JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE) ›› 2017, Vol. 52 ›› Issue (6): 64-68.doi: 10.6040/j.issn.1671-9352.2.2016.215

Previous Articles     Next Articles

Identity-based encryption in multiple PKG environment based on ring signature

LUO Peng1, YANG Xiao-yuan1,2   

  1. 1.Key Laboratory of Cryptology &
    Information Security of APF, Engineering University of APF, Xian 710086, Shaanxi, China;
    2. Research Institution of Information Security of APF, Engineering University of APF, Xian 710086, Shaanxi, China
  • Received:2016-08-16 Online:2017-06-20 Published:2017-06-21

Abstract: Combining ring signatures with identity-based encryption, a new identity-based encryption with multiple private key generators was constructed, that is, scheme of multiple private key generators identity-based encryption based on ring signatures. Then a multiple private key generator identity-based encryption scheme on lattice based on ring signatures in the standard model was constructed, the security of the scheme was based on the difficulty of small integer solution problems and learning with errors on lattice. Compared with the existing scheme of identity-based encryption and its variation, the new scheme decreased the burdens of private key generator which more applicable to huge system and had higher application flexibility.

Key words: lattice, ring signature, Identity-based encryption

CLC Number: 

  • TP309
[1] SHAMIR A. Identity-Based cryptosystems and signature schemes[C] // The Workshop on the Theory and Application of Cryptographic Techniques. Springer, Berlin, Heidelberg, 1984: 47-53.
[2] DAN B, FRANKLIN M. Identity-Based encryption from the weil pairing[J]. Siam Journal on Computing, 2001, 32(3):213-229.
[3] BOYD C. Advances in Cryptology — ASIACRYPT 2001[J]. Advances in Cryptology — Asiacrypt, 2001: 125-143.
[4] CHAUM D, HEYST E V. Group signatures[M] // Advances in Cryptology — EUROCRYPT’91. Springer Berlin Heidelberg, 1991: 257-265.
[5] GENTRY C, SILVERBERG A. Hierarchical ID-Based cryptography[C] // Advances in Cryptology-ASIACRYPT 2002, International Conference on the Theory and Application of Cryptology and Information Security, Queenstown, New Zealand, December 1-5, 2002, Proceedings. DBLP, 2002: 548-566.
[6] HORWITZ J, LYNN B. Toward hierarchical Identity-Based encryption[M] // Advances in Cryptology — EUROCRYPT 2002. Springer Berlin Heidelberg, 2002: 466-481.
[7] SHOR P W. Polynomial time algorithms for discrete logarithms and factoring on a quantum computer[C] // International Symposium on Algorithmic Number Theory. Springer-Verlag, 1994: 289.
[8] MAY A, SILVERMAN J H. Dimension reduction methods for convolution modular lattices[C] // Revised Papers from the International Conference on Cryptography and Lattices. Springer-Verlag, 2001: 110-125.
[9] MICCIANCIO D, PEIKERT C. Trapdoors for lattices: simpler, tighter, faster, smaller[C] // International Conference on the Theory and Applications of Cryptographic Techniques. Springer, Berlin, Heidelberg, 2012: 700-718.
[10] GEONTAE Noh, CHUN J Y, JEONG I R. Strongly unforgeable ring signature scheme from lattices in the standard model[J]. Journal of Applied Mathematics,2014,(2014-5-5), 2014, 2014(2014):1-12.
[11] GENTRY C, PEIKERT C, VAIKUNTANATHAN V. Trapdoors for hard lattices and new cryptographic constructions[C] // DBLP, 2008: 197-206.
[12] DAMIEN S, RON S, TANAKA K, et al. Efficient public key encryption based on ideal lattices[C] // Advances in Cryptology-ASIACRYPT 2009, International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings. DBLP, 2009: 617-635.
[13] YANG X Y, WU L Q, ZHANG M Q, et al. Public-key encryption scheme based on R-LWE[J]. Journal on Communications, 2013, 34(2):23-30.
[1] ZHANG En-sheng. Composition and structure on attribute reduction of interval-set concept lattices [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(8): 17-24.
[2] PENG Jia-yin. Falling fuzzy filters on residuated lattices [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(2): 52-64.
[3] LIU Chun-hui. On(∈,∈∨q(λ, μ))-fuzzy LI-ideals in lattice implication algebras [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(2): 65-72.
[4] SHAO Yong. Semilattice-ordered completely regular periodic semigroups [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(10): 1-5.
[5] LIU Li-jun. Characterizations of n-fold positive implicative filter in residuated lattice [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(8): 48-52.
[6] LI Jin-hai, WU Wei-zhi. Granular computing approach for formal concept analysis and its research outlooks [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(7): 1-12.
[7] HUANG Tao-lin, NIU Jiao-jiao, LI Jin-hai. Reduct updating method in a dynamic formal context based on granular discernibility attribute matrix [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(7): 13-21.
[8] WANG Wei-li, HU Bin, ZHAO Xiu-feng. An efficient multi-identity-based fully homomorphic encryption scheme [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(5): 85-94.
[9] LIU Lin, WEI Ling, QIAN Ting. Three-way rules extraction in formal decision contexts with confidence [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(2): 101-110.
[10] CHEN Xue, WEI Ling, QIAN Ting. Attribute reduction in formal decision contexts based on AE-concept lattices [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(12): 95-103.
[11] LIANG Ying, CUI Yan-li, WU Hong-bo. Properties of residuated lattice of deduction systems set algebra in BL system [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(11): 65-70.
[12] LIU Li-jun. Characterizations and properties of triple-δ-derivation in Boolean algebra [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(11): 95-99.
[13] LIU Chun-hui. Lattice of(,∨(-overq))-fuzzy filters in a BL-algebra [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(10): 104-110.
[14] LIN Ping-feng. Non-solvabla elements of semigroup PΓ(Λ×Λ)of binary relations determined by the semilattice Γ on the set Λ [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(2): 12-15.
[15] PENG Jia-yin. [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(2): 119-126.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!