Abstract

In an identity-based broadcast encryption (IBBE) scheme, the ciphertext is usually appended with a set of user identities to specify intended recipients. However, as IBBE is adopted in extensive industries, the demand of anonymity for specific scenarios such as military applications is urgent and ought no more to be ignored. On the contrary, how to optimize computation and communication is an unavoidable challenge in the IBBE scheme construction, especially in the large-scaled resource-limited wireless networks such as the Internet of Things (IoT), where the cost of computation and communication should be mitigated as much as possible since other functions including connectivity and privacy should be given the top priority. Thus, we present an IBBE scheme from the lattice, in which we employ the Chinese remainder theorem and lattice basis delegation in fixed dimensions to obtain several desirable characteristics, such as constant-size public parameter, private key, and ciphertext. In addition, our encryption and decryption algorithms are more efficient than broadcast encryption (BE) schemes based on number-theoretic problems. To be noticed, our scheme can simultaneously achieve confidentiality and outsider anonymity against the chosen-plaintext attack under the hardness of the learning with error (LWE) problem.

Highlights

  • IoT is a network of interconnected things/devices, in which sensors, software, network connections, and necessary electronic devices are integrated to collect and exchange information and respond to real-time data requests

  • Our main contributions include the construction of an anonymous identity-based broadcast encryption (IBBE) from the lattice and the security reduction to the learning with error (LWE) problem

  • Our design is inspired by the lattice-based broadcast encryption (BE) scheme of Wang et al [20], which depends on the Chinese remainder theorem to achieve the dynamic anonymity

Read more

Summary

Introduction

IoT is a network of interconnected things/devices, in which sensors, software, network connections, and necessary electronic devices are integrated to collect and exchange information and respond to real-time data requests. In 2010, Cash et al [23, 30] proposed a new concept of cryptography, called bonsai tree, and constructed an HIBE scheme based on the LWE problem by utilizing the lattice basis delegation technique, which allows one to use a short basis of a certain integer lattice L to generate a short random basis for a new lattice L0 derived from L In their HIBE scheme, the dimension of the child lattice L0 is greater than that of the parent lattice L for the reason that, as the hierarchical structure increases, the private key and ciphertext become longer.

Preliminaries
Lattice and Lattice Problems
Construction
Analysis of the Proposed Anonymous IBBE Construction
Security
Conclusions
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call