| 注册
首页|期刊导航|工程科学学报|基于格的可证明安全无用户私钥加密方案

基于格的可证明安全无用户私钥加密方案

陆海 孟疏桐 朱岩 李勇

工程科学学报2026,Vol.48Issue(4):791-804,14.
工程科学学报2026,Vol.48Issue(4):791-804,14.DOI:10.13374/j.issn2095-9389.2025.08.03.001

基于格的可证明安全无用户私钥加密方案

Provably secure private-keyless encryption on ideal lattices

陆海 1孟疏桐 2朱岩 3李勇4

作者信息

  • 1. 中国人民公安大学信息网络安全学院,北京 100038
  • 2. 北京中建建筑科学研究院有限公司,北京 100076
  • 3. 北京科技大学国家材料服役安全科学中心,北京 100083
  • 4. 北京交通大学电子信息工程学院,北京 100044
  • 折叠

摘要

Abstract

Private-keyless encryption(PKLE)addresses the cumbersome challenge of private key management by replacing traditional user private keys with one-time decryption credentials.This approach streamlines complex management processes,such as private key updates and revocations while eliminating the cost and burden of secure key storage for users.Building on this paradigm,this paper introduces the concept,scheme,and security requirements for a PKLE system constructed over ideal lattice.First,we define PKLE and propose a construction method for verifiable credentials.These credentials function as"one-time decryption keys"issued by a trusted third party(the"credential issuance center")only after the user's identity is verified.This model simplifies private key m anagement,reduces storage costs,and enables real-time,dynamic decisions on user data access requirements.Second,we introduce a ciphertext-refreshing mechanism that establishes a temporal correspondence between a credential and ciphertext.This mechanism can generate a refreshed ciphertext for any arbitrary time point directly from the initial ciphertext parameters,requiring only partial refreshment of the ciphertext data.This partial-refresh approach significantly reduces the computational overhead of ciphertext refreshing.We also formulate the necessary security requirements for this PKLE scheme—including unforgeability of credentials and refreshed ciphertexts under chosen-time attacks,timeliness security,and semantic security—and elaborate on their interrelationships.A concrete instantiation of this scheme is then constructed over ideal lattices,leveraging the hardness of the ring-small integer solution(R-SIS)and ring-learning with errors(R-LWE)problems.In this construction,the credential is a short preimage vector sampled from a specified dual lattice using the center's private key and a time-varying parameter.By embedding this parameter into the sampling coset,the credential's validity is strictly confined to its designated time slot.Concurrently,the ciphertext-refreshing mechanism re-encapsulates the initial ciphertext based on the R-LWE problem.This binds the refreshed ciphertext to the same time-varying parameter,ensuring it can only be decrypted by the corresponding time-bound credential.Finally,we provide security proofs in the standard model,using an R-SIS oracle,demonstrating that our instantiation satisfies all required security properties:unforgeability of credentials and refreshed ciphertexts,timeliness,and semantic security.A complexity and performance analysis confirms that the proposed PKLE scheme eliminates user-side key-storage overhead and simplifies key management by eliminating the need for periodic updates or revocations.Therefore,the proposed scheme is highly suitable for scenarios requiring dynamic access control for sensitive data.Moreover,its support for a partial ciphertext refresh,requiring only a single ring multiplication,significantly reduces the computational cost of ciphertext updates.

关键词

公钥密码体制/无用户私钥加密/一次性凭证/密文刷新机制/理想格

Key words

public key cryptosystem/private-keyless encryption/one-time credential/ciphertext refreshing mechanism/ideal lattice

分类

信息技术与安全科学

引用本文复制引用

陆海,孟疏桐,朱岩,李勇..基于格的可证明安全无用户私钥加密方案[J].工程科学学报,2026,48(4):791-804,14.

基金项目

省部级研究计划资助项目(2025JSZ14) (2025JSZ14)

北京市双一流——网络空间安全执法技术双一流专项资助项目(2023SYL07) (2023SYL07)

北京市自然科学基金资助项目(M23017) (M23017)

工程科学学报

2095-9389

访问量0
|
下载量0
段落导航相关论文