期刊文献+

Lattice-based certificateless encryption scheme 被引量:2

Lattice-based certificateless encryption scheme
原文传递
导出
摘要 Certificateless public key cryptography (CL- PKC) can solve the problems of certificate management in a public key infrastructure (PKI) and of key escrows in identity-based public key cryptography (ID-PKC). In CL- PKC, the key generation center (KGC) does not know the private keys of all users, and their public keys need not be cer- tificated by certification authority (CA). At present, however, most certificateless encryption schemes are based on large in- teger factorization and discrete logarithms that are not secure in a quantum environment and the computation complexity is high. To solve these problems, we propose a new certificate- less encryption scheme based on lattices, more precisely, us- ing the hardness of the learning with errors (LWE) problem. Compared with schemes based on large integer factoriza- tion and discrete logarithms, the most operations are matrix- vector multiplication and inner products in our scheme, our approach has lower computation complexity. Our scheme can be proven to be indistinguishability chosen ciphertext attacks (IND-CPA) secure in the random oracle model. Certificateless public key cryptography (CL- PKC) can solve the problems of certificate management in a public key infrastructure (PKI) and of key escrows in identity-based public key cryptography (ID-PKC). In CL- PKC, the key generation center (KGC) does not know the private keys of all users, and their public keys need not be cer- tificated by certification authority (CA). At present, however, most certificateless encryption schemes are based on large in- teger factorization and discrete logarithms that are not secure in a quantum environment and the computation complexity is high. To solve these problems, we propose a new certificate- less encryption scheme based on lattices, more precisely, us- ing the hardness of the learning with errors (LWE) problem. Compared with schemes based on large integer factoriza- tion and discrete logarithms, the most operations are matrix- vector multiplication and inner products in our scheme, our approach has lower computation complexity. Our scheme can be proven to be indistinguishability chosen ciphertext attacks (IND-CPA) secure in the random oracle model.
出处 《Frontiers of Computer Science》 SCIE EI CSCD 2014年第5期828-836,共9页 中国计算机科学前沿(英文版)
基金 This work was supported by the National Natural Science Foundations of China (Grant Nos. 61173151, 61173152 and 61100229) and Huawei Technologies Co., Ltd., (YBCB2011116).
关键词 lattice-based cryptography LWE identity-based encryption (IBE) post-quantum cryptography certifi-cateless encryption lattice-based cryptography, LWE, identity-based encryption (IBE), post-quantum cryptography, certifi-cateless encryption
  • 相关文献

参考文献32

  • 1Al-Riyami S, Paterson K G. Certificateless public key cryptography Lecture Notes in Computer Science, 2003, 2894:452-473.
  • 2Al-Riyami S, Paterson K G. CBE from CL-PKE: a generic construc- tion and efficient schemes. Lecture Notes in Computer Science, 20053386:398-415.
  • 3Baek J, Safavi-Naini R, Susilo W. Certificateless public key encryp- tion without pairing. Lecture Notes in Computer Science, 2005, 3650: 134-148.
  • 4Lai J Z, Deng R H, Liu S L, Kou W D. RSA-based certificateless pub- lic key encryption. Lecture Notes in Computer Science, 2009, 5451: 24-34.
  • 5Yum D H, Lee P J. Generic construction of certificateless encryption. Lecture Notes in Computer Science, 2004, 3043:802-811.
  • 6Libert B, Quisquater J J. On constructing certificateless cryptosystems from identity based encryption. Lecture Notes in Computer Science, 2006, 3958:474-490.
  • 7Cheng Z H, Chen L Q, Ling L, Comley R. General and efficient cer- tificateless public key encryption constructions. Lecture Notes in Com- puter Science, 2007, 4575:83-107.
  • 8Dent A W, Libert B, Paerson K G. Certificateless encryption schemes strongly secure in the standard model. Lecture Notes in Computer Sci- ence, 2008, 4939:344-359.
  • 9Huang Q, Wong D S. Generic certificateless encryption in the standard model. Lecture Notes in Computer Science, 2007, 4752:278-291.
  • 10Gentry C, Peikert C, Vkuntanathan V. Trapdoors for hard lattices and new cryptographic constructions. In: Proceedings of the 40th Annual ACM Symposium on Theory of Computing. 2008, 197-206.

同被引文献5

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部