Identity-based proxy re-encryption scheme from RLWE assumption with ciphertext evolution

被引:0
|
作者
Meng H. [1 ]
Ren L. [1 ]
Zhao Z. [1 ]
机构
[1] College of Software, Henan Polytechnic University, Jiaozuo
关键词
chosen-ciphertext attack (CCA); ciphertext delegation; ciphertext evolution; learning with errors over ring (RLWE); proxy re-encryption (PRE);
D O I
10.19682/j.cnki.1005-8885.2023.0006
中图分类号
学科分类号
摘要
Proxy re-encryption (PRE) allows users to transfer decryption rights to the data requester via proxy. Due to the current PRE schemes from lattice (LPRE) cannot fulfill chosen-ciphertext attack (CCA) security, an identity-based PRE (IB-PRE) scheme from learning with errors over ring (RLWE) assumption with ciphertext evolution (IB-LPRE-CE) was proposed. IB-LPRE-CE generates the private key using the preimage sampling algorithm (SamplePre) and completes the ciphertext delegation using the re-encryption algorithm. In addition, for the problem of ciphertext delegation change caused by the long-term secret key update, the idea of PRE is used to complete ciphertext evolution and the modification of ciphertext delegation, which improves the efficiency of secure data sharing. In terms of security, IB-LPRE-CE is CCA security based on RLWE assumption. Compared with the current LPRE schemes, IB-LPRE-CE offers greater security and improves the computational efficiency of the encryption algorithm. © 2023, Beijing University of Posts and Telecommunications. All rights reserved.
引用
收藏
页码:51 / 60
页数:9
相关论文
共 50 条
  • [1] Identity-based proxy re-encryption scheme from RLWE assumption with ciphertext evolution
    Meng Hui
    Ren Lina
    Zhao Zongqu
    The Journal of China Universities of Posts and Telecommunications, 2023, 30 (05) : 51 - 60
  • [2] A Chosen-Ciphertext Secure Fuzzy Identity-Based Proxy Re-Encryption Scheme
    Ge, Chunpeng
    Wang, Jiandong
    Fang, Liming
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (05): : 347 - 360
  • [3] Identity-based proxy re-encryption
    Green, Matthew
    Ateniese, Giuseppe
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2007, 4521 : 288 - +
  • [4] A Novel Revocable and Identity-Based Conditional Proxy Re-Encryption Scheme With Ciphertext Evolution for Secure Cloud Data Sharing
    Yao, Shimao
    Dayot, Ralph Voltaire J.
    Kim, Hyung-Jin
    Ra, In-Ho
    IEEE ACCESS, 2021, 9 : 42801 - 42816
  • [5] Proxy re-encryption systems for identity-based encryption
    Matsuo, Toshihiko
    Pairing-Based Cryptography - Pairing 2007, 2007, 4575 : 247 - 267
  • [6] Identity-Based Conditional Proxy Re-Encryption
    Zhou Dehua
    Chen Kefei
    Liu Shengli
    Zheng Dong
    CHINESE JOURNAL OF ELECTRONICS, 2013, 22 (01): : 61 - 66
  • [7] Identity-based Conditional Proxy Re-encryption
    Shao, Jun
    Wei, Guiyi
    Ling, Yun
    Xie, Mande
    2011 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2011,
  • [8] On the Relation between Identity-Based Proxy Re-Encryption and Mediated Identity-Based Encryption
    Wan, Zhong-Mei
    Weng, Jian
    Lai, Xue-Jia
    Liu, Sheng-Li
    Li, Ji-Guo
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2011, 27 (01) : 243 - 259
  • [9] Identity-based threshold proxy re-encryption scheme from lattices and its applications
    Wu, Liqiang
    Han, Yiliang
    Yang, Xiaoyuan
    Zhang, Minqing
    FRONTIERS OF INFORMATION TECHNOLOGY & ELECTRONIC ENGINEERING, 2022, 23 (02) : 258 - 277
  • [10] IB-VPRE: adaptively secure identity-based proxy re-encryption scheme from LWE with re-encryption verifiability
    Wu Li-qiang
    Yang Xiao-yuan
    Zhang Min-qing
    Wang Xu-an
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2022, 13 (01) : 469 - 482