信息网络安全 ›› 2019, Vol. 19 ›› Issue (1): 34-41.doi: 10.3969/j.issn.1671-1122.2019.01.005
收稿日期:
2018-09-20
出版日期:
2019-01-20
发布日期:
2020-05-11
作者简介:
作者简介:李明祥(1968—),男,山东,副教授,博士,主要研究方向为公钥密码学和区块链技术;王洪涛(1983—),男,山东,讲师,博士,主要研究方向为物联网安全、信息内容安全和人工智能安全。
基金资助:
Mingxiang LI1(), Hongtao WANG2
Received:
2018-09-20
Online:
2019-01-20
Published:
2020-05-11
摘要:
基于格的密码体制是一类抗量子计算攻击的公钥密码体制。量子计算机一旦问世,将对目前广泛使用的公钥密码体制,如基于大数分解的密码体制、基于离散对数的密码体制等,造成冲击。因此基于格的密码体制近年来成为网络安全领域的研究热点。身份基加密体制简化了用户公钥的管理过程,它可应用到资源受限的环境中。目前人们已提出了许多基于格的身份基加密方案,但这些方案都是单比特加密方案。鉴于此,文章利用Peikert、Vaikuntanathan和Waters的密文包装技术,设计了一个基于格的矩阵公钥加密方案,并基于LWE问题困难假设,证明了该公钥加密方案是IND-CPA安全的。文章进而以所提出的公钥加密方案为基础,依据Gentry、Peikert和Vaikuntanathan提出的对偶加密系统,构造了一个基于格的身份基矩阵加密方案,并基于LWE问题困难假设,证明了该身份基加密方案满足IND-sID-CPA安全。
中图分类号:
李明祥, 王洪涛. 基于格的身份基矩阵加密方案[J]. 信息网络安全, 2019, 19(1): 34-41.
Mingxiang LI, Hongtao WANG. Identity-based Matrix Encryption Scheme Based on Lattices[J]. Netinfo Security, 2019, 19(1): 34-41.
[1] | PEIKERT C.A Decade of Lattice Cryptography[J]. Foundations and Trends in Theoretical Computer Science, 2016, 10(4): 283-424. |
[2] | ZHANG Pingyuan, JIANG Han, CAI Jie, et al.Recent Advances in Lattice-based Cryptography[J]. Journal of Computer Research and Development, 2017, 54(10): 2121-2129. |
张平原, 蒋瀚, 蔡杰, 等. 格密码技术近期研究进展[J]. 计算机研究与发展. 2017, 54(10): 2121-2129. | |
[3] | REGEV O. On Lattices, Learning with Errors, Random Linear Codes, and Cryptography[C]//ACM. The 37th Annual ACM Symposium on Theory of Computing-STOC 2005, May 21-24, 2005, Baltimore, Maryland, USA. New York: ACM, 2005: 94-103. |
[4] | GENTRY C, PEIKERT C, VAIKUNTANATHAN V.Trapdoors for Hard Lattices and New Cryptographic Constructions[C]//ACM. The 40th Annual ACM Symposium on Theory of Computing-STOC 2008, May 17-20, 2008, Victoria, British Columbia, Canada. New York: ACM, 2008: 197-206. |
[5] | AGRAWAL S, BONEH D, BOYEN X. Efficient Lattice (H)IBE in the Standard Model[C]//IACR. The 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques-Eurocrypt 2010, May 30-June 3, 2010, Nice, French Riviera, France. Heidelberg: Springer, 2010: 553-572. |
[6] | YAMADA S.Adaptively Secure Identity-based Encryption from Lattices with Asymptotically Shorter Public Parameters[C]//IACR. The 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques-Eurocrypt 2016, May 8-12, 2016, Vienna, Austria. Heidelberg: Springer, 2016: 32-62. |
[7] | YE Qing, HU Mingxing, TANG Yongli, et al.Novel Hierarchical Identity-based Encryption Scheme from Lattice[J]. Journal on Communications, 2017, 38(11): 54-64. |
叶青, 胡明星, 汤永利, 等. 新的格上基于身份的分级加密方案[J]. 通信学报. 2017, 38(11): 54-64. | |
[8] | KAWACHI A, TANAKA K, XAGAWA K.Multi-bit Cryptosystems Based on Lattice Problems[C]//IACR. The 10th International Conference on Practice and Theory in Public-key Cryptography-PKC 2007, April 16-20, 2007, Beijing, China. Heidelberg: Springer, 2007: 315-329. |
[9] | PEIKERT C, VAIKUNTANATHAN V, WATERS B.A Framework for Efficient and Composable Oblivious Transfer[C]//IACR. The 28th Annual International Cryptology Conference-Crypto 2008, August 17-21, 2008, Santa Barbara, California, USA. Heidelberg: Springer, 2008: 554-571. |
[10] | LI Zengpeng, MA Chunguang, ZHANG Lei,et al.Two Types LWE-based Multi-bit Lattice-based Encryption Schemes[J].Netinfo Security, 2017, 17(10): 1-7. |
李增鹏, 马春光, 张磊, 等. 两类基于容错学习的多比特格公钥加密方案[J]. 信息网络安全, 2017, 17(10): 1-7. | |
[11] | MARTINS P, SOUSA L, MARIANO A. A Survey on Fully Homomorphic Encryption: an Engineering Perspective[EB/OL]. ,2018-7-23. |
[12] | ACAR A, AKSU H, ULUAGAC A S, et al.A Survey on Homomorphic Encryption Schemes: Theory and Implementation[J]. ACM Computing Surveys. 2018, 51(4):1-35. |
[13] | LIU Mingjie, WANG An.Fully Homomorphic Encryption and Its Applications[J]. Journal of Computer Research and Development, 2014, 51(12): 2593-2603. |
刘明洁, 王安. 全同态加密研究动态及其应用概述[J]. 计算机研究与发展. 2014, 51(12): 2593-2603. | |
[14] | LV Haifeng, DING Yong, DAI Hongyan, et al.Survey on LWE-based Fully Homomorphic Encryption Scheme[J]. Netinfo Security, 2015, 15(1): 32-38. |
吕海峰, 丁勇, 代洪艳, 等. LWE上的全同态加密研究[J]. 信息网络安全, 2015, 15(1): 32-38. | |
[15] | BRAKERSKI Z, GENTRY C, HALEVI S.Packed Ciphertexts in LWE-based Homomorphic Encryption[C]//IACR. The 16th International Conference on Practice and Theory in Public-key Cryptography-PKC 2013, February 26-March 1, 2013, Nara, Japan. Heidelberg: Springer, 2013: 1-13. |
[16] | HIROMASA R, ABE M, OKAMOTO T.Packing Messages and Optimizing Bootstrapping in GSW-FHE[C]//IACR. The 18th International Conference on Practice and Theory in Public-key Cryptography-PKC 2015, March 30-April 1, 2015, Maryland, USA. Heidelberg: Springer, 2015: 699-715. |
[17] | WANG Biao, WANG Xueqing, XUE Rui, et al.Matrix FHE and Its Application in Optimizing Bootstrapping[J]. The Computer Journal, 2018, 61(12): 1845-1861. |
[18] | ALWEN J, PEIKERT C.Generating Shorter Bases for Hard Random Lattices[J]. Theory of Computing Systems. 2011, 48(3): 535-553. |
[19] | MICCIANCIO D, REGEV O.Worst-case to Average-case Reductions Based on Gaussian Measures[J]. SIAM Journal on Computing, 2007, 37(1): 267-302. |
[20] | PERIKERT C.Public-key Cryptosystems from the Worst-case Shortest Vector Problem[C]//ACM. The 41st Annual ACM Symposium on Theory of Computing-STOC 2009, May 31-June 2, 2009, Bethesda, Maryland, USA. New York: ACM, 2009: 333-342. |
[21] | MICCIANCIO D, MOL P.Pseudorandom Knapsacks and the Sample Complexity of LWE Search-to-decision Reductions[C]//IACR. The 31st Annual International Cryptology Conference-Crypto 2011, August 14-18, 2011, Santa Barbara, California, USA. Heidelberg: Springer, 2011: 465-484. |
[22] | MICCIANCIO D, PEIKERT C.Trapdoors for Lattices: Simpler, Tighter, Faster, Smaller[C]//IACR. The 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques-Eurocrypt 2012, April 15-19, 2012, Cambridge, UK. Heidelberg: Springer, 2012: 700-718. |
[23] | DODIS Y, REYZIN L, SMITH A.Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data[C]//IACR. The 23rd Annual International Conference on the Theory and Applications of Cryptographic Techniques-Eurocrypt 2004, May 2-6, 2004, Interlaken, Switzerland. Heidelberg: Springer, 2004: 523-540. |
[1] | 郎为民, 张汉, 赵毅丰, 姚晋芳. 一种基于区块链的物联网行为监控和活动管理方案[J]. 信息网络安全, 2020, 20(2): 22-29. |
[2] | 张建航, 曹泽阳, 宋晓峰, 徐庆征. 抗量子本原格上高效的身份基消息恢复签名方案[J]. 信息网络安全, 2020, 20(1): 26-32. |
[3] | 江明明, 赵利军, 王艳, 王保仓. 面向云数据共享的量子安全的无证书双向代理重加密[J]. 信息网络安全, 2018, 18(8): 17-24. |
[4] | 叶青, 周锦, 汤永利, 王峻峰. 格上基于身份的抗量子攻击的部分盲签名方案[J]. 信息网络安全, 2018, 18(3): 46-53. |
[5] | 闫玺玺, 刘媛, 胡明星, 黄勤龙. 云环境下基于LWE的多机构属性基加密方案[J]. 信息网络安全, 2017, 17(9): 128-133. |
[6] | 闫玺玺, 刘媛, 李子臣, 黄勤龙. 云环境下理想格上的多机构属性基加密隐私保护方案[J]. 信息网络安全, 2017, 17(8): 19-25. |
[7] | 李增鹏, 马春光, 张磊, 张雯雯. 两类基于容错学习的多比特格公钥加密方案[J]. 信息网络安全, 2017, 17(10): 1-7. |
[8] | 陈莉, 顾纯祥, 尚明君. 抗量子攻击的高效盲签名方案[J]. 信息网络安全, 2017, 17(10): 36-41. |
[9] | 郎为民, 陈凯. 一种基于映射版本表格的动态多副本可证明数据持有方案研究[J]. 信息网络安全, 2016, 16(1): 18-23. |
[10] | 张付霞, 蒋朝惠. 一种基于网格聚类的查询隐私匿名算法研究[J]. 信息网络安全, 2015, 15(8): 53-58. |
[11] | 成媛媛, 刘晓威, 张金, 高岩. 容错型数字文本水印算法研究[J]. 信息网络安全, 2015, 15(5): 34-40. |
[12] | 张海川, 赵泽茂, 田玉杰, 李学双. 基于个性化空间匿名算法最优化选择研究[J]. 信息网络安全, 2015, 15(3): 23-27. |
[13] | 车浩然, 何永忠, 刘吉强. 基于P2P和网格ID的位置匿名算法研究[J]. 信息网络安全, 2015, 15(3): 28-32. |
[14] | . 典型文档类CVE漏洞检测工具的研究与实现[J]. , 2014, 14(6): 18-. |
[15] | . 基于格的大数据动态存储完整性验证方案[J]. , 2014, 14(4): 46-. |
阅读次数 | ||||||
全文 |
|
|||||
摘要 |
|
|||||