A provably secure collusion-resistant identity-based proxy re-encryption scheme based on NTRU

被引:0
|
作者
Yang, Nan [1 ,2 ,3 ]
Tian, Youliang [1 ,3 ]
Zhou, Zhou [1 ,3 ]
Zhang, Qijia [1 ,3 ]
机构
[1] Guizhou Univ, Coll Comp Sci & Technol, State Key Lab Publ Big Data, Guiyang 550025, Guizhou, Peoples R China
[2] Qiannan Normal Univ Nationalities, Sch Math & Stat, Duyun 558000, Guizhou, Peoples R China
[3] Guizhou Prov Key Lab Cryptog & Blockchain Technol, Guiyang 550025, Guizhou, Peoples R China
基金
中国国家自然科学基金;
关键词
Lattice-based cryptography; IB-PRE; NTRU; D-RLWEo; LATTICE;
D O I
10.1016/j.jisa.2023.103604
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Proxy re-encryption (PRE) technology realizes the transformation of decryption right from a delegator to a delegatee. In response to the rapid development of quantum attack technology, scholars have proposed the lattice-based PRE schemes, and the underlying encryption scheme of most lattice-based PRE schemes is the dual cryptosystem, which has the defects of large storage overhead, computational overhead and low efficiency. To address these deficiencies, we present a novel identity-based proxy re-encryption (IB-PRE) scheme based on NTRU. By means of the underlying efficient NTRU scheme, the proposed scheme reduces the storage overhead and computational overhead on key size and computational complexity, and improves efficiency. Our scheme possesses desired properties such as multi-hop property, unidirectionality and collusion-resistance. Meanwhile, based on the decisional Hermite normal form of ring learning with errors (D-RLWEHNF) hard problem, it is carefully designed and demonstrated to be secure under selective identity and chosen plaintext attacks in the standard model.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] Security Analysis and Improvement of A Collusion-Resistant Identity-Based Proxy Re-Encryption Scheme
    Zhang, Linchao
    Ma, Hua
    Liu, Zhenhua
    Dong, Enting
    ADVANCES ON BROAD-BAND WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS, 2017, 2 : 839 - 846
  • [2] Collusion-resistant identity-based proxy re-encryption without random oracles
    Department of Ubiquitous IT, Graduate School of Dongseo University, Busan, Korea, Republic of
    不详
    Int. J. Secur. Appl., 9 (337-344):
  • [3] Collusion-Resistant Identity-Based Proxy Re-Encryption Without Random Oracles
    Qiu, JunJie
    Jo, JungBok
    Lee, HoonJae
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (09): : 337 - 344
  • [4] Collusion-resistant identity-based Proxy Re-encryption: Lattice-based constructions in Standard Model
    Dutta, Priyanka
    Susilo, Willy
    Duong, Dung Hoang
    Roy, Partha Sarathi
    THEORETICAL COMPUTER SCIENCE, 2021, 871 : 16 - 29
  • [5] Identity-Based Unidirectional Collusion-Resistant Proxy Re-Encryption from U-LWE
    Yang, Nan
    Tian, Youliang
    SECURITY AND COMMUNICATION NETWORKS, 2023, 2023
  • [6] Collusion resistant identity based proxy re-encryption scheme on lattices
    Key Laboratory of Cryptography and Information Security under the Chinese Armed Police Force, Engineering University of the Armed Police Force, Xi'an
    710086, China
    不详
    710071, China
    Huazhong Ligong Daxue Xuebao, 1671, 3 (110-115):
  • [7] Collusion-Resistant Unidirectional Proxy Re-Encryption Scheme from Lattices
    Kim, Kee Sung
    Jeong, Ik Rae
    JOURNAL OF COMMUNICATIONS AND NETWORKS, 2016, 18 (01) : 1 - 7
  • [8] A Secure Revocable Identity-Based Proxy Re-encryption Scheme for Cloud Storage
    Luo, Wei
    Ma, Wenping
    CLOUD COMPUTING AND SECURITY, PT II, 2018, 11064 : 519 - 530
  • [9] Identity-based proxy re-encryption
    Green, Matthew
    Ateniese, Giuseppe
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2007, 4521 : 288 - +
  • [10] A Collusion-Resistant Identity-Based Proxy Reencryption Scheme with Ciphertext Evolution for Secure Cloud Sharing
    Yao, Shimao
    Sankar, Ravi
    Ra, In-Ho
    SECURITY AND COMMUNICATION NETWORKS, 2020, 2020