A provably secure collusion-resistant identity-based proxy re-encryption scheme based on NTRU

被引:0
|
作者
Yang, Nan [1 ,2 ,3 ]
Tian, Youliang [1 ,3 ]
Zhou, Zhou [1 ,3 ]
Zhang, Qijia [1 ,3 ]
机构
[1] Guizhou Univ, Coll Comp Sci & Technol, State Key Lab Publ Big Data, Guiyang 550025, Guizhou, Peoples R China
[2] Qiannan Normal Univ Nationalities, Sch Math & Stat, Duyun 558000, Guizhou, Peoples R China
[3] Guizhou Prov Key Lab Cryptog & Blockchain Technol, Guiyang 550025, Guizhou, Peoples R China
基金
中国国家自然科学基金;
关键词
Lattice-based cryptography; IB-PRE; NTRU; D-RLWEo; LATTICE;
D O I
10.1016/j.jisa.2023.103604
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Proxy re-encryption (PRE) technology realizes the transformation of decryption right from a delegator to a delegatee. In response to the rapid development of quantum attack technology, scholars have proposed the lattice-based PRE schemes, and the underlying encryption scheme of most lattice-based PRE schemes is the dual cryptosystem, which has the defects of large storage overhead, computational overhead and low efficiency. To address these deficiencies, we present a novel identity-based proxy re-encryption (IB-PRE) scheme based on NTRU. By means of the underlying efficient NTRU scheme, the proposed scheme reduces the storage overhead and computational overhead on key size and computational complexity, and improves efficiency. Our scheme possesses desired properties such as multi-hop property, unidirectionality and collusion-resistance. Meanwhile, based on the decisional Hermite normal form of ring learning with errors (D-RLWEHNF) hard problem, it is carefully designed and demonstrated to be secure under selective identity and chosen plaintext attacks in the standard model.
引用
收藏
页数:6
相关论文
共 50 条
  • [41] Efficient and Fully CCA Secure Conditional Proxy Re-Encryption from Hierarchical Identity-Based Encryption
    Liang, Kaitai
    Susilo, Willy
    Liu, Joseph K.
    Wong, Duncan S.
    Computer Journal, 2014, 58 (10): : 2778 - 2792
  • [42] Identity-based threshold proxy re-encryption scheme from lattices and its applications
    Wu, Liqiang
    Han, Yiliang
    Yang, Xiaoyuan
    Zhang, Minqing
    FRONTIERS OF INFORMATION TECHNOLOGY & ELECTRONIC ENGINEERING, 2022, 23 (02) : 258 - 277
  • [43] Efficient and Fully CCA Secure Conditional Proxy Re-Encryption from Hierarchical Identity-Based Encryption
    Liang, Kaitai
    Susilo, Willy
    Liu, Joseph K.
    Wong, Duncan S.
    COMPUTER JOURNAL, 2015, 58 (10): : 2778 - 2792
  • [44] Identity-based proxy re-encryption scheme from RLWE assumption with ciphertext evolution
    Meng H.
    Ren L.
    Zhao Z.
    Journal of China Universities of Posts and Telecommunications, 2023, 30 (05): : 51 - 60
  • [45] Identity-based proxy re-encryption scheme from RLWE assumption with ciphertext evolution
    Meng Hui
    Ren Lina
    Zhao Zongqu
    The Journal of China Universities of Posts and Telecommunications, 2023, 30 (05) : 51 - 60
  • [46] Multi-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encryption
    Shao, Jun
    Cao, Zhenfu
    INFORMATION SCIENCES, 2012, 206 : 83 - 95
  • [47] A Novel Revocable and Identity-Based Conditional Proxy Re-Encryption Scheme With Ciphertext Evolution for Secure Cloud Data Sharing
    Yao, Shimao
    Dayot, Ralph Voltaire J.
    Kim, Hyung-Jin
    Ra, In-Ho
    IEEE ACCESS, 2021, 9 : 42801 - 42816
  • [48] Lattice Based Identity Based Unidirectional Proxy Re-Encryption Scheme
    Singh, Kunwar
    Rangan, C. Pandu
    Banerjee, A. K.
    SECURITY, PRIVACY, AND APPLIED CRYPTOGRAPHY ENGINEERING, 2014, 8804 : 76 - +
  • [49] Burn After Reading: Adaptively Secure Puncturable Identity-Based Proxy Re-Encryption Scheme for Securing Group Message
    Xiong, Hu
    Wang, Lili
    Zhou, Zhida
    Zhao, Zetong
    Huang, Xin
    Kumari, Saru
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (13) : 11248 - 11260
  • [50] Identity Based Proxy Re-encryption Scheme under LWE
    Yin, Wei
    Wen, Qiaoyan
    Li, Wenmin
    Zhang, Hua
    Jin, Zheng Ping
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2017, 11 (12): : 6116 - 6132