A Fuzzy Identity-Based Signcryption Scheme from Lattices |
Lu, Xiuhua
(state Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications)
Wen, Qiaoyan (State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications) Li, Wenmin (State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications) Wang, Licheng (Information Security Center, Beijing University of Posts and Telecommunications) Zhang, Hua (State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications) |
1 | P. Yang, Z. Cao, and X. Dong, "Fuzzy identity based signature," IACR Cryptology ePrint Archive, vol. 2008, p. 10, 2008. |
2 | C. Wang, "A provable secure fuzzy identity based signature scheme," Science China Information Sciences, vol. 55, no. 9, pp. 2139-2148, 2012. DOI |
3 | Q. Wu, "Fuzzy biometric identity-based signature in the standard model," Journal of Computational Information Systems, vol. 8, no. 20, pp. 8405-8412, 2012. |
4 | M. Zhang, B. Yang, T. Takagi, Y. Shen, and W. Zhang, "Fuzzy Biometric Signcryption Scheme with Bilinear Pairings in the Standard Model," Lecture Notes in Computer Science, vol. 6122, ch. 10, pp. 77-87, 2010. |
5 | F. Li and M. K. Khan, "A biometric identity-based signcryption scheme," Future Generation Computer Systems, vol. 28, no. 1, pp. 306-310, 2012. DOI ScienceOn |
6 | P. Shor, "Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer," SIAM Journal on Computing, vol. 26, no. 5, pp. 1484-1509, 1997. DOI ScienceOn |
7 | C. Gentry, C. Peikert, and V. Vaikuntanathan, "Trapdoors for hard lattices and new cryptographic constructions," STOC '08, pp. 197-206, 2008. |
8 | S. Agrawal, X. Boyen, V. Vaikuntanathan, P. Voulgaris, and H. Wee, "Functional Encryption for Threshold Functions (or Fuzzy IBE) from Lattices," Lecture Notes in Computer Science, vol. 7293, ch. 17, pp. 280-297, 2012. |
9 | X. Boyen, "Lattice Mixing and Vanishing Trapdoors: A Framework for Fully Secure Short Signatures and More," Lecture Notes in Computer Science, vol. 6056, ch. 29, pp. 499-517, 2010. |
10 | L. Ducas, A. Durmus, T. Lepoint, and V. Lyubashevsky, "Lattice Signatures and Bimodal Gaussians," Lecture Notes in Computer Science, vol. 8042, ch. 3, pp. 40-56, 2013. |
11 | Y. Yao and Z. Li, "A novel fuzzy identity based signature scheme based on the short integer solution problem," Computers and Electrical Engineering, vol. 40, no. 6, pp. 1930-1939, 2014. DOI ScienceOn |
12 | F. Wang, Y. Hu, and C. Wang, "Post-quantum secure hybrid signcryption from lattice assumption," Applied Mathematics & Information Sciences, vol. 6, no. 1, pp. 23-28, 2012. |
13 | C. Gentry, S. Halevi, and V. Vaikuntanathan, "A Simple BGN-Type Cryptosystem from LWE," Lecture Notes in Computer Science, vol. 6110, ch. 26, pp. 506-522, 2010. |
14 | E. Fujisaki and T. Okamoto, "Secure integration of asymmetric and symmetric encryption schemes," Journal of cryptology, vol. 26, no. 1, pp. 80-101, 2013. DOI |
15 | O. Regev, "On lattices, learning with errors, random linear codes, and cryptography," J. ACM, vol. 56, no. 6, pp. 1-40, 2009. |
16 | F. Li, F. Muhaya, M. Khan, and T. Takagi, "Lattice-based signcryption," Concurrency and Computation: Practice and Experience, vol. 25, no. 14, pp. 2112-2122, 2013. DOI ScienceOn |
17 | X. Lu, Q. Wen, Z. Jin, L. Wang, and C. Yang, "A lattice-based signcryption scheme without random oracles," Frontiers of Computer Science, vol. 8, no. 4, pp. 667-675, 2014. DOI ScienceOn |
18 | A. Sahai and B. Waters, "Fuzzy Identity-Based Encryption," Lecture Notes in Computer Science, vol. 3494, ch. 27, pp. 457-473, 2005. |
19 | A. Shamir, "Identity-Based Cryptosystems and Signature Schemes," Lecture Notes in Computer Science, vol. 196, ch. 5, pp. 47-53, 1985. |
20 | B. Waters, "Efficient Identity-Based Encryption Without Random Oracles," Lecture Notes in Computer Science, vol. 3494, ch. 7, pp. 114-127, 2005. |
21 | K. Paterson and J. N. Schuldt, "Efficient Identity-Based Signatures Secure in the Standard Model," Lecture Notes in Computer Science, vol. 4058, ch. 18, pp. 207-222, 2006. |
22 | J. Baek, W. Susilo, and J. Zhou, "New constructions of fuzzy identity-based encryption," ASIACCS '07, pp. 368-370, 2007. |
23 | M. Pirretti, P. Traynor, P. McDaniel, and B. Waters, "Secure attribute-based systems," CCS '06 , pp. 99-112, 2006. |
24 | X. Li, B. Yang, and M. Zhang, "New construction of fuzzy identity-based encryption," Information Engineering, ICIE'09, vol. 1, pp. 647-651, 2009. |
25 | S. Agrawal, D. Boneh, and X. Boyen, "Lattice Basis Delegation in Fixed Dimension and Shorter-Ciphertext Hierarchical IBE," Lecture Notes in Computer Science, vol. 6223, ch. 6, pp. 98-115, 2010. |
26 | Y. Zheng, "Digital signcryption or how to achieve cost(signature + encryption) and cost(signature) + cost(encryption)," Lecture Notes in Computer Science, vol. 1294, ch. 11, pp. 165-179, 1997. |