Attribute-Based Verifiable Conditional Proxy Re-Encryption Scheme

被引:2
|
作者
Tang, Yongli [1 ]
Jin, Minglu [1 ]
Meng, Hui [1 ]
Yang, Li [1 ]
Zheng, Chengfu [1 ]
机构
[1] Henan Polytech Univ, Coll Software, Jiaozuo 454000, Peoples R China
关键词
proxy re-encryption; homomorphic signature; learning with errors; re-encryption verifiable;
D O I
10.3390/e25050822
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
There are mostly semi-honest agents in cloud computing, so agents may perform unreliable calculations during the actual execution process. In this paper, an attribute-based verifiable conditional proxy re-encryption (AB-VCPRE) scheme using a homomorphic signature is proposed to solve the problem that the current attribute-based conditional proxy re-encryption (AB-CPRE) algorithm cannot detect the illegal behavior of the agent. The scheme implements robustness, that is the re-encryption ciphertext, can be verified by the verification server, showing that the received ciphertext is correctly converted by the agent from the original ciphertext, thus, meaning that illegal activities of agents can be effectively detected. In addition, the article demonstrates the reliability of the constructed AB-VCPRE scheme validation in the standard model, and proves that the scheme satisfies CPA security in the selective security model based on the learning with errors (LWE) assumption.
引用
下载
收藏
页数:17
相关论文
共 50 条
  • [21] Searchable Attribute-Based Proxy Re-encryption: Keyword Privacy, Verifiable Expressive Search, and Outsourced Decryption
    Bera S.
    Rao Y.S.
    SN Computer Science, 5 (5)
  • [22] Flexible attribute-based proxy re-encryption for efficient data sharing
    Deng, Hua
    Qin, Zheng
    Wu, Qianhong
    Guan, Zhenyu
    Zhou, Yunya
    INFORMATION SCIENCES, 2020, 511 (511) : 94 - 113
  • [23] Weighted Attribute-Based Proxy Re-Encryption Scheme with Distributed Multi-Authority Attributes
    Yi, Wenlong
    Wang, Chuang
    Kuzmin, Sergey
    Gerasimov, Igor
    Cheng, Xiangping
    SENSORS, 2024, 24 (15)
  • [24] Efficient Attribute-Based Proxy Re-Encryption with Constant Size Ciphertexts
    Paul, Arinjita
    Selvi, S. Sharmila Deva
    Rangan, C. Pandu
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2020, 2020, 12578 : 644 - 665
  • [25] Outsourcing the Re-encryption Key Generation: Flexible Ciphertext-Policy Attribute-Based Proxy Re-encryption
    Kawai, Yutaka
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2015, 2015, 9065 : 301 - 315
  • [26] Unidirectional proxy re-encryption for access structure transformation in attribute-based encryption schemes
    Fu, Xingbing
    International Journal of Network Security, 2015, 17 (02) : 142 - 149
  • [27] A ciphertext-policy attribute-based proxy re-encryption scheme for data sharing in public clouds
    Liang, Kaitai
    Fang, Liming
    Wong, Duncan S.
    Susilo, Willy
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2015, 27 (08): : 2004 - 2027
  • [28] Anonymous attribute-based proxy re-encryption for access control in cloud computing
    Zhang, Yinghui
    Li, Jin
    Chen, Xiaofeng
    Li, Hui
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (14) : 2397 - 2411
  • [29] ABP: Attribute-Based Broadcast Proxy Re-Encryption With Coalitional Game Theory
    Maiti, Sumana
    Misra, Sudip
    Mondal, Ayan
    IEEE SYSTEMS JOURNAL, 2024, 18 (01): : 85 - 95
  • [30] Attribute-based Proxy Re-encryption Method for Revocation in Cloud Data Storage
    Yasumura, Yoshiko
    Imabayashi, Hiroki
    Yamana, Hayato
    2017 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2017, : 4858 - 4860