期刊文献+

一种格上基于身份的高效验证方案 被引量:1

AN EFFICIENT IDENTITY-BASED IDENTIFICATION PROTOCOL FROM LATTICES
下载PDF
导出
摘要 基于身份的验证协议是密码学的重要应用之一。在后量子时代下保证该原语的安全性与高效性已成为重要的研究方向。为了弥补现有量子安全的基于身份的验证协议效率较低、与实际应用的需求有较大差距等缺陷,利用叠加承诺与回复等参数优化技术提出一种更加高效的标准模型下格上基于身份的验证方案。该方案基于Ideal-SVP问题,在模仿者静态身份并发主动攻击模型下可证明安全。与现有方案相比,该方案的空间效率与运算效率均得到了提升。 Identity-based identification protocol is one of the most important applications of cryptography. It is an important research direction to ensure the security and efficiency of this primitive in post-quantum era. In this paper,in order to make up for the shortcomings of the current quantum-based security protocols such as identity-based identification protocols,which are inefficient and have a large gap with the actual application requirements,parameter optimization techniques such as dual commitments and responses were adopted to improve the identification. An identitybased identification from lattice assumptions in the standard model was proposed. Based on the Ideal-SVP problem,this scheme proved the security under the imitator's static identity and concurrent active attack model. Compared with the existing programs,the program's space efficiency and computing efficiency has been improved.
作者 刘芳 赵一鸣 Liu Fang;Zhao Yiming(Software School, Fudan University, Shanghai 201203, China)
出处 《计算机应用与软件》 北大核心 2018年第5期27-32,61,共7页 Computer Applications and Software
关键词 基于身份 验证协议 标准模型 Lattice Identity-based Identification protocol Standard model
  • 相关文献

参考文献3

二级参考文献30

  • 1Sahai A, Waters B. Fuzzy identity based encryption// Proceedings of the Eurocrypt 2005. Aarhus, Denmark, 2005: 457-473.
  • 2Goyal V, Pandey O, Sahai A, Waters B, Attribute-based encryption for fine-grained access control of encrypted data// Proceedings of the ACM CCS 2006. Alexandria, Virginia,USA, 2006: 89-98.
  • 3Katz J, Sahai A Waters B. Predicate encryption supporting disjunctions, polynomial equations, and inner products// Proceedings of the Eurocrypt 2008. Istanbul, Turkey, 2008.. 146-162.
  • 4Agrawal S, Boyen X, Vaikuntanathan V, et al. Functional encryption for threshold functions (or, fuzzy IBE) from lattices//Proceedings of the Public Key Cryptography (PKC 2012). Darmstadt, Germany, 2012.. 280-297.
  • 5Lyubashevsky V, Peikert C, Regev O. On ideal lattices and learning with errors over rings//Proceedings of the EURO- CRYPT 2010. Monaco and Nice, French, 2010: 1-23.
  • 6Lyubashevsky V, Peikert C, Regev O. A toolkit for ring- LWE cryptography//Proceedings of the EUROCRYPT 2013. Athens, Greece, 2013: 35-54.
  • 7Stehl4 D, Steinfeld R, Tanaka K, Xagawa K. Efficient public key encryption based on ideal lattices//Praceedings of the ASIACRYPT 2009. Tokyo, Japan, 2009: 617-635.
  • 8Gentry C, Peikert C, Vaikuntanathan V. Trapdoors for hard lattices and new cryptographic constructions//Proceedings of the STOC 2008. Victoria, British Columbia, Canada, 2008: 197-206.
  • 9Miccianeio D, Regev O. Worst-case to average-case reductions based on Gaussian measures. SIAM Journal on Computing, 2007, 37(1).. 267-302.
  • 10Banaszczyk W. Inequalites for convex bodies and polar recip- rocal lattices in Rn. Discrete Computational Geometry, 1995, 13(1): 217-231.

共引文献30

同被引文献9

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部