Browse > Article
http://dx.doi.org/10.3837/tiis.2014.11.031

A Fuzzy Identity-Based Signcryption Scheme from Lattices  

Lu, Xiuhua (state Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications)
Wen, Qiaoyan (State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications)
Li, Wenmin (State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications)
Wang, Licheng (Information Security Center, Beijing University of Posts and Telecommunications)
Zhang, Hua (State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.8, no.11, 2014 , pp. 4203-4225 More about this Journal
Abstract
Fuzzy identity-based cryptography introduces the threshold structure into identity-based cryptography, changes the receiver of a ciphertext from exact one to dynamic many, makes a cryptographic scheme more efficient and flexible. In this paper, we propose the first fuzzy identity-based signcryption scheme in lattice-based cryptography. Firstly, we give a fuzzy identity-based signcryption scheme that is indistinguishable against chosen plaintext attack under selective identity model. Then we apply Fujisaki-Okamoto method to obtain a fuzzy identity-based signcryption scheme that is indistinguishable against adaptive chosen ciphertext attack under selective identity model. Thirdly, we prove our scheme is existentially unforgeable against chosen message attack under selective identity model. As far as we know, our scheme is the first fuzzy identity-based signcryption scheme that is secure even in the quantum environment.
Keywords
Fuzzy identity-based cryptography; signcryption; lattice-based cryptography; LWE problem; SIS problem;
Citations & Related Records
연도 인용수 순위
  • Reference
1 P. Yang, Z. Cao, and X. Dong, "Fuzzy identity based signature," IACR Cryptology ePrint Archive, vol. 2008, p. 10, 2008.
2 C. Wang, "A provable secure fuzzy identity based signature scheme," Science China Information Sciences, vol. 55, no. 9, pp. 2139-2148, 2012.   DOI
3 Q. Wu, "Fuzzy biometric identity-based signature in the standard model," Journal of Computational Information Systems, vol. 8, no. 20, pp. 8405-8412, 2012.
4 M. Zhang, B. Yang, T. Takagi, Y. Shen, and W. Zhang, "Fuzzy Biometric Signcryption Scheme with Bilinear Pairings in the Standard Model," Lecture Notes in Computer Science, vol. 6122, ch. 10, pp. 77-87, 2010.
5 F. Li and M. K. Khan, "A biometric identity-based signcryption scheme," Future Generation Computer Systems, vol. 28, no. 1, pp. 306-310, 2012.   DOI   ScienceOn
6 P. Shor, "Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer," SIAM Journal on Computing, vol. 26, no. 5, pp. 1484-1509, 1997.   DOI   ScienceOn
7 C. Gentry, C. Peikert, and V. Vaikuntanathan, "Trapdoors for hard lattices and new cryptographic constructions," STOC '08, pp. 197-206, 2008.
8 S. Agrawal, X. Boyen, V. Vaikuntanathan, P. Voulgaris, and H. Wee, "Functional Encryption for Threshold Functions (or Fuzzy IBE) from Lattices," Lecture Notes in Computer Science, vol. 7293, ch. 17, pp. 280-297, 2012.
9 X. Boyen, "Lattice Mixing and Vanishing Trapdoors: A Framework for Fully Secure Short Signatures and More," Lecture Notes in Computer Science, vol. 6056, ch. 29, pp. 499-517, 2010.
10 L. Ducas, A. Durmus, T. Lepoint, and V. Lyubashevsky, "Lattice Signatures and Bimodal Gaussians," Lecture Notes in Computer Science, vol. 8042, ch. 3, pp. 40-56, 2013.
11 Y. Yao and Z. Li, "A novel fuzzy identity based signature scheme based on the short integer solution problem," Computers and Electrical Engineering, vol. 40, no. 6, pp. 1930-1939, 2014.   DOI   ScienceOn
12 F. Wang, Y. Hu, and C. Wang, "Post-quantum secure hybrid signcryption from lattice assumption," Applied Mathematics & Information Sciences, vol. 6, no. 1, pp. 23-28, 2012.
13 C. Gentry, S. Halevi, and V. Vaikuntanathan, "A Simple BGN-Type Cryptosystem from LWE," Lecture Notes in Computer Science, vol. 6110, ch. 26, pp. 506-522, 2010.
14 E. Fujisaki and T. Okamoto, "Secure integration of asymmetric and symmetric encryption schemes," Journal of cryptology, vol. 26, no. 1, pp. 80-101, 2013.   DOI
15 O. Regev, "On lattices, learning with errors, random linear codes, and cryptography," J. ACM, vol. 56, no. 6, pp. 1-40, 2009.
16 F. Li, F. Muhaya, M. Khan, and T. Takagi, "Lattice-based signcryption," Concurrency and Computation: Practice and Experience, vol. 25, no. 14, pp. 2112-2122, 2013.   DOI   ScienceOn
17 X. Lu, Q. Wen, Z. Jin, L. Wang, and C. Yang, "A lattice-based signcryption scheme without random oracles," Frontiers of Computer Science, vol. 8, no. 4, pp. 667-675, 2014.   DOI   ScienceOn
18 A. Sahai and B. Waters, "Fuzzy Identity-Based Encryption," Lecture Notes in Computer Science, vol. 3494, ch. 27, pp. 457-473, 2005.
19 A. Shamir, "Identity-Based Cryptosystems and Signature Schemes," Lecture Notes in Computer Science, vol. 196, ch. 5, pp. 47-53, 1985.
20 B. Waters, "Efficient Identity-Based Encryption Without Random Oracles," Lecture Notes in Computer Science, vol. 3494, ch. 7, pp. 114-127, 2005.
21 K. Paterson and J. N. Schuldt, "Efficient Identity-Based Signatures Secure in the Standard Model," Lecture Notes in Computer Science, vol. 4058, ch. 18, pp. 207-222, 2006.
22 J. Baek, W. Susilo, and J. Zhou, "New constructions of fuzzy identity-based encryption," ASIACCS '07, pp. 368-370, 2007.
23 M. Pirretti, P. Traynor, P. McDaniel, and B. Waters, "Secure attribute-based systems," CCS '06 , pp. 99-112, 2006.
24 X. Li, B. Yang, and M. Zhang, "New construction of fuzzy identity-based encryption," Information Engineering, ICIE'09, vol. 1, pp. 647-651, 2009.
25 S. Agrawal, D. Boneh, and X. Boyen, "Lattice Basis Delegation in Fixed Dimension and Shorter-Ciphertext Hierarchical IBE," Lecture Notes in Computer Science, vol. 6223, ch. 6, pp. 98-115, 2010.
26 Y. Zheng, "Digital signcryption or how to achieve cost(signature + encryption) and cost(signature) + cost(encryption)," Lecture Notes in Computer Science, vol. 1294, ch. 11, pp. 165-179, 1997.