Journal of Software:2018.29(7):1880-1892

(陕西师范大学 计算机科学学院, 陕西 西安 710119;保密通信重点实验室, 四川 成都 610041;综合业务网理论及关键技术国家重点实验室(西安电子科技大学), 陕西 西安 710071)
Novel Construction of Identity-Based Hash Proof System Based on Lattices
(School of Computer Science, Shaanxi Normal University, Xi'an 710119, China;Science and Technology on Communication Security Laboratory, Chengdu 610041, China;State Key Laboratory of Integrated Service Networks(Xidian University), Xi'an 710071, China)
Chart / table
Similar Articles
Article :Browse 2055   Download 1191
Received:May 29, 2017    Revised:July 13, 2017
> 中文摘要: 隐私保护是当前大数据信息时代所亟待解决的重要安全问题之一.而密码学是实现对内容和身份等隐私信息进行有效保护的关键理论和技术基础.基于身份的哈希证明系统(identity-based hash proof system)是一个基本的密码学原型,能够用来构造多种对隐私信息进行保护的密码方案.通过分析得知,已有基于格的基于身份哈希证明系统的密文尺寸较大,会对所构造密码方案的效率产生较大的影响.如何降低格上的基于身份哈希证明系统的密文尺寸,是一个有意义的研究问题.为此,首先基于标准带错误学习(learning with errors,简记为LWE)困难假设,在标准模型下构造了一个新的哈希证明系统,并利用随机格上离散高斯分布与光滑参数的性质,证明其是光滑的(smooth);再在随机谕言机(random oracle)的作用下,利用Gentry等人所提出的原像抽样函数提取身份私钥,从而得到一个光滑并且密文尺寸较小的基于身份的哈希证明系统.作为对所构造的新型哈希证明系统的扩展,在标准模型下提出一个可更新的哈希证明系统.最后,详细分析所提出的新型构造的效率,并与已有相关构造进行对比.
Abstract:Privacy protection is an important security issue in today's big data information era. As one of theoretical and technical bases, cryptography can be utilized to protect several kinds of privacy information, such as content and identity. Identity-Based hash proof system is a basic cryptographic primitive, which can be used to construct lots of schemes for privacy protection. Through analyzing all existing identity-based hash proof systems based on lattices, this work reveals that one of their common deficiencies is the large bit size of ciphertext, which further results in the low efficiency of the related cryptographic schemes. Thus it is of great significance to reduce the size of their cipheretexts. In this paper, a new hash proof system is first presented based on the learning with errors assumption in the standard model, and the smoothness of the system is proved through employing the properties of discrete Gaussian distribution and smooth parameter over lattices. Then, in order to transform this new hash proof system into the identity setting, the preimage sampling function proposed by Gentry, et al. is used to sample the identity secret key for any identity id with the help of random oracle. As an extension for this new hash proof system based on lattices, an updatable hash proof system can also be obtained in the standard model. Finally, the efficiency of these new constructions is analyzed, and a comparison with other existing constructions is performed.
文章编号:     中图分类号:    文献标志码:
基金项目:国家自然科学基金(61402353,61572303,61772326);中央高校基本科研业务费(GK201603084,GK201702004);国家重点研发计划(2017YFB0802003,2017YFB0802004);中国科学院信息工程研究所信息安全国家重点实验室开放课题(2017-MS-03);“十三五”国家密码发展基金(MMJJ20170216) 国家自然科学基金(61402353,61572303,61772326);中央高校基本科研业务费(GK201603084,GK201702004);国家重点研发计划(2017YFB0802003,2017YFB0802004);中国科学院信息工程研究所信息安全国家重点实验室开放课题(2017-MS-03);“十三五”国家密码发展基金(MMJJ20170216)
Foundation items:National Natural Science Foundation of China (61402353, 61572303, 61772326); Fundamental Research Funds for the Central Universities (GK201603084, GK201702004); National Key Research and Development Program of China (2017YFB0802003, 2017YFB0802004); Foundation of State Key Laboratory of Information Security, Institute of Information Engineering, CAS (2017-MS-03); National Cryptography Development Fund During the 13th Five-Year Plan Period (MMJJ20170216)
Reference text:


LAI Qi-Qi,YANG Bo,CHEN Yuan,HAN Lu-Lu,BAI Jian.Novel Construction of Identity-Based Hash Proof System Based on Lattices.Journal of Software,2018,29(7):1880-1892