ciphertext attack (CCA) secure PKE scheme under the st rd model was designed.The new PKE scheme supported public ciphertext integrity verification, could achieve block encryption and had a high encryption/decryption speed and a low encryption blowup factor, whose security proved reduced to decisional R-LWE assumption tightly.The construction is the first CCA-secure PKE cryptosystem completely based on hard problems from ideal lattice.

Key words: public key encryption, chosen-ciphertext security, ideal lattice, R-LWE

No Suggested Reading articles found!