The Journal of China Universities of Posts and Telecommunications ›› 2019, Vol. 26 ›› Issue (4): 70-79.doi: DOI: 10.19682/j.cnki.1005-8885.2019.1019

• Others • Previous Articles     Next Articles

Lattice-based hierarchical identity-based broadcast encryption scheme in the standard model

Tang Yongli, Wang Mingming, Ye Qing, Qin Panke, Zhao Zongqu   

  1. Institute of Computer Science and Technology, Henan Polytechnic University, Jiaozuo 454000, China
  • Received:2018-10-10 Revised:2019-03-28 Online:2019-08-31 Published:2019-10-29
  • Contact: Corresponding author: Ye Qing, E-mail: yeqing@hpu.edu.cn E-mail:yeqing@hpu.edu.cn
  • About author:Corresponding author: Ye Qing, E-mail: yeqing@hpu.edu.cn
  • Supported by:
    This work was supported by the National Natural Science Foundation of China ( 61300216 ), the ‘ 13th Five-Year' National Crypto Development Foundation ( MMJJ20170122), the Project of Education Department of Henan Province (16A520013, 18A413001), the Natural Science Foundation of Henan Polytechnic University (T2018-1) and the Doctoral Fund of Henan Polytechnic University (B2014-044, B2016-36).

Abstract: Lattice-based hierarchical identity-based broadcast encryption ( H-IBBE) schemes have broad application prospects in the quantum era,because it reduces the burden of private key generator (PKG) and is suitable for one-to-many communication. However, previous lattice-based H-IBBE schemes are mostly constructed in the random oracle model with more complex trapdoor delegation process and have lower practical application. A lattice-based H-IBBE is proposed in the fixed dimension under the standard model, which mainly consists of binary tree encryption (BTE) system, MP12 trapdoor function and ABB10b trapdoor delegation algorithm. First, this paper uses BTE system to eliminate the random oracle so that the scheme can be implemented under the standard model, and it also uses MP12 trapdoor function to reduce trapdoor generation complexity and obtains a safe and efficient trapdoor matrix; Second, this paper uses ABB10b trapdoor delegation algorithm to delegate user爷s private key, and the trapdoor matrices' dimensions are the same before and after the trapdoor delegation. Comparative analysis shows that trapdoor delegation process reduces complexity, and the size of cipher-text and trapdoor matrix does not increase with deeper trapdoor delegation process. This paper achieves indistinguishability of cipher-texts under a selective chosen-cipher-text and chosen-identity attack (INDr-sID-CCA) security in the standard model based on learning with errors (LWE) hard assumption.

Key words: lattice-based cryptography, H-IBBE, standard model, fixed dimension

CLC Number: