Abstract
Lattice-based cryptography is one of the most important topics in the area of cryptography, because of its (asymptotic) efficiency, post-quantum security, and expressiveness. In this survey, we provide an overview of lattice-based identity-based encryption (IBE), which is also an important topic in the area. In more details, we first introduce dual Regev public key encryption. Then, we change it to obtain Gentry–Peikert–Vaikuntanathan IBE, which is secure in the random oracle model. We then provide a framework for capturing constructions in the standard model. Then, by instantiating the framework, we show that we can capture the Cash–Hofheinz–Kiltz–Peikert and Agrawal–Boneh–Boyen scheme. Finally, we mention several recent works aiming at reducing parameters or tight security reductions.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
S. Agrawal, D. Boneh, X. Boyen, Efficient lattice (H)IBE in the standard model, in EUROCRYPT (2010), pp. 553–572
S. Agrawal, D. Boneh, X. Boyen, Lattice basis delegation in fixed dimension and shorter-ciphertext hierarchical IBE, in CRYPTO (2010), pp. 98–115
M. Ajtai, Generating hard instances of the short basis problem, in ICALP (1999), pp. 1–9
J. Alwen, C. Peikert, Generating shorter bases for hard random lattices, in STACS (2009), pp. 75–86
D. Apon, X. Fan, F. Liu, Fully-secure lattice-based IBE as compact as PKE, in IACR Cryptology ePrint Archive 2016:125 (2016)
N. Attrapadung, G. Hanaoka, S. Yamada, A framework for identity-based encryption with almost tight security, in ASIACRYPT (1) (2015), pp. 521–549
M. Bellare, T. Ristenpart, Simulation without the artificial abort: simplified proof and improved concrete security for waters’ IBE scheme, in EUROCRYPT (2009), pp. 407–424
O. Blazy, E. Kiltz, J. Pan, (hierarchical) identity-based encryption from affine message authentication, in CRYPTO (2014), pp. 408–425
D. Boneh, M. Franklin, Identity-based encryption from the weil pairing, in CRYPTO (2001), pp. 213–229
D. Boneh, X. Boyen, Efficient selective-id secure identity-based encryption without random oracles, in EUROCRYPT (2004), pp. 223–238
D. Boneh, X. Boyen, Secure identity based encryption without random oracles, in CRYPTO (2004), pp. 443–459
D. Boneh, X. Boyen, E.J. Goh, Hierarchical identity based encryption with constant size ciphertext, in EUROCRYPT (2005), pp. 440–456
D. Boneh, C. Gentry, S. Gorbunov, S. Halevi, V. Nikolaenko, G. Segev, V. Vaikuntanathan, D. Vinayagamurthy, Fully key-homomorphic encryption, arithmetic circuit ABE and compact garbled circuits, in EUROCRYPT (2014), pp. 533–556
X. Boyen, Lattice mixing and vanishing trapdoors: a framework for fully secure short signatures and more, in PKC (2010), pp. 499–517
X. Boyen, B. Waters, Anonymous hierarchical identity-based encryption (Without Random Oracles), in CRYPTO (2006), pp. 290–307
X. Boyen, Q. Li, Towards tightly secure lattice short signature and ID-based encryption, in ASIACRYPT (to appear) (2016)
Z. Brakerski, V. Vaikuntanathan, Lattice-based FHE as secure as PKE, in ITCS (2014), pp. 1–12
Z. Brakerski, A. Langlois, C. Peikert, O. Regev, D. Stehlé, Classical hardness of learning with errors, in STOC (2013), pp. 575–584
R. Canetti, S. Halevi, J. Katz, A forward-secure public-key encryption scheme, in EUROCRYPT (2003), pp. 255–271
D. Cash, D. Hofheinz, E. Kiltz, C. Peikert, Bonsai trees, or how to delegate a lattice basis, in EUROCRYPT (2010), pp. 523–552
J. Chen, H. Wee, Fully, (almost) tightly secure IBE and dual system groups, in CRYPTO (2013), pp. 435–460
C. Cocks, An identity based encryption scheme based on quadratic residues, in IMA International Conference (2001), pp. 360–363
C. Gentry, Practical identity-based encryption without random oracles, in EUROCRYPT (2006), pp. 445–464
C. Gentry, A. Silverberg, Hierarchical ID-based cryptography, in ASIACRYPT (2002), pp. 548–566
C. Gentry, C. Peikert, V. Vaikuntanathan, Trapdoors for hard lattices and new cryptographic constructions, in STOC (2008), pp. 197–206
S. Gorbunov, V. Vaikuntanathan, H. Wee, Attribute-based encryption for circuits, in STOC (2013), pp. 545–554
J. Gong, J. Chen, X. Dong, Z. Cao, S. Tang, Extended nested dual system groups, revisited, in PKC(1) (2016), pp. 133–163
K. Haralambiev, T. Jager, E. Kiltz, V. Shoup, Simple and efficient public-key encryption from computational Diffie-Hellman in the standard model, in PKC (2010), pp. 1–18
S. Heng, K. Kurosawa, \(k\)-Resilient identity-based encryption in the standard model, in CT-RSA (2004), pp. 67–80
D. Hofheinz, E. Kiltz, Programmable hash functions and their applications, in CRYPTO (2008), pp. 21–38
D. Hofheinz, J. Koch, C. Striecks, Identity-based encryption with (almost) tight security in the multi-instance, multi-ciphertext setting, in PKC (2015), pp. 799–822
C. Jutla, A. Roy, Shorter quasi-adaptive NIZK proofs for linear subspaces, in ASIACRYPT (2013), pp. 1–20
S. Katsumata, S. Yamada, Partitioning via non-linear polynomial functions: more compact IBEs from ideal lattices and bilinear maps, in ASIACRYPT (to appear) (2016)
V. Lyubashevsky, C. Peikert, O. Regev, On ideal lattices and learning with errors over rings, in EUROCRYPT (2010), pp. 1–23
V. Lyubashevsky, C. Peikert, O. Regev, A toolkit for ring-LWE cryptography, in EUROCRYPT (2013), pp. 35–54
D. Micciancio, C. Peikert, Trapdoors for lattices: simpler, tighter, faster, smaller, in EUROCRYPT (2012), pp. 700–718
D. Naccache, Secure and practical identity-based encryption. IET Inf. Secur. 1(2), 59–64 (2007)
C. Peikert, Public-key cryptosystems from the worst-case shortest vector problem: extended abstract, In STOC (2009), pp. 333–342
C. Peikert, A decade of lattice cryptography, IACR Cryptology ePrint Archive, Report 2015/939
O. Regev, On lattices, learning with errors, random linear codes, and cryptography, in STOC (2005), pp. 843–873
R. Sakai, K. Ohgishi, M. Kasahara, Cryptosystems based on pairing over elliptic curve, in The 2000 Symposium on Cryptography and Information Security (in Japanese) (2000)
A. Shamir, Identity-based cryptosystems and signature schemes, in CRYPTO (1984), pp. 47–53
K. Singh, C. Pandu Rangan, A.K. Banerjee, Adaptively secure efficient lattice (H)IBE in standard model with short public parameters, in SPACE (2012), pp. 153–172
B. Waters, Efficient identity-based encryption without random oracles, in UROCRYPT (2005), pp. 114–127
B. Waters, Dual system encryption: realizing fully secure IBE and HIBE under simple assumptions, in CRYPTO (2009), pp. 619–636
S. Yamada, Adaptively secure identity-based encryption from lattices with asymptotically shorter public parameters, in EUROCRYPT (2) (2016), pp. 32–62
S. Yamada, Y. Kawai, G. Hanaoka, N. Kunihiro, Public key encryption schemes from the (B)CDH assumption with better efficiency. IEICE Trans. 93–A(11), 1984–1993 (2010)
S. Yamada, G. Hanaoka, N. Kunihiro, Two-dimensional representation of cover free families and its applications: short signatures and more, in CT-RSA (2012), pp. 260–277
T. Yamakawa, S. Yamada, K. Nuida, G. Hanaoka, N. Kunihiro, Reducing public key sizes in bounded CCA-secure KEMs with optimal ciphertext length, ISC 2013 (2015), pp. 100–109 (Short Paper)
J. Zhang, Y. Chen, Z. Zhang, Programmable hash functions from lattices: short signatures and IBEs with small key sizes, in CRYPTO(1), pp. 214–243
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte Ltd.
About this chapter
Cite this chapter
Hanaoka, G., Yamada, S. (2018). A Survey on Identity-Based Encryption from Lattices. In: Takagi, T., Wakayama, M., Tanaka, K., Kunihiro, N., Kimoto, K., Duong, D. (eds) Mathematical Modelling for Next-Generation Cryptography. Mathematics for Industry, vol 29. Springer, Singapore. https://doi.org/10.1007/978-981-10-5065-7_19
Download citation
DOI: https://doi.org/10.1007/978-981-10-5065-7_19
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-5064-0
Online ISBN: 978-981-10-5065-7
eBook Packages: EngineeringEngineering (R0)