Identity-based proxy re-encryption scheme from RLWE assumption with ciphertext evolution

被引:0
|
作者
Meng H. [1 ]
Ren L. [1 ]
Zhao Z. [1 ]
机构
[1] College of Software, Henan Polytechnic University, Jiaozuo
关键词
chosen-ciphertext attack (CCA); ciphertext delegation; ciphertext evolution; learning with errors over ring (RLWE); proxy re-encryption (PRE);
D O I
10.19682/j.cnki.1005-8885.2023.0006
中图分类号
学科分类号
摘要
Proxy re-encryption (PRE) allows users to transfer decryption rights to the data requester via proxy. Due to the current PRE schemes from lattice (LPRE) cannot fulfill chosen-ciphertext attack (CCA) security, an identity-based PRE (IB-PRE) scheme from learning with errors over ring (RLWE) assumption with ciphertext evolution (IB-LPRE-CE) was proposed. IB-LPRE-CE generates the private key using the preimage sampling algorithm (SamplePre) and completes the ciphertext delegation using the re-encryption algorithm. In addition, for the problem of ciphertext delegation change caused by the long-term secret key update, the idea of PRE is used to complete ciphertext evolution and the modification of ciphertext delegation, which improves the efficiency of secure data sharing. In terms of security, IB-LPRE-CE is CCA security based on RLWE assumption. Compared with the current LPRE schemes, IB-LPRE-CE offers greater security and improves the computational efficiency of the encryption algorithm. © 2023, Beijing University of Posts and Telecommunications. All rights reserved.
引用
收藏
页码:51 / 60
页数:9
相关论文
共 50 条
  • [41] Identity-based Conditional Proxy Re-Encryption Without Random Oracles
    Qiu, JunJie
    Lee, YoungSil
    Lee, HoonJae
    2014 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC), 2014, : 349 - 353
  • [42] A provably secure collusion-resistant identity-based proxy re-encryption scheme based on NTRU
    Yang, Nan
    Tian, Youliang
    Zhou, Zhou
    Zhang, Qijia
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2023, 78
  • [43] Multi-Keyword Searchable Identity-Based Proxy Re-Encryption from Lattices
    Zhuang, Er-Shuo
    Fan, Chun-, I
    MATHEMATICS, 2023, 11 (18)
  • [44] Lattice Based Identity Based Unidirectional Proxy Re-Encryption Scheme
    Singh, Kunwar
    Rangan, C. Pandu
    Banerjee, A. K.
    SECURITY, PRIVACY, AND APPLIED CRYPTOGRAPHY ENGINEERING, 2014, 8804 : 76 - +
  • [45] Efficient and Fully CCA Secure Conditional Proxy Re-Encryption from Hierarchical Identity-Based Encryption
    Liang, Kaitai
    Susilo, Willy
    Liu, Joseph K.
    Wong, Duncan S.
    Computer Journal, 2014, 58 (10): : 2778 - 2792
  • [46] Proxy Re-encryption Scheme Based on BB2 Identity Based Encryption
    Yang, Xiaoyuan
    Wang, Xu An
    2009 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 1, 2009, : 134 - 137
  • [47] Efficient and Fully CCA Secure Conditional Proxy Re-Encryption from Hierarchical Identity-Based Encryption
    Liang, Kaitai
    Susilo, Willy
    Liu, Joseph K.
    Wong, Duncan S.
    COMPUTER JOURNAL, 2015, 58 (10): : 2778 - 2792
  • [48] Efficient Identity-based Proxy Re-encryption Scheme in Blockchain-assisted Decentralized Storage System
    He, Jiayu
    Zheng, Dong
    Guo, Rui
    Chen, Yushuang
    Li, Kemeng
    Tao, Xiaoling
    International Journal of Network Security, 2021, 23 (05) : 776 - 790
  • [49] Identity-Based Proxy Re-encryption over NTRU Lattices for Cloud Computing
    Yue, Na
    Wang, Yang
    Wang, Mingqiang
    2020 INTERNATIONAL CONFERENCE ON IDENTIFICATION, INFORMATION AND KNOWLEDGE IN THE INTERNET OF THINGS (IIKI2020), 2021, 187 : 264 - 269
  • [50] Ciphertext Policy Attribute-Based Proxy Re-encryption
    Luo, Song
    Hu, Jianbin
    Chen, Zhong
    INFORMATION AND COMMUNICATIONS SECURITY, 2010, 6476 : 401 - +