System framework for the RIBE scheme.
Abstract:
A revocable identity-based encryption (IBE) scheme under learning with error (LWE) assumption from lattice is proposed; compared with the existing IBE schemes from lattic...Show MoreMetadata
Abstract:
A revocable identity-based encryption (IBE) scheme under learning with error (LWE) assumption from lattice is proposed; compared with the existing IBE schemes from lattices, two improvements are available in the new scheme. First, the revocation mechanism for identity of user (or thing) is added in the new scheme to manage the dynamic user (or thing) identity in the system, and making the IBE scheme from lattice becomes more practical than ever before. Second, the security of the new scheme is based on the LWE assumption from lattice, so our construction has a solid secure foundation. The scheme is proved to be secured against adaptive-ID attacks under LWE assumption from lattice in the standard model.
System framework for the RIBE scheme.
Published in: IEEE Access ( Volume: 6)
Funding Agency:
Keywords assist with retrieval of results and provide a means to discovering other relevant content. Learn more.
- IEEE Keywords
- Index Terms
- Standard Model ,
- Encryption Scheme ,
- Identity-based Encryption ,
- Learning With Errors ,
- Identity-based Encryption Scheme ,
- User Identification ,
- Security Scheme ,
- Random Vector ,
- Hash Function ,
- Input Matrix ,
- Random Matrix ,
- Secret Key ,
- Public Key ,
- Status Updates ,
- Binary Tree ,
- Bilinear Map ,
- Key Generation ,
- Cryptosystem ,
- Security Parameter ,
- Gaussian Parameters ,
- State St ,
- Public Parameters ,
- Decryption Key ,
- Chosen-plaintext ,
- Decryption Algorithm
- Author Keywords
Keywords assist with retrieval of results and provide a means to discovering other relevant content. Learn more.
- IEEE Keywords
- Index Terms
- Standard Model ,
- Encryption Scheme ,
- Identity-based Encryption ,
- Learning With Errors ,
- Identity-based Encryption Scheme ,
- User Identification ,
- Security Scheme ,
- Random Vector ,
- Hash Function ,
- Input Matrix ,
- Random Matrix ,
- Secret Key ,
- Public Key ,
- Status Updates ,
- Binary Tree ,
- Bilinear Map ,
- Key Generation ,
- Cryptosystem ,
- Security Parameter ,
- Gaussian Parameters ,
- State St ,
- Public Parameters ,
- Decryption Key ,
- Chosen-plaintext ,
- Decryption Algorithm
- Author Keywords