Application of NTRU Using Group Rings to Partial Decryption Technique
详细信息    查看全文
  • 关键词:NTRU ; Lattice ; based cryptography ; Group ring ; Partial decryption
  • 刊名:Lecture Notes in Computer Science
  • 出版年:2016
  • 出版时间:2016
  • 年:2016
  • 卷:9565
  • 期:1
  • 页码:203-213
  • 全文大小:294 KB
  • 参考文献:1.Ateniese, G., Chou, D.H., de Medeiros, B., Tsudik, G.: Sanitizable signatures. In: di Vimercati, S.C., Syverson, P.F., Gollmann, D. (eds.) ESORICS 2005. LNCS, vol. 3679, pp. 159–177. Springer, Heidelberg (2005)CrossRef
    2.Bellare, M., Boldyreva, A., Staddon, J.: Randomness re-use in multi-recipient encryption schemeas. In: Desmedt, G. (ed.) PKC 2003. LNCS, vol. 2567, pp. 85–99. Springer, Heidelberg (2003)CrossRef
    3.Berkovits, S.: How to broadcast a secret. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 535–541. Springer, Heidelberg (1991)CrossRef
    4.Boneh, D., Gentry, C., Waters, B.: Collusion resistant broadcast encryption with short ciphertexts and private keys. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 258–275. Springer, Heidelberg (2005)CrossRef
    5.Bovdi, A.A.: Group Algebra. Springer Publishing Company, Incorporated (2001)
    6.Boyle, E., Gilboa, N., Ishai, Y.: Function secret sharing. In: Oswald, E., Fischlin, M. (eds.) EUROCRYPT 2015. LNCS, vol. 9057, pp. 337–367. Springer, Heidelberg (2015)
    7.Brzuska, C., Fischlin, M., Lehmann, A., Schröder, D.: Santizable signatures: how to partially delegate control for authenticated data. In: Proceedings of the Special Interest Group on Biometrics and Electronic Signatures BIOSIG 2009, 17-18 September 2009 in Darmstadt, Germany, pp. 117–128 (2009)
    8.Hoffstein, J., Howgrave-Graham, N., Pipher, J., Silverman, J., Whyte, W.: Hybrid lattice reduction and meet in the middle resistant parameter selection for ntruencrypt
    9.Hoffstein, J., Pipher, J., Silverman, J.H.: NTRU: a ring-based public key cryptosystem. In: Buhler, J.P. (ed.) ANTS 1998. LNCS, vol. 1423, pp. 267–288. Springer, Heidelberg (1998)CrossRef
    10.Izu, T., Ito, K., Tsuda, H., Abiru, K., Ogura, T.: Privacy-protection technologies for secure utilization of sensor data. Fujitsu Sci. Tech. J. 50(1), 30–33 (2014)
    11.Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457–473. Springer, Heidelberg (2005)CrossRef
    12.Santis, A.D., Desmedt, Y., Frankel, Y., Yung, M.: How to share a function securely. In: Proceedings of the Twenty-Sixth Annual ACM Symposium on Theory of Computing, 23–25 May 1994, Montréal, Québec, Canada, pp. 522–533 (1994)
    13.Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)MathSciNet CrossRef MATH
    14.Yamada, S., Attrapadung, N., Santoso, B., Schuldt, J.C.N., Hanaoka, G., Kunihiro, N.: Verifiable predicate encryption and applications to CCA security and anonymous predicate authentication. In: Proceedings 15th International Conference on Practice and Theory in Public Key Cryptography PKC–2012, Darmstadt, Germany, May 21–23 2012, pp. 243–261 (2012)
    15.Yasuda, T., Dahan, X., Sakurai, K.: Characterizing NTRU-variants using group ring and evaluating their lattice security. To be appear as an IACR e-print paper
  • 作者单位:Takanori Yasuda (16)
    Hiroaki Anada (16)
    Kouichi Sakurai (16) (17)

    16. Institute of Systems, Information Technologies and Nanotechnologies, Fukuoka, Japan
    17. Department of Informatics, Kyushu University, Fukuoka, Japan
  • 丛书名:Trusted Systems
  • ISBN:978-3-319-31550-8
  • 刊物类别:Computer Science
  • 刊物主题:Artificial Intelligence and Robotics
    Computer Communication Networks
    Software Engineering
    Data Encryption
    Database Management
    Computation by Abstract Devices
    Algorithm Analysis and Problem Complexity
  • 出版者:Springer Berlin / Heidelberg
  • ISSN:1611-3349
文摘
Partial decryption enables a ciphertext to be decrypted partially according to provided secret keys. In this paper, we propose a public key encryption scheme with the functionality of partial decryption. Our strategy is to use the NTRU cryptosystem. Under a design principle of the mathematical structure “group ring”, we extend the original NTRU into group ring NTRU (GR-NTRU). First, we propose a generic framework of our GR-NTRU. Our GR-NTRU allows partial decryption with a single encryption process using a single public key. Besides, when we execute partial decryption under a secret key of GR-NTRU, we need no information to identify each part in a whole ciphertext. Consequently, management of a public key and a corresponding set of secret keys is rather easier than the naive method. Next, we propose a concrete instantiation of our generic GR-NTRU. A multivariate polynomial ring NTRU scheme is obtained by employing a product of different cyclic groups as the basis of the group ring structure. We will show examples of those new variants of NTRU schemes with concrete parameter values, and explain how we can employ them to use the functionality of partial decryption.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700