浏览全部资源
扫码关注微信
河南理工大学计算机科学与技术学院,河南 焦作 454000
[ "汤永利(1972-),男,河南孟州人,博士后,河南理工大学教授、硕士生导师,主要研究方向为信息安全、密码学。" ]
[ "胡明星(1994-),男,河南鹿邑人,河南理工大学硕士生,主要研究方向为密码学。" ]
[ "刘琨(1978-),女,河南焦作人,河南理工大学副教授、硕士生导师,主要研究方向为信息安全、密码学。" ]
[ "叶青(1981-),女,辽宁营口人,博士,河南理工大学讲师、硕士生导师,主要研究方向为密码学。" ]
[ "闫玺玺(1985-),女,河南灵宝人,河南理工大学讲师、硕士生导师,主要研究方向为密码学。" ]
网络出版日期:2017-05,
纸质出版日期:2017-05-25
移动端阅览
汤永利, 胡明星, 刘琨, 等. 新的格上基于身份的全同态加密方案[J]. 通信学报, 2017,38(5):39-47.
Yong-li TANG, Ming-xing HU, Kun LIU, et al. Novel identity-based fully homomorphic encryption scheme from lattice[J]. Journal on communications, 2017, 38(5): 39-47.
汤永利, 胡明星, 刘琨, 等. 新的格上基于身份的全同态加密方案[J]. 通信学报, 2017,38(5):39-47. DOI: 10.11959/j.issn.1000-436x.2017098.
Yong-li TANG, Ming-xing HU, Kun LIU, et al. Novel identity-based fully homomorphic encryption scheme from lattice[J]. Journal on communications, 2017, 38(5): 39-47. DOI: 10.11959/j.issn.1000-436x.2017098.
分析以往格上基于身份的全同态加密方案,指出方案效率低的根本原因在于陷门生成和原像采样过程的复杂度过高,为此提出一种新的解决方案。先将新型陷门函数与对偶容错学习(LWE,learning with errors)算法有机结合,构造一种新的格上基于身份的加密方案;再利用特征向量方法转化为格上基于身份的全同态加密方案。对比分析表明,所提方案的陷门生成复杂度显著降低,原像采样复杂度约降低为以往方案的
<math xmlns="http://www.w3.org/1998/Math/MathML"> <mfrac> <mn>1</mn> <mn>3</mn> </mfrac> </math>
,SIVP 近似因子缩小为以往方案的
<math xmlns="http://www.w3.org/1998/Math/MathML"> <mfrac> <mn>1</mn> <mrow> <msqrt> <mi>m</mi> </msqrt> </mrow> </mfrac> </math>
。在标准模型下,方案安全性归约至判定性LWE的难解性,并包含严格的安全性证明。
The previous identity-based homomorphic encryption schemes from lattice was analyzed.That the high complexity in previous schemes was mainly caused by trapdoor generation and preimage sampling was pointed out.A new solution was proposed.A novel identity-based encryption scheme from lattice by combining new trapdoor function and dual-LWE algorithm organically was constructed
and it was transformed to an identity-based fully homomorphic encryption scheme from lattice by employing the idea of eigenvector.Comparative analysis shows that the scheme’s complexity of trapdoor generation has a significant reduction
the complexity of preimage sampling has a nearly three-fold reduction
and the SIVP approximation factor has a
<math xmlns="http://www.w3.org/1998/Math/MathML"> <mrow> <msqrt> <mi>m</mi> </msqrt> </mrow></math>
times reduction.The security of the proposed scheme strictly reduces to the hardness of decisional learning with errors problem in the standard model.
RIVEST R , ADLEMAN L , DERTOUZOS M . On data banks and privacy homomorphisms [C ] // IEEE 17nd Annual Symposium on Foundations of Computer Science (FOCS1978) . 1978 : 169 - 177 .
GENTRY C , . Fully homomorphic encryption using ideal lattices [C ] // The 41rd ACM Symposium on Theory of Computing (STOC2009) . 2009 : 169 - 178 .
DUCAS L , MICCIANCIO D.FHEW . Bootstrapping homomorphic encryption in less than a second [C ] // Advances in Cryptology EUROCRYPT 2016 . 2015 : 617 - 640 .
BRAKERSKI Z , PERLMAN R . Lattice-based fully dynamic multi-key FHE with short ciphertexts [C ] // Advances in Cryptology CRYPTO 2016 . 2016 : 190 - 213 .
NUIDA K , KUROSAWA K . (Batch) Fully homomorphic encryption over integers for non-binary message spaces [C ] // Advances in Cryptology EUROCRYPT 2015 . 2015 : 537 - 555 .
光焱 , 祝跃飞 , 费金龙 , 等 . 利用容错学习问题构造基于身份的全同态加密体制 [J ] . 通信学报 , 2014 , 35 ( 2 ): 111 - 117 .
GUANG Y , ZHU Y F , FEI J L , et al . Identity-based fully homomorphic encryption from learning with error problem [J ] . Journal on Communications , 2014 , 35 ( 2 ): 111 - 117 .
康元基 , 顾纯祥 , 郑永辉 , 等 . 利用特征向量构造基于身份的全同态加密体制 [J ] . 软件学报 , 2016 , 27 ( 6 ): 1487 - 1497 .
KANG Y J , GU C X , ZHENG Y H , et al . Identity-based fully homomorphic encryption from eigenvector [J ] . Journal of Software , 2016 , 27 ( 6 ): 1487 - 1497 .
GENTRY C , SAHAI A , WATERS B.Homomorphic encryption from learning with errors . Conceptually-simpler,asymptotically-faster,attribute-based [C ] // Advances in Cryptology CRYPTO 2013 . 2013 : 75 - 92 .
CLEAR M , MCGOLDRICK C . Multi-identity and multi-key leveled FHE from learning with errors [C ] // Advances in Cryptology CRYPTO 2015 . 2015 : 630 - 656 .
GENTRY C , PEIKERT C , VAIKUNTANATHAN V . Trapdoors for hard lattices and new cryptographic constructions [C ] // The 40th ACM Symposium on Theory of Computing(STOC2008) . 2008 : 197 - 206 .
AJTAIM . Generating hard instances of the short basis problem [C ] // Automata,Languages and Programming(ICALP1999) . 1999 : 1 - 9 .
AGRAWAL S , BONEHD , BOYEN X . Efficient lattice (H)IBE in the standard model [C ] // Advances in Cryptology EUROCRYPT2010 . 2010 : 553 - 572 .
APON D , FAN X , LIU F H . Fully-secure lattice-based IBE as compact as PKE [R ] . IACRePrint Cryptography Archive , 2016 .
YAMADA S , . Adaptively secure identity-based encryption from lattices with asymptotically shorter public parameters [C ] // Advances in Cryptology EUROCRYPT 2016 . 2016 : 32 - 62 .
ALWEN J , PEIKERT C . Generating shorter bases for hard random lattices [C ] // The 26th International Symposium on Theoretical Aspects of Computer Science . 2009 : 535 - 553 .
MICCIANCIO D , PEIKERT C . Trapdoors for lattices,simpler,tighter,faster,smaller [C ] // Advances in Cryptology EUROCRYPT 2012 . 2012 : 700 - 718 .
REGEV O . On lattices,learning with errors,random linear codes,and cryptography [J ] . The Annual ACM Symposium on Theory of Computing , 2009 , 56 ( 6 ): 84 - 93 .
AGRAWAL S , BOYEN X , VAIKUNTANATHAN V , et al . Functional encryption for threshold functions(or fuzzy IBE) from lattices [C ] // The 15th International Conference on Practice and Theory in Public Key Cryptography . 2012 : 280 - 297 .
WANG F H , LIU Z H , WANG C X . Full secure identity-based encryption scheme with short public key size over lattices in the standard model [J ] . The International Journal of Computer Mathematics , 2016 , 93 ( 6 ): 854 - 863 .
DODIS Y , OSTROVSKY R , REYZIN L . Fuzzy extractors.How to generate strong keys from biometrics and other noisy data [J ] . The Society for Industrial and Applied Mathematics (SIAM) , 2008 , 38 ( 1 ): 97 - 139 .
PEIKERT C , . An efficient and parallel gaussian sampler for lattices [C ] // Advances in Cryptology CRYPTO 2010 . 2010 : 80 - 97 .
0
浏览量
2037
下载量
3
CSCD
关联资源
相关文章
相关作者
相关机构