Attribute-Based Verifiable Conditional Proxy Re-Encryption Scheme

被引:2
|
作者
Tang, Yongli [1 ]
Jin, Minglu [1 ]
Meng, Hui [1 ]
Yang, Li [1 ]
Zheng, Chengfu [1 ]
机构
[1] Henan Polytech Univ, Coll Software, Jiaozuo 454000, Peoples R China
关键词
proxy re-encryption; homomorphic signature; learning with errors; re-encryption verifiable;
D O I
10.3390/e25050822
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
There are mostly semi-honest agents in cloud computing, so agents may perform unreliable calculations during the actual execution process. In this paper, an attribute-based verifiable conditional proxy re-encryption (AB-VCPRE) scheme using a homomorphic signature is proposed to solve the problem that the current attribute-based conditional proxy re-encryption (AB-CPRE) algorithm cannot detect the illegal behavior of the agent. The scheme implements robustness, that is the re-encryption ciphertext, can be verified by the verification server, showing that the received ciphertext is correctly converted by the agent from the original ciphertext, thus, meaning that illegal activities of agents can be effectively detected. In addition, the article demonstrates the reliability of the constructed AB-VCPRE scheme validation in the standard model, and proves that the scheme satisfies CPA security in the selective security model based on the learning with errors (LWE) assumption.
引用
下载
收藏
页数:17
相关论文
共 50 条
  • [41] HRA-secure attribute-based threshold proxy re-encryption from lattices
    Zhao, Feixiang
    Weng, Jian
    Xie, Wenli
    Li, Ming
    Weng, Jiasi
    INFORMATION SCIENCES, 2024, 655
  • [42] Blockchain-Based Attribute Proxy Re-Encryption Data Sharing Scheme
    Zhai, Sheping
    Tong, Tong
    Bai, Xifang
    Computer Engineering and Applications, 2023, 59 (08) : 270 - 279
  • [43] Ciphertext-policy attribute-based proxy re-encryption via constrained PRFs
    Li, Zengpeng
    Sharma, Vishal
    Ma, Chunguang
    Ge, Chunpeng
    Susilo, Willy
    SCIENCE CHINA-INFORMATION SCIENCES, 2021, 64 (06)
  • [44] Fuzzy conditional proxy re-encryption
    Fang LiMing
    Wang JianDong
    Ge ChunPeng
    Ren YongJun
    SCIENCE CHINA-INFORMATION SCIENCES, 2013, 56 (05) : 1 - 13
  • [45] On the Security of a Conditional Proxy Re-Encryption
    Zhang, Xi
    Chen, Min-Rong
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2009, E92A (10) : 2644 - 2647
  • [46] Cryptanalysis on a Secret-Sharing Based Conditional Proxy Re-Encryption Scheme
    Sun, Yuxia
    Liu, Dan
    MOBILE NETWORKS & APPLICATIONS, 2017, 22 (02): : 209 - 215
  • [47] Hierarchical conditional proxy re-encryption
    Fang, Liming
    Susilo, Willy
    Ge, Chunpeng
    Wang, Jiandong
    COMPUTER STANDARDS & INTERFACES, 2012, 34 (04) : 380 - 389
  • [48] Cryptanalysis on a Secret-Sharing Based Conditional Proxy Re-Encryption Scheme
    Yuxia Sun
    Dan Liu
    Mobile Networks and Applications, 2017, 22 : 209 - 215
  • [49] Fuzzy conditional proxy re-encryption
    FANG LiMing
    WANG JianDong
    GE ChunPeng
    REN YongJun
    Science China(Information Sciences), 2013, 56 (05) : 211 - 223
  • [50] Conditional Proxy Broadcast Re-Encryption
    Chu, Cheng-Kang
    Weng, Jian
    Chow, Sherman S. M.
    Zhou, Jianying
    Deng, Robert H.
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2009, 5594 : 327 - +