A provably secure collusion-resistant identity-based proxy re-encryption scheme based on NTRU

被引:0
|
作者
Yang, Nan [1 ,2 ,3 ]
Tian, Youliang [1 ,3 ]
Zhou, Zhou [1 ,3 ]
Zhang, Qijia [1 ,3 ]
机构
[1] Guizhou Univ, Coll Comp Sci & Technol, State Key Lab Publ Big Data, Guiyang 550025, Guizhou, Peoples R China
[2] Qiannan Normal Univ Nationalities, Sch Math & Stat, Duyun 558000, Guizhou, Peoples R China
[3] Guizhou Prov Key Lab Cryptog & Blockchain Technol, Guiyang 550025, Guizhou, Peoples R China
基金
中国国家自然科学基金;
关键词
Lattice-based cryptography; IB-PRE; NTRU; D-RLWEo; LATTICE;
D O I
10.1016/j.jisa.2023.103604
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Proxy re-encryption (PRE) technology realizes the transformation of decryption right from a delegator to a delegatee. In response to the rapid development of quantum attack technology, scholars have proposed the lattice-based PRE schemes, and the underlying encryption scheme of most lattice-based PRE schemes is the dual cryptosystem, which has the defects of large storage overhead, computational overhead and low efficiency. To address these deficiencies, we present a novel identity-based proxy re-encryption (IB-PRE) scheme based on NTRU. By means of the underlying efficient NTRU scheme, the proposed scheme reduces the storage overhead and computational overhead on key size and computational complexity, and improves efficiency. Our scheme possesses desired properties such as multi-hop property, unidirectionality and collusion-resistance. Meanwhile, based on the decisional Hermite normal form of ring learning with errors (D-RLWEHNF) hard problem, it is carefully designed and demonstrated to be secure under selective identity and chosen plaintext attacks in the standard model.
引用
收藏
页数:6
相关论文
共 50 条
  • [21] On the Relation between Identity-Based Proxy Re-Encryption and Mediated Identity-Based Encryption
    Wan, Zhong-Mei
    Weng, Jian
    Lai, Xue-Jia
    Liu, Sheng-Li
    Li, Ji-Guo
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2011, 27 (01) : 243 - 259
  • [22] Lattice-Based Revocable Identity-Based Proxy Re-encryption with Re-encryption Verifiability
    Wang, Xiaolei
    Wang, Yang
    Wang, Mingqiang
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS (WASA 2022), PT I, 2022, 13471 : 535 - 544
  • [23] An Improved Cloud-Based Revocable Identity-Based Proxy Re-encryption Scheme
    Wang, Changji
    Fang, Jian
    Li, Yuan
    APPLICATIONS AND TECHNIQUES IN INFORMATION SECURITY, ATIS 2015, 2015, 557 : 14 - 26
  • [24] Security of Cloud-Based Revocable Identity-Based Proxy Re-Encryption Scheme
    Park, Seunghwan
    Lee, Dong Hoon
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2016, E99D (07): : 1933 - 1936
  • [25] Proxy Re-encryption Scheme Based on SK Identity Based Encryption
    Wang, Xu An
    Yang, Xiaoyuan
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 657 - 660
  • [26] RSA-Based Collusion Resistant Quorum Controlled Proxy Re-encryption Scheme for Distributed Secure Communication
    Patil, Shravani Mahesh
    Purushothama, B. R.
    DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY, ICDCIT 2019, 2019, 11319 : 349 - 363
  • [27] Further improvement of a dynamic type and identity-based proxy re-encryption scheme
    Zhang X.-P.
    Xu C.-X.
    Zhang X.-J.
    Deng J.
    Huang X.
    1600, Univ. of Electronic Science and Technology of China (45): : 964 - 968
  • [28] Identity-based re-encryption scheme with lightweight re-encryption key generation
    Liu, Liang
    Ye, Jun
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2018, 21 (01): : 41 - 57
  • [29] Functional Re-encryption and Collusion-Resistant Obfuscation
    Chandran, Nishanth
    Chase, Melissa
    Vaikuntanathan, Vinod
    THEORY OF CRYPTOGRAPHY (TCC 2012), 2012, 7194 : 404 - 421
  • [30] Provably Secure Certificate-based Conditional Proxy Re-encryption
    Li, Jiguo
    Zhao, Xuexia
    Zhang, Yichen
    Yao, Wei
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2016, 32 (04) : 813 - 830