Identity-based proxy re-encryption scheme from RLWE assumption with ciphertext evolution

被引:0
|
作者
Meng H. [1 ]
Ren L. [1 ]
Zhao Z. [1 ]
机构
[1] College of Software, Henan Polytechnic University, Jiaozuo
关键词
chosen-ciphertext attack (CCA); ciphertext delegation; ciphertext evolution; learning with errors over ring (RLWE); proxy re-encryption (PRE);
D O I
10.19682/j.cnki.1005-8885.2023.0006
中图分类号
学科分类号
摘要
Proxy re-encryption (PRE) allows users to transfer decryption rights to the data requester via proxy. Due to the current PRE schemes from lattice (LPRE) cannot fulfill chosen-ciphertext attack (CCA) security, an identity-based PRE (IB-PRE) scheme from learning with errors over ring (RLWE) assumption with ciphertext evolution (IB-LPRE-CE) was proposed. IB-LPRE-CE generates the private key using the preimage sampling algorithm (SamplePre) and completes the ciphertext delegation using the re-encryption algorithm. In addition, for the problem of ciphertext delegation change caused by the long-term secret key update, the idea of PRE is used to complete ciphertext evolution and the modification of ciphertext delegation, which improves the efficiency of secure data sharing. In terms of security, IB-LPRE-CE is CCA security based on RLWE assumption. Compared with the current LPRE schemes, IB-LPRE-CE offers greater security and improves the computational efficiency of the encryption algorithm. © 2023, Beijing University of Posts and Telecommunications. All rights reserved.
引用
收藏
页码:51 / 60
页数:9
相关论文
共 50 条
  • [31] New Identity Based Proxy Re-Encryption Scheme from Lattices
    Liqiang Wu
    Xiaoyuan Yang
    Minqing Zhang
    Longfei Liu
    China Communications, 2019, 16 (10) : 174 - 190
  • [32] An Identity-Based Proxy Re-Encryption Scheme With Single-Hop Conditional Delegation and Multi-Hop Ciphertext Evolution for Secure Cloud Data Sharing
    Yao, Shimao
    Dayot, Ralph Voltaire J.
    Ra, In-Ho
    Xu, Liya
    Mei, Zhuolin
    Shi, Jiaoli
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 3833 - 3848
  • [33] Identity-Based Proxy Re-Encryption Scheme Using Fog Computing and Anonymous Key Generation
    Lin, Han-Yu
    Tsai, Tung-Tso
    Ting, Pei-Yih
    Fan, Yan-Rong
    SENSORS, 2023, 23 (05)
  • [34] Security Analysis and Improvement of A Collusion-Resistant Identity-Based Proxy Re-Encryption Scheme
    Zhang, Linchao
    Ma, Hua
    Liu, Zhenhua
    Dong, Enting
    ADVANCES ON BROAD-BAND WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS, 2017, 2 : 839 - 846
  • [35] Identity Based Proxy Re-encryption Scheme under LWE
    Yin, Wei
    Wen, Qiaoyan
    Li, Wenmin
    Zhang, Hua
    Jin, Zheng Ping
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2017, 11 (12): : 6116 - 6132
  • [36] Identity-based conditional proxy re-encryption with fine grain policy
    Ge, Chunpeng
    Susilo, Willy
    Wang, Jiandong
    Fang, Liming
    COMPUTER STANDARDS & INTERFACES, 2017, 52 : 1 - 9
  • [37] A CCA-secure Multi-use Identity-based Proxy Re-encryption Scheme
    Cai, Yi
    Liu, Xudong
    2014 IEEE SYMPOSIUM ON COMPUTER APPLICATIONS AND COMMUNICATIONS (SCAC), 2014, : 51 - 56
  • [38] On the security of two identity-based conditional proxy re-encryption schemes
    He, Kai
    Weng, Jian
    Deng, Robert H.
    Liu, Joseph K.
    THEORETICAL COMPUTER SCIENCE, 2016, 652 : 18 - 27
  • [39] Efficient Identity-based Proxy Re-encryption on Lattice in the Standard Model
    Jiang Mingming
    Guo Yuyan
    Yu Lei
    Song Wangan
    Wei Shimin
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2019, 41 (01) : 61 - 66
  • [40] HIERARCHICAL IDENTITY-BASED PROXY RE-ENCRYPTION WITHOUT RANDOM ORACLES
    Ren, Yanli
    Gu, Dawu
    Wang, Shuozhong
    Zhang, Xinpengu
    INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2010, 21 (06) : 1049 - 1063