Identity-Based Unidirectional Collusion-Resistant Proxy Re-Encryption from U-LWE

被引:2
|
作者
Yang, Nan [1 ,2 ]
Tian, Youliang [1 ]
机构
[1] Guizhou Univ, Coll Comp Sci & Technol, State Key Lab Publ Big Data, Guiyang 550025, Peoples R China
[2] Qiannan Normal Univ Natl, Sch Math & Stat, Duyun 558000, Guizhou, Peoples R China
关键词
LATTICE;
D O I
10.1155/2023/3765934
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Identity-based proxy re-encryption (IB-PRE) converts the ciphertext encrypted under the delegator's identity to the one encrypted under the delegatee's identity through a semitrusted proxy without leaking delegator's private key and the underlying plaintext. At present, the security of most IB-PRE schemes relies on the hardness of the discrete logarithm solution or large integer decomposition and cannot resist attacks of the quantum algorithms. The majority of the IB-PRE schemes over lattice are secure only in the random oracle model. Aiming at such problems, the paper constructs a secure IB-PRE scheme over lattice in the standard model. In the scheme, the underlying encryption scheme proposed by Gentry et al. in EUROCRYPT 2010 is adopted to reduce the storage space of ciphertext. The proposed scheme is unidirectional collusion-resistant multihop and anonymous, and it is semantically secure against selective identity and chosen plaintext attack based on Decisional Learning With Errors with uniformly distributed errors (D-U-LWE) hard problem in the standard model.
引用
收藏
页数:9
相关论文
共 50 条
  • [1] Collusion-resistant identity-based proxy re-encryption without random oracles
    Department of Ubiquitous IT, Graduate School of Dongseo University, Busan, Korea, Republic of
    不详
    Int. J. Secur. Appl., 9 (337-344):
  • [2] Collusion-Resistant Identity-Based Proxy Re-Encryption Without Random Oracles
    Qiu, JunJie
    Jo, JungBok
    Lee, HoonJae
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (09): : 337 - 344
  • [3] Security Analysis and Improvement of A Collusion-Resistant Identity-Based Proxy Re-Encryption Scheme
    Zhang, Linchao
    Ma, Hua
    Liu, Zhenhua
    Dong, Enting
    ADVANCES ON BROAD-BAND WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS, 2017, 2 : 839 - 846
  • [4] Collusion-Resistant Unidirectional Proxy Re-Encryption Scheme from Lattices
    Kim, Kee Sung
    Jeong, Ik Rae
    JOURNAL OF COMMUNICATIONS AND NETWORKS, 2016, 18 (01) : 1 - 7
  • [5] A provably secure collusion-resistant identity-based proxy re-encryption scheme based on NTRU
    Yang, Nan
    Tian, Youliang
    Zhou, Zhou
    Zhang, Qijia
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2023, 78
  • [6] Improved collusion-resistant unidirectional proxy re-encryption scheme from lattice
    Wang, Xuyang
    Hu, Aiqun
    Fang, Hao
    IET INFORMATION SECURITY, 2020, 14 (03) : 342 - 351
  • [7] Collusion-resistant identity-based Proxy Re-encryption: Lattice-based constructions in Standard Model
    Dutta, Priyanka
    Susilo, Willy
    Duong, Dung Hoang
    Roy, Partha Sarathi
    THEORETICAL COMPUTER SCIENCE, 2021, 871 : 16 - 29
  • [8] New Constructions for Identity-Based Unidirectional Proxy Re-Encryption
    Lai, Jun-Zuo
    Zhu, Wen-Tao
    Deng, Robert H.
    Liu, Sheng-Li
    Kou, Wei-Dong
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2010, 25 (04) : 793 - 806
  • [9] New Constructions for Identity-Based Unidirectional Proxy Re-Encryption
    赖俊祚
    朱文涛
    邓慧杰
    刘胜利
    寇卫东
    JournalofComputerScience&Technology, 2010, 25 (04) : 793 - 806
  • [10] New Constructions for Identity-Based Unidirectional Proxy Re-Encryption
    Jun-Zuo Lai
    Wen-Tao Zhu
    Robert H. Deng
    Sheng-Li Liu
    Wei-Dong Kou
    Journal of Computer Science and Technology, 2010, 25 : 793 - 806