Back to Search
Start Over
Quantum‐resistant anonymous identity‐based encryption with trable identities
- Source :
- IET Information Security, Vol 16, Iss 2, Pp 111-126 (2022)
- Publication Year :
- 2022
- Publisher :
- Wiley, 2022.
-
Abstract
- Identity‐based encryption (IBE), introduced by Shamir, eliminates the need for public‐key infrastructure. The sender can simply encrypt a message by using the recipient's identity (such as email or IP address) without needing to look up the public key. In particular, when ciphertexts of an IBE do not reveal recipient's identity, this scheme is known as an anonymous IBE scheme. Recently, Blazy et al. (ARES '19) analysed the trade‐off between public safety and unconditional privacy in anonymous IBE and introduced a new notion that incorporates traceability into anonymous IBE, called anonymous IBE with traceable identities (AIBET). However, their construction is based on the discrete logarithm assumption, which is insecure in the quantum era. In this paper, we first formalize the consistency of tracing key of the AIBET scheme to ensure that a ciphertext cannot be traced with the use of wrong tracing keys. Subsequently, we present a generic formulation concept that can be used to transform structure‐specific lattice‐based anonymous IBE schemes into an AIBET. Finally, we apply this concept to Katsumata and Yamada's compact anonymous IBE scheme (Asiacrypt '16) to obtain the first quantum‐resistant AIBET scheme that is adaptively secure under the ring learning with errors assumption without random oracle.
- Subjects :
- lattice theory
Communication
Computer engineering. Computer hardware
cryptography
Computer Networks and Communications
business.industry
media_common.quotation_subject
QA75.5-76.95
Encryption
public key cryptography
TK7885-7895
Identity (philosophy)
Electronic computers. Computer science
Sociology
business
Quantum
Software
Information Systems
media_common
cryptographic protocols
Subjects
Details
- Language :
- English
- ISSN :
- 17518709 and 17518717
- Volume :
- 16
- Issue :
- 2
- Database :
- OpenAIRE
- Journal :
- IET Information Security
- Accession number :
- edsair.doi.dedup.....6bbe33997744cb6bee2ae0cc8935eff8