Unlock instant, AI-driven research and patent intelligence for your innovation.

An Identity-Based Hierarchical Encryption Method on Lattice

An encryption method and identity technology, which is applied in the field of information security, can solve problems such as excessive trapdoor size, Gaussian parameter growth, and poor quality of trapdoors, and solve problems such as excessive trapdoor size, low extraction complexity, and computational cost. saving effect

Active Publication Date: 2020-08-07
HENAN POLYTECHNIC UNIV
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In 2010, Cash et al. proposed a trapdoor derivation algorithm on Eurocrypt'10, and constructed the first HIBE scheme on the grid based on this algorithm. This scheme regards the user identity as a series of bits and assigns A uniform random matrix, which will cause the dimension of the lattice to increase significantly with the increase of the depth of the system classification, and the derived trapdoor size of the proposed trapdoor derivation algorithm has a quadratic growth relationship with the depth of the system classification. In the HIBE system with high hierarchical depth, there will be a problem that the size of the trapdoor is too large and the system cannot be used normally
But at the same time, we noticed that the derived algorithm of MP12 also has shortcomings. Compared with the derived trapdoor of the trapdoor derived algorithm, the quality of the trapdoor, that is, the maximum singular value of the trapdoor matrix, will increase, resulting in the deterioration of the quality of the trapdoor, which in turn leads to A series of problems such as Gaussian parameter growth

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An Identity-Based Hierarchical Encryption Method on Lattice
  • An Identity-Based Hierarchical Encryption Method on Lattice

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] The present invention will be further described below in conjunction with embodiment and accompanying drawing.

[0032] The basic parameters of the present invention include: uniform random matrix and its trapdoor Among them, n is a security parameter, d is the maximum classification depth supported by the system, user identity id=(id 1 ||...||id l ), 1≤l≤d, where a constructed public matrix where I n is the n×n identity matrix, FRD function H:

[0033] The algorithm flow designed by the present invention is specifically as follows:

[0034] System establishment algorithm HIBE-Setup (1 n ,d): Input the security parameter 1n and the maximum classification depth d of the system, and run the trapdoor generation algorithm TrapGen(1 n ,q), the output uniform random matrix and A 0 trapdoor matrix and Choose d uniform random matrices Pick an n-dimensional uniform random vector Output master public key MPK=(A 0 ,A 1 ,...,A d ,G,u) and master privat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention discloses a new grid-based hierarchical identity-based encryption (HIBE) method. The method is implemented according to the following steps: first, using an implicit extension method to optimize the original image sampling algorithm in HIBE; then in combination with the MP12 trapdoor deviation algorithm, proposing an efficient HIBE user key extraction algorithm; and based on this algorithm and in combination with the LWE algorithm, completing the HIBE method construction. The efficiency of the method disclosed by the invention increases both in the system establishment and the user key extraction stage, and the trapdoor size and the system hierarchy depth increase only linearly, and the optimized original image sampling algorithm can solve the problem of Gauss Parameters growth after the trapdoor derivation of the MP12 trapdoor derivation algorithm to some extent. In summary, the present invention has a higher practical feasibility.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a hierarchical identity-based encryption method on a grid. The method has the characteristics of anti-quantum computing analysis and can be used to reduce the burden of a key generation center in a large-scale network. Background technique [0002] Identity-based encryption (IBE, identity-based encryption) is a kind of public key encryption system, which uses the user's unique identity (such as mobile phone number, email address, etc.) The private key generation center (KGC, key generation center) uses the system master private key to generate. The identity-based encryption system was first proposed by Shamir in 1984. Until 2001, Boneh et al. defined the security model of IBE and gave a specific scheme construction based on the BDH (Bilinear Diffie-Hellman) problem. Since then, the research of IBE has quickly become a hot spot in the field of cryptography, and many ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/30H04L9/08H04L9/00
CPCH04L9/002H04L9/0816H04L9/0861H04L9/3073
Inventor 叶青胡明星汤永利秦攀科刘琨闫玺玺李莹莹
Owner HENAN POLYTECHNIC UNIV