{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T17:12:21Z","timestamp":1774631541422,"version":"3.50.1"},"reference-count":20,"publisher":"MDPI AG","issue":"9","license":[{"start":{"date-parts":[[2024,8,27]],"date-time":"2024-08-27T00:00:00Z","timestamp":1724716800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Heilongjiang Provincial Natural Science Foundation of China","award":["LH2020F050"],"award-info":[{"award-number":["LH2020F050"]}]},{"name":"Heilongjiang Provincial Natural Science Foundation of China","award":["145309213"],"award-info":[{"award-number":["145309213"]}]},{"name":"Heilongjiang Provincial Natural Science Foundation of China","award":["SJGY20220395"],"award-info":[{"award-number":["SJGY20220395"]}]},{"name":"Fundamental Research Funds Heilongjiang Provincial Universities","award":["LH2020F050"],"award-info":[{"award-number":["LH2020F050"]}]},{"name":"Fundamental Research Funds Heilongjiang Provincial Universities","award":["145309213"],"award-info":[{"award-number":["145309213"]}]},{"name":"Fundamental Research Funds Heilongjiang Provincial Universities","award":["SJGY20220395"],"award-info":[{"award-number":["SJGY20220395"]}]},{"name":"Heilongjiang Province Higher Education Teaching Reform Research Project","award":["LH2020F050"],"award-info":[{"award-number":["LH2020F050"]}]},{"name":"Heilongjiang Province Higher Education Teaching Reform Research Project","award":["145309213"],"award-info":[{"award-number":["145309213"]}]},{"name":"Heilongjiang Province Higher Education Teaching Reform Research Project","award":["SJGY20220395"],"award-info":[{"award-number":["SJGY20220395"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Entropy"],"abstract":"<jats:p>In recent years, research on attribute-based encryption (ABE) has expanded into the quantum domain. Because a traditional single authority can cause the potential single point of failure, an improved lattice-based quantum-resistant identity authentication and policy attribute encryption scheme is proposed, in which the generation of random values is optimized by adjusting parameters in the Gaussian sampling algorithm to improve overall performance. Additionally, in the key generation phase, attributes are processed according to their shared nature, which reduces the computational overhead of the authorization authority. In the decryption phase, the basis transformation of the Lenstra\u2013Lenstra\u2013Lov\u00e1sz (LLL) lattice reduction algorithm is utilized to rapidly convert shared matrices into the shortest vector form, which can reduce the computational cost of linear space checks. The experimental results demonstrate that the proposed method not only improves efficiency but also enhances security compared with related schemes.<\/jats:p>","DOI":"10.3390\/e26090729","type":"journal-article","created":{"date-parts":[[2024,8,27]],"date-time":"2024-08-27T11:58:46Z","timestamp":1724759926000},"page":"729","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Distributed Identity Authentication with Lenstra\u2013Lenstra\u2013Lov\u00e1sz Algorithm\u2013Ciphertext Policy Attribute-Based Encryption from Lattices: An Efficient Approach Based on Ring Learning with Errors Problem"],"prefix":"10.3390","volume":"26","author":[{"given":"Qi","family":"Yuan","sequence":"first","affiliation":[{"name":"Faculty of Communication and Electronic Engineering, Qiqihar University, Qiqihar 161000, China"}]},{"given":"Hao","family":"Yuan","sequence":"additional","affiliation":[{"name":"Faculty of Communication and Electronic Engineering, Qiqihar University, Qiqihar 161000, China"}]},{"given":"Jing","family":"Zhao","sequence":"additional","affiliation":[{"name":"Faculty of Communication and Electronic Engineering, Qiqihar University, Qiqihar 161000, China"}]},{"given":"Meitong","family":"Zhou","sequence":"additional","affiliation":[{"name":"Faculty of Communication and Electronic Engineering, Qiqihar University, Qiqihar 161000, China"}]},{"given":"Yue","family":"Shao","sequence":"additional","affiliation":[{"name":"State Grid Information Communication Branch, Beijing 100032, China"}]},{"given":"Yanchun","family":"Wang","sequence":"additional","affiliation":[{"name":"Faculty of Communication and Electronic Engineering, Qiqihar University, Qiqihar 161000, China"}]},{"given":"Shuo","family":"Zhao","sequence":"additional","affiliation":[{"name":"Network Information Center, Qiqihar University, Qiqihar 161006, China"}]}],"member":"1968","published-online":{"date-parts":[[2024,8,27]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Ajtai, M. (1996, January 22\u201324). Generating hard instances of lattice problems. Proceedings of the Twenty-Eighth Annual ACM Symposium on Theory of Computing, Philadelphia, PA, USA.","DOI":"10.1145\/237814.237838"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"2680","DOI":"10.1109\/JIOT.2022.3213990","article-title":"Post-Quantum Lattice-Based Secure Reconciliation Enabled Key Agreement Protocol for IoT","volume":"10","author":"Dharminder","year":"2023","journal-title":"IEEE Internet Things J."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"050310","DOI":"10.1088\/1674-1056\/ac9b31","article-title":"Improved quantum key agreement protocol with authentication","volume":"32","author":"Guo","year":"2023","journal-title":"Chin. Phys. B"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"570","DOI":"10.1109\/TC.2018.2874479","article-title":"Practical applications of improved gaussian sampling for trapdoor lattices","volume":"68","author":"Polyakov","year":"2019","journal-title":"IEEE Trans. Comput."},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Bagchi, P., Bera, B., Maheshwari, R., Das, A.K., Yau, D.K.Y., and Sikdar, B. (2023, January 20\u201320). An Efficient and Secure Post-Quantum Multi-Authority Ciphertext-Policy Attribute-Based Encryption Method Using Lattice. Proceedings of the IEEE INFOCOM 2023-IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Hoboken, NJ, USA.","DOI":"10.1109\/INFOCOMWKSHPS57453.2023.10225757"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"94033","DOI":"10.1109\/ACCESS.2020.2995480","article-title":"Improving the Leakage Rate of Ciphertext-Policy Attribute-Based Encryption for Cloud Computing","volume":"8","author":"Zhang","year":"2020","journal-title":"IEEE Access"},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Huang, J.J., Tseng, Y.F., Yang, Q.L., and Fan, C.I. (2018). A Lattice-Based Group Authentication Scheme. Appl. Sci., 8.","DOI":"10.3390\/app8060987"},{"key":"ref_8","first-page":"103053","article-title":"A new lattice-based authentication scheme for IoT","volume":"64","author":"Akleylek","year":"2022","journal-title":"J. Inf. Secur. Appl."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"102684","DOI":"10.1016\/j.sysarc.2022.102684","article-title":"Offline\/Online lattice-based ciphertext policy attribute-based encryption","volume":"130","author":"Fu","year":"2022","journal-title":"J. Syst. Archit."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"1026","DOI":"10.1109\/TSC.2020.2973256","article-title":"RL-ABE: A Revocable Lattice Attribute Based Encryption Scheme Based on R-LWE Problem in Cloud Storage","volume":"15","author":"Zhao","year":"2022","journal-title":"IEEE Trans. Serv. Comput."},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Bert, P., Eberhart, G., Prabel, L., Roux-Langlois, A., and Sabt, M. (2021). Implementation of Lattice Trapdoors on Modules and Applications. Post-Quantum Cryptography: 12th International Workshop, PQCrypto 2021, Daejeon, South Korea, 20\u201322 July 2021, Springer International Publishing.","DOI":"10.1007\/978-3-030-81293-5_11"},{"key":"ref_12","unstructured":"El Bansarkhani, R., and Buchmann, J. (2014). Improvement and Efficient Implementation of a Lattice-Based Signature Scheme. Selected Areas in Cryptography\u2014SAC 2013: 20th International Conference, Burnaby, BC, Canada, 14\u201316 August 2013, Springer."},{"key":"ref_13","first-page":"103","article-title":"Practical revocable and multi-authority CP-ABE scheme from RLWE for Cloud Computing","volume":"65","author":"Yang","year":"2022","journal-title":"J. Inf. Secur. Appl."},{"key":"ref_14","first-page":"6623","article-title":"Decentralized Lattice-Based Device-to-Device Authentication for the Edge-Enabled IoT","volume":"17","author":"Shahidinejad","year":"2023","journal-title":"IEEE Syst. J."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"4269","DOI":"10.1109\/JSEN.2017.2705045","article-title":"Improving Smart Home Security: Integrating Logical Sensing Into Smart Home","volume":"17","author":"Jose","year":"2017","journal-title":"IEEE Sensors J."},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Patil, K.A., and Kale, N.R. (2016, January 22\u201324). A model for smart agriculture using IoT. Proceedings of the International Conference on Global Trends in Signal Processing, Information Computing and Communication (ICGTSPICC), Jalgaon, India.","DOI":"10.1109\/ICGTSPICC.2016.7955360"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1109\/MCOM.2018.1700787","article-title":"LSCSH: Lattice-Based Secure Cryptosystem for Smart Healthcare in Smart Cities Environment","volume":"56","author":"Chaudhary","year":"2018","journal-title":"IEEE Commun. Mag."},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Rosca, M., Stehle, D., and Wallet, A. (2018). On the Ring-LWE and Polynomial-LWE Problems. Annual International Conference on the Theory and Applications of Cryptographic Techniques, Springer International Publishing.","DOI":"10.1007\/978-3-319-78381-9_6"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"322","DOI":"10.1109\/TC.2016.2642962","article-title":"On Practical Discrete Gaussian Samplers for Lattice-Based Cryptography","volume":"67","author":"Howe","year":"2018","journal-title":"IEEE Trans. Comput."},{"key":"ref_20","unstructured":"Sun, J., Qiao, Y., Liu, Z., Chen, Y., and Yang, Y. (October, January 30). Practical Multi-Authority Ciphertext Policy Attribute-Based Encryption from R-LWE. Proceedings of the IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking, New York, NY, USA."}],"container-title":["Entropy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1099-4300\/26\/9\/729\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T15:43:45Z","timestamp":1760111025000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1099-4300\/26\/9\/729"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8,27]]},"references-count":20,"journal-issue":{"issue":"9","published-online":{"date-parts":[[2024,9]]}},"alternative-id":["e26090729"],"URL":"https:\/\/doi.org\/10.3390\/e26090729","relation":{},"ISSN":["1099-4300"],"issn-type":[{"value":"1099-4300","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,8,27]]}}}