Identity-based proxy re-encryption scheme from RLWE assumption with ciphertext evolution

被引:0
|
作者
Meng H. [1 ]
Ren L. [1 ]
Zhao Z. [1 ]
机构
[1] College of Software, Henan Polytechnic University, Jiaozuo
关键词
chosen-ciphertext attack (CCA); ciphertext delegation; ciphertext evolution; learning with errors over ring (RLWE); proxy re-encryption (PRE);
D O I
10.19682/j.cnki.1005-8885.2023.0006
中图分类号
学科分类号
摘要
Proxy re-encryption (PRE) allows users to transfer decryption rights to the data requester via proxy. Due to the current PRE schemes from lattice (LPRE) cannot fulfill chosen-ciphertext attack (CCA) security, an identity-based PRE (IB-PRE) scheme from learning with errors over ring (RLWE) assumption with ciphertext evolution (IB-LPRE-CE) was proposed. IB-LPRE-CE generates the private key using the preimage sampling algorithm (SamplePre) and completes the ciphertext delegation using the re-encryption algorithm. In addition, for the problem of ciphertext delegation change caused by the long-term secret key update, the idea of PRE is used to complete ciphertext evolution and the modification of ciphertext delegation, which improves the efficiency of secure data sharing. In terms of security, IB-LPRE-CE is CCA security based on RLWE assumption. Compared with the current LPRE schemes, IB-LPRE-CE offers greater security and improves the computational efficiency of the encryption algorithm. © 2023, Beijing University of Posts and Telecommunications. All rights reserved.
引用
收藏
页码:51 / 60
页数:9
相关论文
共 50 条
  • [21] Key-Private Identity-Based Proxy Re-Encryption
    Ge, Chunpeng
    Xia, Jinyue
    Fang, Liming
    CMC-COMPUTERS MATERIALS & CONTINUA, 2020, 63 (02): : 633 - 647
  • [22] An identity-based proxy re-encryption for data deduplication in cloud
    Kan, Ge
    Jin, Chunhua
    Zhu, Huihui
    Xu, Yongliang
    Liu, Nian
    JOURNAL OF SYSTEMS ARCHITECTURE, 2021, 121
  • [23] Inter-domain Identity-Based Proxy Re-encryption
    Tang, Qiang
    Hartel, Pieter
    Jonker, Willem
    INFORMATION SECURITY AND CRYPTOLOGY, 2009, 5487 : 332 - 347
  • [24] New Constructions for Identity-Based Unidirectional Proxy Re-Encryption
    Lai, Jun-Zuo
    Zhu, Wen-Tao
    Deng, Robert H.
    Liu, Sheng-Li
    Kou, Wei-Dong
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2010, 25 (04) : 793 - 806
  • [25] Identity-based proxy re-encryption without random oracles
    Chu, Cheng-Kang
    Tzeng, Wen-Guey
    INFORMATION SECURITY, PROCEEDINGS, 2007, 4779 : 189 - +
  • [26] Identity-based multi-condition proxy re-encryption
    Wang, Pingshu
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON ADVANCES IN MECHANICAL ENGINEERING AND INDUSTRIAL INFORMATICS (AMEII 2016), 2016, 73 : 1047 - 1052
  • [27] New Constructions for Identity-Based Unidirectional Proxy Re-Encryption
    Jun-Zuo Lai
    Wen-Tao Zhu
    Robert H. Deng
    Sheng-Li Liu
    Wei-Dong Kou
    Journal of Computer Science and Technology, 2010, 25 : 793 - 806
  • [28] New Constructions for Identity-Based Unidirectional Proxy Re-Encryption
    赖俊祚
    朱文涛
    邓慧杰
    刘胜利
    寇卫东
    Journal of Computer Science & Technology, 2010, 25 (04) : 793 - 806
  • [29] New Identity Based Proxy Re-Encryption Scheme from Lattices
    Wu, Ligiang
    Yang, Xiltoymin
    Zhang, Minqing
    Liu, Longfei
    CHINA COMMUNICATIONS, 2019, 16 (10) : 174 - 190
  • [30] Identity-Based Proxy Re-encryption Based on SM9
    Liu, Hang
    Ming, Yang
    Wang, Chenhao
    Zhao, Yi
    INFORMATION SECURITY AND CRYPTOLOGY, INSCRYPT 2023, PT I, 2024, 14526 : 320 - 339