期刊文献+

基于格的公钥加密与证书基加密

Public-key encryption and certificate-based encryption from lattice
下载PDF
导出
摘要 证书基加密(CBE)结合了基于身份加密和公钥基础设施的各自优点,然而基于传统数学假设的CBE不能有效抵御量子算法的攻击.为此构建了一个基于格的CBE方案,可有效抵御量子算法的攻击.首先构建出一个基于格的公钥加密(PKE)方案,之后利用该PKE构建出基于格的CBE方案.该方案可被规约为格上的学习误差(LWE)问题,因此得到的CBE为随机不可区分选择明文攻击安全的.该方案是目前为止已知的第一个基于格的CBE方案. Certificate-based encryption (CBE) combines the advantages of identity-based en- cryption and that of public key infrastructure. However, CBE based on traditional mathematical assumptions cannot defeat quantum attacks. This paper aims at constructing a lattice-based CBE which is post-quantum: First constructed a lattice-based public key encryption (PKE) ; then used this PKE to construct a lattice-based CBE. Finally, it was proved that the ciphertexts generated by our CBE are indistinguishable from random against chosen-plaintext attacks (namely, INDr- CBE-CPA secure) by assuming that the learning with errors (LWE) problem is hard. This scheme is the first known lattice-based CBE so far.
出处 《华东师范大学学报(自然科学版)》 CAS CSCD 北大核心 2014年第1期47-59,共13页 Journal of East China Normal University(Natural Science)
基金 国家自然科学基金(61172085)
  • 相关文献

参考文献17

  • 1AJTAI M. Generating hard instances of lattice problems[C]//Proceedings of the twenty-eighth annual ACM sym- posium on Theory of computing. ACM, 1996: 99-108.
  • 2AJTAI M. The shortest vector problem in L2 is NP-hard for randomized reductions[C]//Proceedings of the thirti- eth annual ACM symposium on Theory of computing. ACM, 1998: 10-19.
  • 3SHAMIR A. Identity-based cryptosystems and signature sehemes[C]//Advances in eryptology. Berlin:Springer, 1985: 47-53.
  • 4BONEH D, FRANKLIN M. Identity-based encryption from the Weil pairing [C]//Advances in Cryptology- CRYPTO 2001. Berlin: Springer, 2001: 213-229.
  • 5COCKS C. An identity based encryption scheme based on quadratic residues[M]//Cryptography and Coding. Ber- lin: Springer, 2001: 360-363.
  • 6AGRAWAL S, BONEH D, BOYEN X. Efficient lattice (H)IBE in the standard model[M]//Advances in Cryp- tology-EUROCRYPT 2010. Berlin: Springer, 2010: 553-572.
  • 7SHOR P W. Algorithms for quantum computatiom discrete logarithms and factoring[C]//Foundations of Com- puter Science, 1994 Proceedings. , 35th Annual Symposium on. IEEE, 1994:124-134.
  • 8GENTRY C. Certificate-based encryption and the certificate revocation problem[M]//Advances in Cryp- tology- EUROCRYPT 2003. Berlin: Springer, 2003; 272-293.
  • 9BONEH D, CANETTI R, HALEVI S, et al. Chosen-ciphertext security from identity-based encryption~J~. SI- AM Journal on Computing, 2006, 36(5) : 1301-1328.
  • 10REGEV O. On lattices, learning with errors, random linear codes, and cryptography[J]. Journal of the ACM (JACM), 2009, 56(6): 34.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部