Research Article
Provably Secure Identity-Based Encryption and Signature over Cyclotomic Fields
(i) | Input: , . | (ii) | Output: A key pair . | (1) | Sample f from , if , resample. | (2) | Sample from , if , resample. | (3) | If or , restart. | (4) | If , restart. | (5) | Compute such that , e.g., using a Hermite normal form algorithm. | (6) | Use Babai rounding nearest plane algorithm to approximate in the lattice spanned by , let be the output, set for some . | (7) | If , restart. | (8) | Return secret key and public key . |
|