Header menu link for other important links
X
Lattice based mix network for location privacy in mobile system
Chandrasekharan Pandu Rangan
Published in IOS Press
2015
Volume: 2015
   
Abstract
In 1981, David Chaum proposed a cryptographic primitive for privacy called mix network (Mixnet). A mixnet is cryptographic construction that establishes anonymous communication channel through a set of servers. In 2004, Golle et al. proposed a new cryptographic primitive called universal reencryption which takes the input as encrypted messages under the public key of the recipients not the public key of the universal mixnet. In Eurocrypt 2010, Gentry, Halevi, and Vaikunthanathan presented a cryptosystem which is an additive homomorphic and a multiplicative homomorphic for only one multiplication. In MIST 2013, Singh et al. presented a lattice based universal reencryption scheme under learning with error (LWE) assumption. In this paper, we have improved Singh et al.'s scheme using Fairbrother's idea. LWE is a lattice hard problem for which till now there is no polynomial time quantum algorithm. Wiangsripanawan et al. proposed a protocol for location privacy in mobile system using universal reencryption whose security is reducible to Decision Diffie-Hellman assumption. Once quantum computer becomes a reality, universal reencryption can be broken in polynomial time by Shor's algorithm. In postquantum cryptography, our scheme can replace universal reencryption scheme used inWiangsripanawan et al. scheme for location privacy in mobile system. Copyright © 2015 Kunwar Singh et al.
About the journal
JournalMobile Information Systems
PublisherIOS Press
ISSN1574017X
Open AccessYes
Concepts (13)
  •  related image
    Aluminum
  •  related image
    Polynomial approximation
  •  related image
    Quantum computers
  •  related image
    Quantum theory
  •  related image
    ANONYMOUS COMMUNICATION
  •  related image
    CRYPTOGRAPHIC PRIMITIVES
  •  related image
    DECISION DIFFIE-HELLMAN
  •  related image
    ENCRYPTED MESSAGES
  •  related image
    Learning with errors
  •  related image
    LOCATION PRIVACY
  •  related image
    POST QUANTUM CRYPTOGRAPHY
  •  related image
    SHOR'S ALGORITHMS
  •  related image
    Cryptography