Research Article

Provably Secure Identity-Based Encryption and Signature over Cyclotomic Fields

Algorithm 1

(i)Input: , .
(ii)Output: A key pair .
(1)Sample f from , if , resample.
(2)Sample from , if , resample.
(3)If or , restart.
(4)If , restart.
(5)Compute such that , e.g., using a Hermite normal form algorithm.
(6)Use Babai rounding nearest plane algorithm to approximate in the lattice spanned by , let be the output, set for some .
(7)If , restart.
(8)Return secret key and public key .